top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
From problem toward solution [[electronic resource] ] : wireless sensor networks security / / Zhen Jiang and Yi Pan, editors
From problem toward solution [[electronic resource] ] : wireless sensor networks security / / Zhen Jiang and Yi Pan, editors
Pubbl/distr/stampa New York, : Nova Science Publishers, c2009
Descrizione fisica 1 online resource (398 p.)
Disciplina 681/.25
Altri autori (Persone) JiangZhen
PanYi <1960->
Collana Distributed, cluster and grid computing
Soggetto topico Sensor networks - Security measures
Wireless LANs - Security measures
Wireless metropolitan area networks - Security measures
Ad hoc networks (Computer networks) - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-61209-732-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910465694603321
New York, : Nova Science Publishers, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
From problem toward solution [[electronic resource] ] : wireless sensor networks security / / Zhen Jiang and Yi Pan, editors
From problem toward solution [[electronic resource] ] : wireless sensor networks security / / Zhen Jiang and Yi Pan, editors
Pubbl/distr/stampa New York, : Nova Science Publishers, c2009
Descrizione fisica 1 online resource (398 p.)
Disciplina 681/.25
Altri autori (Persone) JiangZhen
PanYi <1960->
Collana Distributed, cluster and grid computing
Soggetto topico Sensor networks - Security measures
Wireless LANs - Security measures
Wireless metropolitan area networks - Security measures
Ad hoc networks (Computer networks) - Security measures
ISBN 1-61209-732-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910791821503321
New York, : Nova Science Publishers, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
From problem toward solution : wireless sensor networks security / / Zhen Jiang and Yi Pan, editors
From problem toward solution : wireless sensor networks security / / Zhen Jiang and Yi Pan, editors
Edizione [1st ed.]
Pubbl/distr/stampa New York, : Nova Science Publishers, c2009
Descrizione fisica 1 online resource (398 p.)
Disciplina 681/.25
Altri autori (Persone) JiangZhen
PanYi <1960->
Collana Distributed, cluster and grid computing
Soggetto topico Sensor networks - Security measures
Wireless LANs - Security measures
Wireless metropolitan area networks - Security measures
Ad hoc networks (Computer networks) - Security measures
ISBN 1-61209-732-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- FROM PROBLEM TOWARD SOLUTION:WIRELESS SENSOR NETWORKSSECURITY -- Distributed, Cluster and Grid Computing -- FROM PROBLEM TOWARD SOLUTION:WIRELESS SENSOR NETWORKSSECURITY -- CONTENTS -- PREFACE -- PART 1.ATTACKS AND COUNTERMEASURES -- PRESERVING DATA AUTHENTICITY IN WIRELESSSENSOR NETWORKS: ATTACKS ANDCOUNTERMEASURES -- Abstract -- 1. Introduction -- 2. Models and Approaches -- 2.1. System Model -- 2.2. Threat Model -- 2.3. Solution Approaches -- 3. Passive Approaches -- 3.1. Secure Report Generation -- 3.2. Filtering with Uniform Key Sharing -- 3.3. Filtering with Route-specific Key Sharing -- 3.3.1. Interleaved Hop-by-hop Authentication -- 3.3.2. Other Solutions with Route-specific Key Sharing -- 3.4. Filtering with Location-based Key Sharing -- 3.4.1. Location-Based Resilient Security -- 3.4.2. Location-aware End-to-End Data Security -- 4. Proactive Approaches -- 4.1. Group Re-keying -- 4.2. Packet Traceback -- 4.3. Correlation among Data Content -- 4.3.1. Correlation Analysis and Modified t-test -- 5. Conclusion -- References -- LOCATION TRACKING ATTACK IN AD HOCNETWORKS BASED ON TOPOLOGY INFORMATION -- Abstract -- 1. Introduction -- 2. RelatedWork -- 3. Localization Using Geometric Constraints -- 3.1. Constraint Solving Definitions -- 3.2. The Localization Algorithm -- 3.2.1. Phase 1-Deterministic Constraint Solving -- 3.2.2. Phase 2-Constraint Relaxation and Heuristic Improvements -- 3.3. Experimental Results -- 4. Localization Using DSR Protocol Information -- 4.1. Dynamic Source Routing -- 4.2. Scenario and Assumptions -- 4.3. Localization Approach -- 4.3.1. "Hop to Route Length Ratio" (HL) Heuristics -- 4.3.2. Derivation of Node Distribution along the Route from the HL Metric -- 4.3.3. Probability Based Position Estimation -- 4.4. Analysis -- 5. Conclusion -- Acknowledgement -- References.
