WiFi and WiMAX Secure Deployments View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2010

AUTHORS

Panagiotis Trimintzios, George Georgiou

ABSTRACT

Wireless Broadband offers incredibly fast, “always on” Internet similar to ADSL and sets the user free from the fixed access areas. In order to achieve these features standardisation was achieved for Wireless LAN (WLANs) and Wireless Metropolitan Area Networks (WMANs) with the advent of IEEE802.11 and IEEE802.16 family of standards, respectively. One serious concern in the rapidly developing wireless networking market has been the security of the deployments since the information is delivered freely in the air and therefore privacy and integrity of the transmitted information, along with the user-authentication procedures, become a very important issue. In this article, we present the security characteristics for the WiFi and the WiMAX networks. We thoroughly present the security mechanisms along with a threat analysis for both IEEE 802.11 and the 802.16 as well as their amendments. We summarise in a comparative manner the security characteristics and the possible residual threats for both standards. Finally focus on the necessary actions and configurations that are needed in order to deploy WiFi and WiMAX with increased levels of security and privacy. More... »

PAGES

1-28

Identifiers

URI

http://scigraph.springernature.com/pub.10.1155/2010/423281

DOI

http://dx.doi.org/10.1155/2010/423281

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1009086229


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "European Union Agency for Network and Information Security", 
          "id": "https://www.grid.ac/institutes/grid.452974.9", 
          "name": [
            "Technical Competence Department, European Network and Information Security Agency (ENISA), P.O. Box 1309, GR-71001 Heraklion Crete, Greece"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Trimintzios", 
        "givenName": "Panagiotis", 
        "id": "sg:person.010231054332.33", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010231054332.33"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Public Power Corporation (Greece)", 
          "id": "https://www.grid.ac/institutes/grid.4694.f", 
          "name": [
            "Thermal Construction and Engineering Department, Public Power Corporation (PLC), Chalkokondili 30, GR-10432 Athens, Greece"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Georgiou", 
        "givenName": "George", 
        "id": "sg:person.013216756332.43", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013216756332.43"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1109/msp.2004.20", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061422211"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2010", 
    "datePublishedReg": "2010-01-01", 
    "description": "Wireless Broadband offers incredibly fast, \u201calways on\u201d Internet similar to ADSL and sets the user free from the fixed access areas. In order to achieve these features standardisation was achieved for Wireless LAN (WLANs) and Wireless Metropolitan Area Networks (WMANs) with the advent of IEEE802.11 and IEEE802.16 family of standards, respectively. One serious concern in the rapidly developing wireless networking market has been the security of the deployments since the information is delivered freely in the air and therefore privacy and integrity of the transmitted information, along with the user-authentication procedures, become a very important issue. In this article, we present the security characteristics for the WiFi and the WiMAX networks. We thoroughly present the security mechanisms along with a threat analysis for both IEEE 802.11 and the 802.16 as well as their amendments. We summarise in a comparative manner the security characteristics and the possible residual threats for both standards. Finally focus on the necessary actions and configurations that are needed in order to deploy WiFi and WiMAX with increased levels of security and privacy.", 
    "genre": "research_article", 
    "id": "sg:pub.10.1155/2010/423281", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": [
      {
        "id": "sg:journal.1151708", 
        "issn": [
          "1687-7381", 
          "1687-739X"
        ], 
        "name": "Journal of Computer Systems Networks and Communications", 
        "type": "Periodical"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "2010"
      }
    ], 
    "name": "WiFi and WiMAX Secure Deployments", 
    "pagination": "1-28", 
    "productId": [
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "2b49d2bc8b85dee407ea68e5309f40162b87341e68c19c6fae76f1cd661fca92"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1155/2010/423281"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1009086229"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1155/2010/423281", 
      "https://app.dimensions.ai/details/publication/pub.1009086229"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2019-04-10T21:01", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8687_00000015.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "http://link.springer.com/10.1155/2010/423281"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1155/2010/423281'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1155/2010/423281'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1155/2010/423281'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1155/2010/423281'


 

This table displays all metadata directly associated to this object as RDF triples.

71 TRIPLES      21 PREDICATES      27 URIs      18 LITERALS      6 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1155/2010/423281 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N068a4c0611164b37866b3156b6d98382
4 schema:citation https://doi.org/10.1109/msp.2004.20
5 schema:datePublished 2010
6 schema:datePublishedReg 2010-01-01
7 schema:description Wireless Broadband offers incredibly fast, “always on” Internet similar to ADSL and sets the user free from the fixed access areas. In order to achieve these features standardisation was achieved for Wireless LAN (WLANs) and Wireless Metropolitan Area Networks (WMANs) with the advent of IEEE802.11 and IEEE802.16 family of standards, respectively. One serious concern in the rapidly developing wireless networking market has been the security of the deployments since the information is delivered freely in the air and therefore privacy and integrity of the transmitted information, along with the user-authentication procedures, become a very important issue. In this article, we present the security characteristics for the WiFi and the WiMAX networks. We thoroughly present the security mechanisms along with a threat analysis for both IEEE 802.11 and the 802.16 as well as their amendments. We summarise in a comparative manner the security characteristics and the possible residual threats for both standards. Finally focus on the necessary actions and configurations that are needed in order to deploy WiFi and WiMAX with increased levels of security and privacy.
8 schema:genre research_article
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N8ed5a182d99547bdbc0bc0e793fb353f
12 sg:journal.1151708
13 schema:name WiFi and WiMAX Secure Deployments
14 schema:pagination 1-28
15 schema:productId N6f82f94d809d4dfd99afb33d35055d7f
16 Na6ffa5128b0f4417bc65e0218d197eb3
17 Nd7ac661586f049db888d6aa69c671e3d
18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009086229
19 https://doi.org/10.1155/2010/423281
20 schema:sdDatePublished 2019-04-10T21:01
21 schema:sdLicense https://scigraph.springernature.com/explorer/license/
22 schema:sdPublisher N935da6fa71a34a2795ae4ab9759f69c9
23 schema:url http://link.springer.com/10.1155/2010/423281
24 sgo:license sg:explorer/license/
25 sgo:sdDataset articles
26 rdf:type schema:ScholarlyArticle
27 N068a4c0611164b37866b3156b6d98382 rdf:first sg:person.010231054332.33
28 rdf:rest Ndbf2e9ca1f934bcc8c81a348231236e7
29 N6f82f94d809d4dfd99afb33d35055d7f schema:name doi
30 schema:value 10.1155/2010/423281
31 rdf:type schema:PropertyValue
32 N8ed5a182d99547bdbc0bc0e793fb353f schema:volumeNumber 2010
33 rdf:type schema:PublicationVolume
34 N935da6fa71a34a2795ae4ab9759f69c9 schema:name Springer Nature - SN SciGraph project
35 rdf:type schema:Organization
36 Na6ffa5128b0f4417bc65e0218d197eb3 schema:name dimensions_id
37 schema:value pub.1009086229
38 rdf:type schema:PropertyValue
39 Nd7ac661586f049db888d6aa69c671e3d schema:name readcube_id
40 schema:value 2b49d2bc8b85dee407ea68e5309f40162b87341e68c19c6fae76f1cd661fca92
41 rdf:type schema:PropertyValue
42 Ndbf2e9ca1f934bcc8c81a348231236e7 rdf:first sg:person.013216756332.43
43 rdf:rest rdf:nil
44 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
45 schema:name Information and Computing Sciences
46 rdf:type schema:DefinedTerm
47 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
48 schema:name Data Format
49 rdf:type schema:DefinedTerm
50 sg:journal.1151708 schema:issn 1687-7381
51 1687-739X
52 schema:name Journal of Computer Systems Networks and Communications
53 rdf:type schema:Periodical
54 sg:person.010231054332.33 schema:affiliation https://www.grid.ac/institutes/grid.452974.9
55 schema:familyName Trimintzios
56 schema:givenName Panagiotis
57 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010231054332.33
58 rdf:type schema:Person
59 sg:person.013216756332.43 schema:affiliation https://www.grid.ac/institutes/grid.4694.f
60 schema:familyName Georgiou
61 schema:givenName George
62 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013216756332.43
63 rdf:type schema:Person
64 https://doi.org/10.1109/msp.2004.20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061422211
65 rdf:type schema:CreativeWork
66 https://www.grid.ac/institutes/grid.452974.9 schema:alternateName European Union Agency for Network and Information Security
67 schema:name Technical Competence Department, European Network and Information Security Agency (ENISA), P.O. Box 1309, GR-71001 Heraklion Crete, Greece
68 rdf:type schema:Organization
69 https://www.grid.ac/institutes/grid.4694.f schema:alternateName Public Power Corporation (Greece)
70 schema:name Thermal Construction and Engineering Department, Public Power Corporation (PLC), Chalkokondili 30, GR-10432 Athens, Greece
71 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...