2016
DOI: 10.1002/sec.1701
|View full text |Cite
|
Sign up to set email alerts
|

Shortest and secure routing protocol for multi‐hop cellular networks (SSRP‐MCN)

Abstract: Nowadays, many advanced are developed and become available for users. So, the demand for a higher data rate wireless access significantly increases. For that reason, new cellular wireless networks have been introduced such as Worldwide Interoperability for Microwave Access (WiMAX), Long Term Evolution (LTE) and LTE-advanced. However, the centralized topology of these technologies requires that the users have a direct connection to the Base Station (BS). Such topology suffers from congestion problem when a larg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Furthermore, a secure routing protocol is presented for the multi-hop networks. The protocol is based on the concept of Weil Paring [88]. The secure routing enables a better communication and service management via traffic flow and optimized use of resources.…”
Section: Secure Routing In 5gmentioning
confidence: 99%
“…Furthermore, a secure routing protocol is presented for the multi-hop networks. The protocol is based on the concept of Weil Paring [88]. The secure routing enables a better communication and service management via traffic flow and optimized use of resources.…”
Section: Secure Routing In 5gmentioning
confidence: 99%
“…The Third Generation Partnership Project (3GPP), introduced in release 14 of LTE, features addressing direct V2V communications . The main advantage of using LTE for V2V communications, as analyzed in Bazzi et al, is that the adopted technology is the same used for cellular communications . Therefore, the same hardware and protocols can be exploited.…”
Section: Introductionmentioning
confidence: 99%