PREVENTION OF DOS ATTACK IN SENSORNETWORKS USING REPEATED GAME THEORY -- Abstract -- 1. Introduction -- 2. RelatedWork -- 3. Game Formulation of the Proposed Protocol -- 3.1. Equilibrium -- 3.2. Payoff and Reputation -- 3.3. Protocol Description -- 4. Performance Evaluation -- 4.1. Metrics -- 4.2. Implementation -- References -- IMPACT OF PACKET INJECTION MODELSON MISBEHAVIOR DETECTION PERFORMANCEIN WIRELESS SENSOR NETWORKS -- Abstract -- 1. Introduction -- 1.1. Wireless Ad-Hoc Networks and the Concept of Misbehavior -- 1.2. Overview on Misbehavior in Wireless Ad-Hoc Networks -- 1.3. Intrusion Detection Systems - Detecting Misbehavior -- 1.4. Human Immune System - Inspiration for AIS -- 1.4.1. Adaptive Immune System -- 1.4.2. Innate Immune System -- 1.5. Translating Features of the HIS to AIS -- 2. Packet Injection Experiment - Problem Statement -- 2.1. Experimental Setup -- 2.2. Scenario Description -- 2.3. Network Topology -- 2.4. Node Misbehavior -- 2.5. Artificial Immune System - Details -- 3. Packet Injection Experiment - Results -- 4. AIS in Ad-Hoc Networks - RelatedWork -- 5. Conclusions and FutureWork -- Acknowledgments -- References -- PART 2.SECURED ROUTING AND LOCALIZATION -- SECURITY AWARE ROUTING IN HIERARCHICALOPTICAL SENSOR NETWORKS -- Abstract -- 1. Introduction -- 1.1. Motivation for Directional Optical Sensor Networks and Challenges -- 2. RelatedWork -- 3. Cluster-Based Directional Sensor Networks -- 3.1. Assumptions and Security Threat Model -- 4. The Security-Aware Base Station Circuit-Based Routing forCluster-based DOSN -- 4.1. Secure Neighborhood Discovery Protocol -- 5. Security Analysis -- 5.1. Per Hop Authentication and Alteration of Routing Beacons -- 5.2. Broadcast Authentication and Spoofed Routing Beacons -- 5.3. Beacon Freshness -- 6. Conclusion -- References -- SECURE MULTI-PATH DATA DELIVERY IN SENSORNETWORKS.
