2014
DOI: 10.5121/ijcsa.2014.4508
|View full text |Cite
|
Sign up to set email alerts
|

A Countermeasure For Flooding Attack In Mobile Wimax Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…-IP Connectivity Stages: After completing this step, the MS utilizes DHCP to obtain an IP address [14]. After Registration is complete, a connection for the service flow is created.…”
Section: A-architecture Of the Initial Network Entrymentioning
confidence: 99%
See 1 more Smart Citation
“…-IP Connectivity Stages: After completing this step, the MS utilizes DHCP to obtain an IP address [14]. After Registration is complete, a connection for the service flow is created.…”
Section: A-architecture Of the Initial Network Entrymentioning
confidence: 99%
“…-The fundamental reason for the security sub layer is to verify the authenticity of users, authorize the legitimate user and offer encryption support for the key transfer and data traffic. Two main protocols of security sub-layer exist: the PKM protocol, used for secure key exchanged between the BS and the MS, and Encapsulation Protocol, used for ciphering operations of the data in the networks [14].…”
Section: Introductionmentioning
confidence: 99%
“…The simulation experiments of the proposed HHOA-NLOS-LS are conducted using EstiNet 8.1 network simulator in order to investigate its predominance over the benchmarked schemes used for comparison. [27][28][29][30][31][32][33] The network simulator EstiNet 8.1 is used for simulating the proposed HHOA-NLOS-LS, since it is the world-renowned tool that is a commercial version of the NCTUns network simulator and acts as an emulator. EstiNet simulator facilitates vital capabilities that include realistic distance based vehicle movement and optimally enhanced IEEE 802.11p/1609 VANET network simulation of the road for VANET.…”
Section: Computational Complexitymentioning
confidence: 99%