DocumentCode :
3542676
Title :
Two Different Schemes of Authentication in IEEE 802.16j Multi-Hop Relay Network
Author :
Yang Fan ; Qian Yali
Author_Institution :
Sch. of Inf. & Safety Eng., Zhongnan Univ. of Econ. & Law, Wuhan, China
fYear :
2012
fDate :
21-23 Sept. 2012
Firstpage :
1
Lastpage :
4
Abstract :
IEEE 802.16j Multihop relay network is an important research topic, because it can effectively extend coverage. There are some issues requiring deeply thinking in the multihop relay network. One of the major issues is hop-by-hop authentication of relay nodes. Another issue is the selection of centralized or distributed security architecture. In this paper, we study the two schemes for authentication in multihop relay network in order to explicitly make a choice which security architecture can better achieve our goal.
Keywords :
WiMax; computer network security; message authentication; relay networks (telecommunication); IEEE 802.16j multihop relay network; WiMax; centralized security architecture; distributed security architecture; hop-by-hop authentication; network coverage; relay node; Authentication; Distance measurement; Downlink; IEEE 802.16 Standards; Relays; Spread spectrum communication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications, Networking and Mobile Computing (WiCOM), 2012 8th International Conference on
Conference_Location :
Shanghai
ISSN :
2161-9646
Print_ISBN :
978-1-61284-684-2
Type :
conf
DOI :
10.1109/WiCOM.2012.6478731
Filename :
6478731
Link To Document :
بازگشت