Abstract -- 1. Introduction -- 2. System Models -- 2.1. Network Model -- 2.2. Attack Model -- 3. Node-disjoint Multi-path Encoding/Decoding -- 3.1. Multi-path Source Routing Encoding -- 3.2. Multi-path Data Encoding -- 3.3. Multi-path Data Decoding -- 3.4. Communication Overhead -- 4. Path Selection -- 4.1. v(≥ 3)-node-disjoint Shortest Paths -- 4.2. Path Rating Algorithm -- 4.3. Path Selection Algorithm -- 5. Robustness Analysis -- 5.1. General Evaluation Formulas -- 5.2. Uniform Block Allocation and Uniform Success Probability Distribution -- 5.3. Evaluate Success Probability for Multi-path Routing -- 6. Conclusion -- Appendices -- A. Encoding of Reed-Solomon Codes -- B. Decoding of Reed-Solomon Codes -- C. Proof of (21) -- References -- SELOC: SECURE LOCALIZATION FOR WIRELESSSENSOR AND ACTOR NETWORK -- Abstract -- 1. Introduction -- 2. RelatedWork -- 3. Network Model -- 3.1. Attack Models -- 3.2. Features of Secure Localization -- 4. SeLoc Secure Scheme -- 4.1. Brief Review of SeLoc Scheme -- 4.2. SeLoc Scheme -- 4.3. Location Verification -- 5. Security Analysis -- 5.1. Robustness -- 5.2. Sensitivity of SeLoc Scheme -- 6. Conclusion -- References -- PART 3.CRYPTOGRAPHY AND ENCRYPTION -- SECURITY IN WIRELESS SENSOR NETWORKS:A FORMAL APPROACH∗ -- Abstract -- 1. Introduction -- 2. Model Checking for the Analysis of Security Protocols -- 3. Sensor Network Encryption Protocol: SNEP -- 4. Verification of SNEP -- 5. RelatedWork -- Security Network Protocols -- Simulators of Sensor Networks -- Analysis with Model Checking Techniques -- 6. Conclusion -- References -- C4W: AN ENERGY EFFICIENT PUBLIC KEYCRYPTOSYSTEM FOR LARGE-SCALE WIRELESSSENSOR NETWORKS -- Abstract -- 1. Introduction -- 1.1. Related Work -- 1.2. Contributions -- 2. Combined Public Key Scheme for Wireless Sensor Networks -- 2.1. Basic Scheme -- 2.2. Security-Enhanced Scheme (SES).
2.3. Protocol -- 3. Analysis -- 3.1. Security -- 3.2. Energy -- 4. Conclusion -- References -- ENERGY CONSUMPTION OF SECURITY ALGORITHMSIN WIRELESS SENSOR NODES -- Abstract -- 1. Introduction -- 2. Cryptographic Algorithms for WSN Nodes -- 2.1. New Method for Reorganization of Cryptographic Algorithms -- 2.2. Related Work -- 2.3. Verification of Results -- 3. Measurement of Energy Consumption for Security -- 3.1. Tradeoff between Security and Energy Consumption -- 3.2. Related Work -- 3.3. Measurement Techniques -- 3.4. Energy Consumption without Security -- 3.4.1. Measurements for CrossBow Nodes -- 3.4.2. Measurements for Ember Nodes -- 3.5. Energy Consumption for Security -- 3.5.1. Energy Consumption for Security in CrossBow Nodes -- 3.5.2. Energy Consumption for Security in Ember Nodes -- 3.5.3. Comparisons of CrossBow & -- Ember Nodes -- 4. Assessment of Life-Time Energy Consumption -- 4.1. Life Time Energy Consumption -- 4.2. Energy Measurements and Profile Analyzer -- 4.2.1. Operational Circuit -- 4.2.2. Measurement Record Program -- 4.2.3. E-Analyzer: Energy Profile Analyzer -- 4.3. Case Study: Security Algorithms in CrossBow MICA2 Nodes -- 5. Guidelines to Apply Security into WSN -- 6. Conclusions -- References -- PART 4.KEY PRE-DISTRIBUTION AND REVOCATION -- DETERMINISTIC AND RANDOMIZED KEYPRE-DISTRIBUTION SCHEMES FOR MOBILEAD-HOC NETWORKS: FOUNDATIONS ANDEXAMPLE CONSTRUCTIONS∗ -- Abstract -- 1. Introduction -- 2. General Considerations for Key Management Schemes -- 3. Techniques -- 3.1. Random Graph Based -- 4. Set System Based -- 4.0.1. Constrained Intersection Matrices -- 4.0.2. The BBR Polynomials -- 5. RandomWalk Based -- 5.1. Approximating the Evolution of Stochastic Processes -- 5.2. Gradual Increase of the Bit-Correlation -- 5.3. The General k-place Elimination Protocol -- 5.4. Assessment of the Elimination Protocol.
