QoS-aware distributed security architecture for 4G multihop wireless networks

P Rengaraju, CH Lung… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Vehicular communications have received a great deal of attention in recent years due to the
demand for multimedia applications during travel and for improvements in safety. Safety …

[PDF][PDF] A security architecture for WiMAX networks

S Hussain, MN Khan, M Ibrahim - International Journal of Computer …, 2012 - Citeseer
Wimax is one of the fast growing technologies in the world as compare to other wireless
networks. IEEE has defined standard IEEE 802.16 for Wimax. Wimax growing rapidly due to …

Measuring and analyzing WiMAX security and QoS in testbed experiments

P Rengaraju, CH Lung… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Providing strong security is necessary for any wireless access networks. The latest
broadband access network implementations are based on WiMAX and LTE, since they …

[PDF][PDF] The Significance of WiMax on Resource Sharing among Saudi Universities: A Study of King Khalid University, Kingdom of Saudi Arabia

SQY Al-Khalidi - International Journal of Information and Education …, 2015 - ijiet.org
Microwave Access is a new technology designed for sharing all kinds of data over long
distances using wireless communication. It can be used to cover an area of a few square …

Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks

AS Khan, N Fisal, M Esa, S Kamilah… - Security for …, 2014 - api.taylorfrancis.com
The IEEE 802.16 standard intends to provide broadband wireless access (BWA) for
metropolitan area networks (MAN), and the last mile of the BWA is designed as a substitute …

Securing the IEEE 802.16 OFDM WiMAX PHYSICAL AND MAC Layer Using STBC Coding and Encryption

S Erskine, Z Wu - arXiv preprint arXiv:1309.5069, 2013 - arxiv.org
This work proposes model design in securing the IEEE 802.16 WiMAX Physical and MAC
layer, using Orthogonal Frequency Division Multiplexing (OFDM) and STBC model …

Optimization of unstable multihop wireless communication networks with digital forensics

R Uda, K Naito, M Ehara - 2013 World Congress on …, 2013 - ieeexplore.ieee.org
Multihop wireless network is in the minority among popular networks which are open to the
public, although they have been often researched and proposed. One of the reasons lies in …

A self-adaptive K selection mechanism for re-authentication load balancing in large-scale systems

Fanyang, N Xiong, JH Park - The Journal of Supercomputing, 2012 - Springer
Since the 802.16 e standard has been released, there are few authentication pattern
schemes and Extensible Authentication Protocol (EAP) selection proposals for …

Security infrastructure in open wireless sensor and cellular mobility architectures

AM Nejad, SM Shobeiri - 2012 - IET
An integrated security mechanism is one of the significant challenges in the open wireless
network infrastructure because of the diversity of the wireless networks in OMI (Open …

[引用][C] 移动多跳中继网络中的混合式认证延时性能分析

鲁蔚锋, 於科远, 陈思光 - 计算机科学, 2015