By Topic

Securing open access networks using intelligent policy management system

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
H. Chamas ; Verizon Communications, White Plains, NY, USA ; H. Omar ; M. Kermani ; K. Shuaib

With advent of access technologies such as WiFi and WiMax, access mechanisms are on the verge of providing continuous access anytime, anywhere and most importantly anyhow. The IEEE 802.16e amendment to the IEEE 802.16 standard adds mobility to the original standard and thus makes WiMax an attractive solution to provide high bit rate mobile wireless services over a broader range of coverage. However, the last mile in open access networks remains vulnerable to attacks at the physical and MAC layers. This paper provides an overview of the security concerns and proposes a robust new architecture model to help protect against attacks from rogue devices for a true mobile security as wireless devices are becoming increasingly vulnerable mini computers. The drive to provide open access is not limited to cellular technology but extends to other wireless technologies such as Wi-Fi and WiMax.

Published in:

Innovations in Information Technology, 2008. IIT 2008. International Conference on

Date of Conference:

16-18 Dec. 2008