Selected Topics in WiMAX 2013
DOI: 10.5772/56154
|View full text |Cite
|
Sign up to set email alerts
|

Key Management in Mobile WiMAX Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…First, the MS sends the (PKM-REQ) with his: X.509 certificate, a depiction of the supported cryptographic algorithms. Then the BS approves the identity of the MS, decides the encryption algorithm used, and sends an authentication response (PKM-RSP) that contains the (AK) key material to enable the encryption of data [11].…”
Section: A-architecture Of the Initial Network Entrymentioning
confidence: 99%
See 1 more Smart Citation
“…First, the MS sends the (PKM-REQ) with his: X.509 certificate, a depiction of the supported cryptographic algorithms. Then the BS approves the identity of the MS, decides the encryption algorithm used, and sends an authentication response (PKM-RSP) that contains the (AK) key material to enable the encryption of data [11].…”
Section: A-architecture Of the Initial Network Entrymentioning
confidence: 99%
“…It supports Time Division Multiplexing (TDM) and Frequency Division Duplexing (FDD) [10]. Second, the MAC layer is subdivided into three sub-layers: -The service specific Convergence Sub-layer, it receives packets from higher layers and then performs a set of functions [11]:…”
Section: Introductionmentioning
confidence: 99%