Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/38709
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChia, Woanlan.-
dc.date.accessioned2010-05-17T08:49:26Z-
dc.date.available2010-05-17T08:49:26Z-
dc.date.copyright2010en_US
dc.date.issued2010-
dc.identifier.urihttp://hdl.handle.net/10356/38709-
dc.description.abstractDenial of Service (DoS) is one of the most common attacks on wireless networks. Studies were done to research on the vulnerabilities and the security measures of IEEE802.16e against this type of attack. However, most of the researches were done through theory proving. This method however is less convincing as there maybe differences between theoretical and physical implementation. This report proposes to formally verify the Denial of Service (DoS) attack due to the vulnerabilities in the initial ranging protocol as specified in IEEE 802.16e. Two models are implemented in SPIN and the verification results are compared and analysed. The results shows that a DoS attack is possible based on the assumptions made during the modelling process. In addition, through simulation in SPIN, it was proven that encryption can be used for added security to prevent DoS.en_US
dc.format.extent74 p.en_US
dc.language.isoenen_US
dc.rightsNanyang Technological University-
dc.subjectDRNTU::Engineering::Electrical and electronic engineering::Wireless communication systemsen_US
dc.titleSecurity study of WiMAX systemsen_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorMa Maodeen_US
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen_US
dc.description.degreeBachelor of Engineeringen_US
item.grantfulltextrestricted-
item.fulltextWith Fulltext-
Appears in Collections:EEE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
eA5089-091.pdf
  Restricted Access
1.73 MBAdobe PDFView/Open

Page view(s) 50

312
Updated on Dec 4, 2021

Download(s)

13
Updated on Dec 4, 2021

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.