2011
DOI: 10.1007/978-3-642-18440-6_55
|View full text |Cite
|
Sign up to set email alerts
|

A Performance of Security Aspect in WiMAX Physical Layer with Different Modulation Schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2013
2013

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…2. [2] Figure 2. MAC Security Sub layer [2] BS1 and SS2 are WiMAX two major attributes which are supported with the following security features: [3]…”
Section: Wimax Security Solutionsmentioning
confidence: 99%
See 3 more Smart Citations
“…2. [2] Figure 2. MAC Security Sub layer [2] BS1 and SS2 are WiMAX two major attributes which are supported with the following security features: [3]…”
Section: Wimax Security Solutionsmentioning
confidence: 99%
“…[4] Figure 4. Authentication Based on EAP [2] Authentication based on RSA is of the third type of authentication which is supported by the security sublayer.Fig. 4 shows general structure of EAP-based authentication in WiMax.…”
Section: Authentication Of Device/usermentioning
confidence: 99%
See 2 more Smart Citations
“…Here three MAC layer Scheduling types are defined; UGS (Unsolicited Grant Service), rtPS (Real Time Polling Service) and BE (Best Effort) [9] In this network the Application Configuration node is defined by using Application Specifications type. Here we can see that only 3 applications are defined in Application Definition attributes, these applications are File Transfer (Light Load), Video Conferencing (Light Load) and Voice over IP Call (PCM Quality).…”
Section: Network Simulation Parametersmentioning
confidence: 99%