Edith Cowan University
In this paper, the authors investigate the risks and vulnerabilities associated to the security of the WiMAX/802.16 broadband wireless technology. One of the other aspects of this paper will be to review all the associated weaknesses to the Medium Access Control (MAC) layer and at the PHYsical (PHY) layer. The risks and impacts are assessed according to a systematic approach. The approach or methodology is used is according to the European Telecommunication Standards Institute (ETSI). These threats are enumerated and classified accordingly to their risk levels.