IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security in Wireless Metropolitan Area Networks: WiMAX and LTE

Security in Wireless Metropolitan Area Networks: WiMAX and LTE
View Sample PDF
Author(s): Lei Chen (Sam Houston State University, USA), Cihan Varol (Sam Houston State University, USA), Qingzhong Liu (Sam Houston State University, USA) and Bing Zhou (Sam Houston State University, USA)
Copyright: 2014
Pages: 17
Source title: Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
Source Author(s)/Editor(s): Danda B. Rawat (Georgia Southern University, USA), Bhed B. Bista (Iwate Prefectural University, Japan) and Gongjun Yan (University of Southern Indiana, USA)
DOI: 10.4018/978-1-4666-4691-9.ch002

Purchase

View Security in Wireless Metropolitan Area Networks: WiMAX and LTE on the publisher's website for pricing and purchasing information.

Abstract

Thanks to the much larger geographical coverage and pleasing bandwidth of data transmissions, Wireless Metropolitan Area Networks (WMANs) have become widely accepted in many countries for everyday communications. Two of the main wireless technologies used in WMANs, the Worldwide Interoperability for Microwave Access (WiMAX, also known as Wireless Local Loop or WLL) and Long Term Evolution (LTE), have generated billions of dollars in the ever-growing wireless communication market. While the IEEE 802.16 standards for WiMAX and the 3GPP standards LTE are updated and improved almost annually, it is inevitable that current standards still contain a number of security vulnerabilities, potentially leading to various security attacks. To address the security concerns in these two WMANs technologies, this chapter presents the technical details of security aspects of WiMAX and LTE. More specifically, the key generation, authentication, data, and key confidentiality and integrity of both technologies are deliberated. The chapter ends with a discussion of the security vulnerabilities, threats, and countermeasures of WiMAX and LTE.

Related Content

. © 2021. 35 pages.
. © 2021. 24 pages.
. © 2021. 35 pages.
. © 2021. 30 pages.
. © 2021. 34 pages.
. © 2021. 21 pages.
. © 2021. 31 pages.
Body Bottom