Title :
Two Different Schemes of Authentication in IEEE 802.16j Multi-Hop Relay Network
Author :
Yang Fan ; Qian Yali
Author_Institution :
Sch. of Inf. & Safety Eng., Zhongnan Univ. of Econ. & Law, Wuhan, China
Abstract :
IEEE 802.16j Multihop relay network is an important research topic, because it can effectively extend coverage. There are some issues requiring deeply thinking in the multihop relay network. One of the major issues is hop-by-hop authentication of relay nodes. Another issue is the selection of centralized or distributed security architecture. In this paper, we study the two schemes for authentication in multihop relay network in order to explicitly make a choice which security architecture can better achieve our goal.
Keywords :
WiMax; computer network security; message authentication; relay networks (telecommunication); IEEE 802.16j multihop relay network; WiMax; centralized security architecture; distributed security architecture; hop-by-hop authentication; network coverage; relay node; Authentication; Distance measurement; Downlink; IEEE 802.16 Standards; Relays; Spread spectrum communication;
Conference_Titel :
Wireless Communications, Networking and Mobile Computing (WiCOM), 2012 8th International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-1-61284-684-2
DOI :
10.1109/WiCOM.2012.6478731