Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

Clemson University

All Theses

2013

Network protocols

Articles 1 - 1 of 1

Full-Text Articles in Engineering

Reverse Engineering: Wimax And Ieee 802.16e, Katherine Cameron May 2013

Reverse Engineering: Wimax And Ieee 802.16e, Katherine Cameron

All Theses

Wireless communications is part of everyday life. As it is incorporated into new products and services, it brings additional security risks and requirements. A thorough understanding of wireless protocols is necessary for network administrators and manufacturers. Though most wireless protocols have strict standards, many parts of the hardware implementation may deviate from the standard and be proprietary. In these situations reverse engineering must be conducted to fully understand the strengths and vulnerabilities of the communication medium.
New 4G broadband wireless access protocols, including IEEE 802.16e and WiMAX, offer higher data rates and wider coverage than earlier 3G technologies. Many security …