| The WiMAX security issues is taken into account in the beginning of the protocol stack design, but due to the complexity of wireless networks and the opening of transmission medium, security is one of the core issues to be resolved.In this paper, a detailed analysis of the key technologies used in WiMAX and IEEE802.16d protocol stack architecture were firstly made. Next, the security sub-layer of IEEE802.16d and shortcomings of protocol stack were pointed. At the base of detailed analysis of WiMAX Entry Procedure, a new WiMAX Call Admission Control and Compulsory-Certification were proposed. With a compact software structure, the Call Admission Control module take local database, only allowing the terminal, which was in the database, access WiMAX networks, achieve terminal access control function. The Compulsory-Certification module only certificate the terminal which have a capabilities of security, ensure the encryption transmission requirements of WiMAX Network. |