메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Secure mutual authentication protocols for mobile multi-hop relay WiMAX networks against Rogue base/relay stations

Author keywords

authentication; IEEE 802.16j; mobile multi hop relay network; rogue base station relay station

Indexed keywords

AUTHENTICATION PROTOCOLS; AUTHENTICATION SERVERS; DATA RATES; DISTRIBUTED AUTHENTICATION; IEEE 802.16J; LOW COSTS; MULTI-HOP RELAY; MULTI-HOP RELAY NETWORKS; MUTUAL AUTHENTICATION; RELAY STATIONS; ROGUE BASE STATION/RELAY STATION; WIMAX NETWORKS; WIRELESS COMMUNICATIONS;

EID: 80052178487     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icc.2011.5963292     Document Type: Conference Paper
Times cited : (12)

References (15)
  • 2
    • 34248582477 scopus 로고    scopus 로고
    • Rogue-Base Station Detection in WiMax/802.16 Wireless Access Networks
    • November-December
    • M. Barbeau and J.-M. Robert, "Rogue-Base Station Detection in WiMax/802.16 Wireless Access Networks," Annals of Telecommunications, Vol. 61, No. 11-12, November-December 2006, pp. 1300-1313.
    • (2006) Annals of Telecommunications , vol.61 , Issue.11-12 , pp. 1300-1313
    • Barbeau, M.1    Robert, J.-M.2
  • 9
    • 80052174554 scopus 로고    scopus 로고
    • Anonymous and Authenticated Routing in Multi-hop Cellular Networks
    • Nov.
    • M. E. Mahmoud and X. Shen, "Anonymous and Authenticated Routing in Multi-hop Cellular Networks," IEEE ICC'09, Nov. 2009.
    • (2009) IEEE ICC'09
    • Mahmoud, M.E.1    Shen, X.2
  • 10
    • 85008031242 scopus 로고    scopus 로고
    • The future of WiMAX: Multihop relaying with IEEE 802.16j
    • Jan.
    • S. W. Peter and R. W. Heath, "The future of WiMAX: Multihop relaying with IEEE 802.16j" in IEEE Communications Magazine, vol. 47, pp. 104-111, Jan. 2009.
    • (2009) IEEE Communications Magazine , vol.47 , pp. 104-111
    • Peter, S.W.1    Heath, R.W.2
  • 15
    • 3543056512 scopus 로고    scopus 로고
    • An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks
    • May
    • S. Zhu et al., "An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," Proc. of IEEE Symposium on Security and Privacy, pp 259-271, May 2004.
    • (2004) Proc. of IEEE Symposium on Security and Privacy , pp. 259-271
    • Zhu, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.