Optimal WiMax planning with security considerations

Wassim El-Hajj, Hazem M. Hajj, Ezedin Barka, Zaher Dawy, Omar El Hmaissy, Dima Ghaddar, Youssef Aitour

Research output: Contribution to journalArticlepeer-review


In the communication sector, the optimal objective is to equate quality and cost. The technologies that best serve these objectives are Wireless Access Technologies since they are easily deployed and capable of reaching and serving customers everywhere in a cost effective way. In this paper, we examine the communication options, and account for a country's geography to propose optimal WiMax planning keeping in mind the security concerns that are inherent in wireless communication. To perform WiMax radio network planning, we use a network simulation tool from ATDI called ICS Telecom. Our approach offers all users a minimum bandwidth of 1.4Mbps as well as a coverage that exceeds 90% for all indoor users in the area under study. We optimize the network by iteratively minimizing the number of base stations required, and equivalently minimizing the cost, while maximizing the coverage for the subscribers. We also analyze the impact of security on the performance of WiMax. More specifically, we use well-known simulation software called Qualnet to simulate a WiMax environment under different security protocols and encryption scenarios. We then analyze the results to determine the impact of the added security features on the data rates between the base station(s) subscribers. The results of our proposed WiMax planning approach and the conducted security experiments showed that efficient deployment and coverage plans could be achieved for big cities as well as for rural areas.

Original languageEnglish
Pages (from-to)401-412
Number of pages12
JournalSecurity and Communication Networks
Issue number5
Publication statusPublished - 2009


  • ICS telecom
  • IPSec
  • Qualnet
  • WiMax planning
  • WiMax security

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications


Dive into the research topics of 'Optimal WiMax planning with security considerations'. Together they form a unique fingerprint.

Cite this