6. Probabilistic Technique Based -- 7. Conclusions -- References -- ARPD: ASYNCHRONOUS RANDOM KEYPREDISTRIBUTION IN THE LEAP FRAMEWORKFOR WIRELESS SENSOR NETWORKS -- Abstract -- 1. Introduction -- 2. RelatedWork -- 2.1. Pairwise Key Establishment in LEAP -- 2.1.1. LEAP Security -- 2.2. Random Pairwise Key Predistribution -- 3. ARPD for Node Additions -- 4. Performance Analysis -- 4.1. Section Notation and Assumptions -- 4.2. Probability of Connectivity -- 4.2.1. Key Reuse -- 4.2.2. Choice of Reuse Factor -- 5. Security Analysis -- 5.1. A Security Threat Model for WSNs -- 5.2. Outside Attacks -- 5.3. Inside Attacks -- 6. Conclusions -- References -- SECURE k-CONNECTIVITY PROPERTIESOF WIRELESS SENSOR NETWORKS -- Abstract -- 1. Introduction -- 2. The Reference Model -- 3. k-Connectivity of Kryptographs -- 3.1. Survivor Function Pr{connectivity ≥ k} -- 3.2. Expected Connectivity -- 4. Simulation Results -- 5. RelatedWork -- 6. Conclusion -- References -- GATEWAY SUBSET DIFFERENCE REVOCATION -- Abstract -- 1. Introduction -- 2. Subset Difference Revocation -- 3. Gateway Subset Difference Revocation -- 4. Evaluation -- 4.1. Security -- 4.2. Memory -- 4.3. Processing Load -- 5. Related Work -- 6. Conclusion -- References -- PART 5.KEY EXCHANGE AND ACCESS CONTROL -- AUTHENTICATED KEY EXCHANGE WITH GROUPSUPPORT FOR WIRELESS SENSOR NETWORKS -- Abstract -- 1. Introduction -- 1.1. Node-Compromise Attacker Model -- 1.2. Secure Link Communication -- 1.2.1. Random Key Pre-distribution -- 1.2.2. Pairwise Key Pre-distribution -- 1.3. Seed-Based Pre-distribution -- 1.3.1. Selective Node Capture Attack -- 1.3.2. Hypercube Pre-distribution -- 2. Group Supported Key Exchange -- 2.1. Authenticated Key Exchange with Group Support -- 2.2. Probabilistic Authentication -- 2.2.1. Probabilistic Authentication with Majority Decision.
2.3. Evaluation of the Communication and Computation Overhead.
Record Nr. UNINA-9910815886303321
New York, : Nova Science Publishers, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
WiMAX security and quality of service : an end-to-end perspective / / edited by Seok-Yee Tang, Peter Mèuller, and Hamid R. Sharif
WiMAX security and quality of service : an end-to-end perspective / / edited by Seok-Yee Tang, Peter Mèuller, and Hamid R. Sharif
Pubbl/distr/stampa Chichester, West Sussex, U.K. ; , : Wiley, , c2010
Descrizione fisica 1 online resource (425 p.)
Disciplina 621.382/1
Altri autori (Persone) TangSeok-Yee <1968->
MüllerPeter <1961 July 8->
SharifHamid R <1958-> (Hamid Reza)
Soggetto topico Wireless metropolitan area networks - Security measures
IEEE 802.16 (Standard)
ISBN 1-119-95620-X
1-282-69145-7
9786612691454
0-470-66574-2
