2011
DOI: 10.7840/kics.2011.36b.11.1305
|View full text |Cite
|
Sign up to set email alerts
|

BCC Based Mobile WIMAX Initial Network Entry with Improved Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…As internet develops, users are increasingly demanding a system(s) that can provide higher data transfer rate in a wireless environment. Therefore, to meet such demands in a wireless access network, the IEEE 802.16 Working Group has been newly established by the IEEE 802 LAN/MAN Standard Committee (LMSC), also known as IEEE Project 802, to standardize IEEE 802.16 series [9]. This technology is domestically referred as 'Wibro', or 'Mobile WIMAX' in overseas.…”
Section: Mobile Wimax(wibro)mentioning
confidence: 99%
“…As internet develops, users are increasingly demanding a system(s) that can provide higher data transfer rate in a wireless environment. Therefore, to meet such demands in a wireless access network, the IEEE 802.16 Working Group has been newly established by the IEEE 802 LAN/MAN Standard Committee (LMSC), also known as IEEE Project 802, to standardize IEEE 802.16 series [9]. This technology is domestically referred as 'Wibro', or 'Mobile WIMAX' in overseas.…”
Section: Mobile Wimax(wibro)mentioning
confidence: 99%
“…IEEE 802.16 protocol is mainly for WiMAX protocol to transfer the data through wirelessly which is part of physical and control layer in OSI model to use in point to point communication and it uses the mesh mode topology. Other than these two layers, there are another types of layer for the association of security to the data and for authorization and authentication purpose is discussed in [23,28]. For encoding of data, modulation of carrier signal and modulation of frequencies uses the physical layer than control layer.…”
Section: Introductionmentioning
confidence: 99%