Introduction - If you have any usage issues, please Google them yourself
The article in accordance with the characteristics of WiMAX, a detailed analysis of the 802.16d and 802.16e common security policy, information on the IMS Application of WiMAX, especially VoIP security issues, and described in WiMAX end-to-end security strategy, and finally pointed out that the current there is insufficient security strategy direction and improving.