Results 141 to 150 of about 10,965 (186)

Security Analysis of IEEE 802.16

2007 IEEE International Conference on Communications, 2007
This paper analyzes some critical security issues in the family of IEEE 802.16 standard that has not been addressed so far. In particular two of the key features of the standard, the dynamic resources allocation and the mesh mode revealed to be vulnerable to attacks that represent serious threats to the robustness and privacy of the communications.
MACCARI, LEONARDO   +2 more
openaire   +3 more sources

Enhancing QoS in IEEE 802.16

AIP Conference Proceedings, 2010
The Wireless Broadband Network standard IEEE 802.16, popularly referred to as WiMAX is designed specifically to provide differentiated Quality‐of‐Service (QoS) based on the traffic requirement. However the QoS differentiation process is often unfair especially to traffic classes which do not require high QoS guarantee.
Mahasweta Sarkar   +2 more
openaire   +1 more source

Scheduler for IEEE 802.16 networks

IEEE Communications Letters, 2008
The IEEE 802.16 standard was designed to support real-time and bandwidth demanding applications with quality of service (QoS). Although the standard defines a QoS signaling framework and five service levels, scheduling disciplines for these service levels are unspecified.
J.F. Borin, N.L.S. da Fonseca
openaire   +1 more source

Overview of IEEE 802.16 security

IEEE Security & Privacy Magazine, 2004
When creating the new wireless communication standard IEEE 802.16, designers attempted to reuse a security scheme designed for wired media. The authors review the standard, enumerate its flaws, and outline changes that could defend it against threats.
D. Johnston, J. Walker
openaire   +1 more source

Delay Model for Saturated IEEE 802.16 Networks

2008 New Technologies, Mobility and Security, 2008
In this paper, we propose an analytical model to evaluate the average packet delay and its standard deviation in a saturated IEEE 802.16 network. In addition, the bandwidth utilization of an uplink data frame and packet loss probability are also derived from the model. We show that our analytical model is accurate for a range of parameters by comparing
Vu, Hai, Chan, Sammy
openaire   +1 more source

Home - About - Disclaimer - Privacy