By Topic

Two Different Schemes of Authentication in IEEE 802.16j Multi-Hop Relay Network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Yang Fan ; Sch. of Inf. & Safety Eng., Zhongnan Univ. of Econ. & Law, Wuhan, China ; Qian Yali

IEEE 802.16j Multihop relay network is an important research topic, because it can effectively extend coverage. There are some issues requiring deeply thinking in the multihop relay network. One of the major issues is hop-by-hop authentication of relay nodes. Another issue is the selection of centralized or distributed security architecture. In this paper, we study the two schemes for authentication in multihop relay network in order to explicitly make a choice which security architecture can better achieve our goal.

Published in:

Wireless Communications, Networking and Mobile Computing (WiCOM), 2012 8th International Conference on

Date of Conference:

21-23 Sept. 2012