AUB ScholarWorks

Optimal WiMax planning with security considerations

Show simple item record

dc.contributor.author El-Hajj W.
dc.contributor.author Hajj H.M.
dc.contributor.author Barka E.
dc.contributor.author Dawy Z.
dc.contributor.author Hmaissy O.E.
dc.contributor.author Ghaddar D.
dc.contributor.author Aitour Y.
dc.contributor.editor
dc.date 2009
dc.date.accessioned 2017-09-07T07:07:30Z
dc.date.available 2017-09-07T07:07:30Z
dc.date.issued 2009
dc.identifier 10.1002/sec.128
dc.identifier.isbn
dc.identifier.issn 19390122
dc.identifier.uri http://hdl.handle.net/10938/11418
dc.description.abstract In the communication sector, the optimal objective is to equate quality and cost. The technologies that best serve these objectives are Wireless Access Technologies since they are easily deployed and capable of reaching and serving customers everywhere in a cost effective way. In this paper, we examine the communication options, and account for a country's geography to propose optimal WiMax planning keeping in mind the security concerns that are inherent in wireless communication. To perform WiMax radio network planning, we use a network simulation tool from ATDI called ICS Telecom. Our approach offers all users a minimum bandwidth of 1.4Mbps as well as a coverage that exceeds 90percent for all indoor users in the area under study. We optimize the network by iteratively minimizing the number of base stations required, and equivalently minimizing the cost, while maximizing the coverage for the subscribers. We also analyze the impact of security on the performance of WiMax. More specifically, we use well-known simulation software called Qualnet to simulate a WiMax environment under different security protocols and encryption scenarios. We then analyze the results to determine the impact of the added security features on the data rates between the base station(s) subscribers. The results of our proposed WiMax planning approach and the conducted security experiments showed that efficient deployment and coverage plans could be achieved for big cities as well as for rural areas. © 2009 John Wiley and Sons, Ltd.
dc.format.extent
dc.format.extent Pages: (401-412)
dc.language English
dc.publisher CHICHESTER
dc.relation.ispartof Publication Name: Security and Communication Networks; Publication Year: 2009; Volume: 2; no. 5; special issue SI; Pages: (401-412);
dc.relation.ispartofseries
dc.relation.uri
dc.source Scopus
dc.subject.other
dc.title Optimal WiMax planning with security considerations
dc.type Article
dc.contributor.affiliation El-Hajj, W., College of Information Technology, UAE University, 17551 Al Ain, United Arab Emirates
dc.contributor.affiliation Hajj, H.M., Department Electrical and Computer Engineering, American University of Beirut, Beirut, 1107-2020, Lebanon
dc.contributor.affiliation Barka, E., College of Information Technology, UAE University, 17551 Al Ain, United Arab Emirates
dc.contributor.affiliation Dawy, Z., Department Electrical and Computer Engineering, American University of Beirut, Beirut, 1107-2020, Lebanon
dc.contributor.affiliation Hmaissy, O.E., Department Electrical and Computer Engineering, American University of Beirut, Beirut, 1107-2020, Lebanon
dc.contributor.affiliation Ghaddar, D., Department Electrical and Computer Engineering, American University of Beirut, Beirut, 1107-2020, Lebanon
dc.contributor.affiliation Aitour, Y., Department Electrical and Computer Engineering, American University of Beirut, Beirut, 1107-2020, Lebanon
dc.contributor.authorAddress El-Hajj, W.; College of Information Technology, UAE University, 17551 Al Ain, United Arab Emirates; email: welhajj@uaeu.ac.ae
dc.contributor.authorCorporate University: American University of Beirut; Faculty: Faculty of Engineering and Architecture; Department: Electrical and Computer Engineering;
