RMIT University
Browse

End-to-end security comparisons between IEEE 802.16e and 3G technologies

chapter
posted on 2024-10-30, 20:36 authored by Sasan Adibi, Gordon Agnew
Security measures of mobile infrastructures have always been important from the early days of the creation of cellular networks. Nowadays, however, the traditional security schemes require a more fundamental approach to cover the entire path from the mobile user to the server. This fundamental approach is so-called end-to-end (E2E) security coverage. The main focus of this chapter is to discuss such architectures for IEEE 802.16e (Mobile-WiMAX) and major third generation (3G) cellular networks. The E2E implementations usually contain a complete set of algorithms, protocol enhancements (mutual identification, authentications, and authorization), including the very large-scale integration (VLSI) implementations. This chapter discusses various proposals at the protocol level.

History

Related Materials

  1. 1.
    DOI - Is published in 10.4018/978-1-59904-899-4.ch023
  2. 2.
    ISBN - Is published in 9781599048994 (urn:isbn:9781599048994)

Start page

364

End page

378

Total pages

15

Outlet

Handbook of Research on Wireless Security

Editors

Yan Zhang, Jun Zheng and Miao Ma

Publisher

Information Science Reference (an imprint of IGI Global)

Place published

PA, United States

Language

English

Copyright

© 2008 IGI Global

Former Identifier

2006043669

Esploro creation date

2020-06-22

Fedora creation date

2014-04-08

Usage metrics

    Scholarly Works

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC