IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 11    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 11,November 2012
Wireless Broadband Network Technology Infrastructure and Related Intellectual Property Application & Security
Full Text(PDF, )  PP.232-239  
Nandini mishra, Neelam maurya, Nikita gaur
Wireless Broadband network technologies, Application, 4G Broadband, Security, limitation, Wireless Broadband work
Since the beginning of this millennium, there has been an unprecedented growth in broadband wireless networks. This can be attributed to high demand for wireless multimedia services such as data, voice, video, and the development of new wireless standards
[1] Government Resolution: National Plan of Action for improving the infrastructure of the information society. Government of Finland, 4 December 2008.

[2] Federal Ministry of Economics and Technology, February 2009.

[3] Eric Besson, Digital France 2012. October 2008.

[4] http://www.arcep.fr/fileadmin/reprise/communiques/communiques/2 009/comnq-nkm-fibre-100709.pdf. Community Guidelines for the application of State aid rules in relation to rapid deployment of broadband networks,availabl,http://ec.europa.eu/competition/state_aid/legislation/ guidelines_broadband_en.pdf. Next Generation Connectivity

[5] Advanced Encryption Standard Fact Sheet. (2001, January 19). Retrieved August 28, 2010, from http://www.kern.com/files/SecurityFinal_F.pdf

[6] Aikaterini, A-V. (2006). Security of IEEE 802.16. Royal Institute of Technology.

[7] Bai,L.(2007).Analysis of the Market for WiMax Services.

[8] Barbeau, M. (2005). WiMax/802.16 Threat Analysis. Q2SWinet’05.

[9] Barongo,M.W. (2008). Dimensioning MobileWIMAX in the Access & Core Network: A Case Study. HELSINKI UNIV.

[10] Bruno Puzzolante, G.R. (2006). Nationwide Implementation of a WiMAX Mobile Access Network

[11] Chungo-Kuo Chang, C.-T.H. (2007). Secure Mobility for IEEE 802.16e Broadband Wireless Networks.

[12] Edurado B.Fernandez, M.V. (2007). Patterns for Wimax security.

[13] G.Cayla, S.C. (November, 2005,). WIMAX an Efficient.WiMax Forum.

[14] G.Nair, J.C. (2004). IEEE 802.16 Medium access Control & Service Provisioning Intel Technology Journal.

[15] Hasan J. (2006). Security Issues of IEEE 802.16. School of Computer and Information.

[16] IEEE. (2004). IEEE Std 802.16-2004, IEEE standard for WiMax 802.16-2004.

[17] Muleta, J. (2005). Broadband Technologies for rural Development. NCC Rural Access.

[18] Prakash, N. (2006). Wireless Broadband Access Using WiMax Standard.

[19] Sikkens B. (2008). Security Issues and proposed solutions concerning authentication and authorization for WiMax. 8th twente student Conference on IT.

[20] Monica Paolini is the founder and president of Senza Fili Consulting and can be contacted at monica.paolini@senzafiliconsulting.com.

Untitled Page