dc.contributor.authorDepartment Electrical and Computer Engineering
dc.contributor.authorDivision
dc.contributor.authorEmail welhajj@uaeu.ac.ae
dc.contributor.faculty Faculty of Engineering and Architecture
dc.contributor.authorInitials El-Hajj, W
dc.contributor.authorInitials Hajj, HM
dc.contributor.authorInitials Barka, E
dc.contributor.authorInitials Dawy, Z
dc.contributor.authorInitials El Hmaissy, O
dc.contributor.authorInitials Ghaddar, D
dc.contributor.authorInitials Aitour, Y
dc.contributor.authorOrcidID
dc.contributor.authorReprintAddress El-Hajj, W (reprint author), UAE Univ, Coll Informat Technol, Al Ain 17551, U Arab Emirates.
dc.contributor.authorResearcherID
dc.contributor.authorUniversity American University of Beirut
dc.description.cited AHMED Y, 2006, WIMAX BROADBAND WIRE; CROZIER E, 2004, WIMAXS TECHNOLOGY LO; Grenier E., 2005, SIGNAL PROPAGATION M; HOYMANN C, 2007, IEEE MOB WIMAX S ORL; HOYMANN C, 2007, 13 EUR WIR C EN TECH; IMPERATORE P, 2006, PATH LOSS MEASUREMEN; LUIZ J, 2008, KEY FACTORS IEEE 802; Theodoros T., 2007, WIR COMM NETW C 2007, P1948; VELEZ FJ, 2006, WIRELESS PERVASIVE C; 2007, PRACTICAL GUIDE WIMA; 2005, IEEE80216E 16; 2004, IEEE80216 16; 2007, PLANNING TOOL IMPROV; 2006, BASE STATION OPTIMIZ
dc.description.citedCount
dc.description.citedTotWOSCount 0
dc.description.citedWOSCount 0
dc.format.extentCount 12
dc.identifier.articleNo
dc.identifier.coden
dc.identifier.pubmedID
dc.identifier.scopusID 70350218645
dc.identifier.url
dc.publisher.address THE ATRIUM, SOUTHERN GATE, CHICHESTER PO19 8SQ, W SUSSEX, ENGLAND
dc.relation.ispartofConference
dc.relation.ispartofConferenceCode
dc.relation.ispartofConferenceDate
dc.relation.ispartofConferenceHosting
dc.relation.ispartofConferenceLoc
dc.relation.ispartofConferenceSponsor
dc.relation.ispartofConferenceTitle
dc.relation.ispartofFundingAgency
dc.relation.ispartOfISOAbbr Secur. Commun. Netw.
dc.relation.ispartOfIssue 5
dc.relation.ispartOfPart
dc.relation.ispartofPubTitle Security and Communication Networks
dc.relation.ispartofPubTitleAbbr Secur. Commun. Networks
dc.relation.ispartOfSpecialIssue SI
dc.relation.ispartOfSuppl
dc.relation.ispartOfVolume 2
dc.source.ID WOS:000274441800004
dc.type.publication Journal
dc.subject.otherAuthKeyword ICS telecom
dc.subject.otherAuthKeyword IPSec
dc.subject.otherAuthKeyword Qualnet
dc.subject.otherAuthKeyword WiMax planning
dc.subject.otherAuthKeyword WiMax security
dc.subject.otherChemCAS
dc.subject.otherIndex Cost effective
dc.subject.otherIndex Coverage plan
dc.subject.otherIndex Data rates
dc.subject.otherIndex ICS telecom
dc.subject.otherIndex IPSec
dc.subject.otherIndex Network simulation tools
dc.subject.otherIndex Qualnet
dc.subject.otherIndex Radio network planning
dc.subject.otherIndex Security considerations
dc.subject.otherIndex Security features
dc.subject.otherIndex Security protocols
dc.subject.otherIndex Simulation software
dc.subject.otherIndex TeleCOM
dc.subject.otherIndex Wireless access technology
dc.subject.otherIndex Wireless communications
dc.subject.otherIndex Base stations
dc.subject.otherIndex Computer simulation
dc.subject.otherIndex Computer software
dc.subject.otherIndex Cryptography
dc.subject.otherIndex Intelligent control
dc.subject.otherIndex Interoperability
dc.subject.otherIndex Network security
dc.subject.otherIndex Optimization
dc.subject.otherIndex Rural areas
dc.subject.otherIndex Telecommunication
dc.subject.otherIndex Telecommunication systems
dc.subject.otherIndex Wimax
dc.subject.otherIndex Wireless networks
dc.subject.otherIndex Network protocols
dc.subject.otherKeywordPlus
dc.subject.otherWOS Computer Science, Information Systems
dc.subject.otherWOS Telecommunications


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search AUB ScholarWorks


Browse

My Account