0-470-66575-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Preface xv -- Acknowledgement xix -- List of Contributors xxi -- List of Acronyms xxv -- List of Figures xxxv -- List of Tables xxxix -- Part A Introduction 1 -- 1 Overview of End-to-End WiMAX Network Architecture 3 / Dr Mohuya Chakraborty and Dr Debika Bhattacharyya -- 1.1 Introduction 3 -- 1.2 Wireless Primer 4 -- 1.2.1 Wireless Network Topologies 4 -- 1.2.2 Wireless Technologies 4 -- 1.2.3 Performance Parameters of Wireless Networks 5 -- 1.2.4 WiFi and WiMAX 6 -- 1.3 Introduction to WiMAX Technology 6 -- 1.3.1 Operational Principles 7 -- 1.3.2 WiMAX Speed and Range 8 -- 1.3.3 Spectrum 9 -- 1.3.4 Limitations 10 -- 1.3.5 Need for WiMAX 10 -- 1.4 Mobile WiMAX 10 -- 1.4.1 Overview of Mobile WiMAX 10 -- 1.4.2 Handover Process in Mobile WiMAX 11 -- 1.4.3 LTE vs. Mobile WiMAX 12 -- 1.5 Overview of End-to-End WiMAX Network Architecture 12 -- 1.6 Radio Interface Specifications for WiMAX 16 -- 1.6.1 Overview 16 -- 1.6.2 802.16e-2005 Technology 17 -- 1.6.3 Applications 19 -- 1.6.4 WiMAX Simulation Tools 19 -- 1.7 Interoperability Issues in WiMAX 19 -- 1.8 Summary 21 -- References 22 -- Part B Security 23 -- 2 WiMAX Security Defined in 802.16 Standards 25 / Slim Rekhis and Noureddine Boudriga -- 2.1 Introduction 25 -- 2.2 Overview of 802.16 WMAN Networks 26 -- 2.2.1 IEEE 802.16 Standards and Connectivity Modes 26 -- 2.2.2 Network Architecture 28 -- 2.2.3 Protocol Architecture 31 -- 2.2.4 Network Entry Procedure 32 -- 2.3 Security Requirements for Broadband Access in WMAN Networks 33 -- 2.4 Security Mechanisms in Initial 802.16 Networks 35 -- 2.4.1 Security Associations 35 -- 2.4.2 Use of Certificates 37 -- 2.4.3 PKM Protocol 38 -- 2.4.4 PKM Authorization 38 -- 2.4.5 Privacy and Key Management 41 -- 2.4.6 Data Encryption 42 -- 2.5 Analysis of Security Weaknesses in Initial Versions of 802.16 42 -- 2.5.1 Physical-Level Based Attacks 43 -- 2.5.2 Attacks on Authentication 44 -- 2.5.3 Attacks on Key Management 45 -- 2.5.4 Attacks on Privacy 47 -- 2.5.5 Attacks on Availability 47.
2.6 Security Amendments in Recent Versions if IEEE 802.16 48 -- 2.6.1 Authorization, Mutual Authentication and Access Control 48 -- 2.6.2 TEK Three-Way Handshake 50 -- 2.6.3 Encryption and Key Hierarchy 51 -- 2.6.4 Multicast and Broadcast Service (MBS) 52 -- 2.6.5 Security of Handover Schemes 53 -- 2.7 Analysis of Security Weaknesses in 802.16e 54 -- 2.7.1 Attacks on Authorization 54 -- 2.7.2 Analysis of SA-TEK Three-Way Handshake 56 -- 2.7.3 Vulnerability to Denial of Service Attacks 56 -- 2.7.4 Broadcasting and Multicasting Related Weaknesses 58 -- 2.7.5 Weaknesses in Handover Schemes 59 -- 2.8 Further Reading 59 -- 2.9 Summary 60 -- References 60 -- 3 Key Management in 802.16e 63 / Georgios Kambourakis and Stefanos Gritzalis -- 3.1 Introduction 63 -- 3.2 Privacy Key Management Protocol 64 -- 3.3 PKM Version 1 65 -- 3.4 PKM Version 2 67 -- 3.4.1 Security Negotiation 68 -- 3.4.2 Authentication/Authorization 68 -- 3.4.3 Key Derivation and Hierarchy 70 -- 3.4.4 Three-Way Handshake 72 -- 3.4.5 Key Delivery 74 -- 3.5 Vulnerabilities and Countermeasures 75 -- 3.5.1 Authorization 76 -- 3.5.2 Key Derivation 76 -- 3.5.3 Three-Way Handshake 77 -- 3.5.4 Key Delivery 77 -- 3.5.5 Attacks on Confidentiality 78 -- 3.5.6 MBS Attacks 79 -- 3.5.7 Mesh Mode Considerations 80 -- 3.5.8 Handovers 81 -- 3.6 Comparisons with 802.11/UMTS 81 -- 3.7 Summary 84 -- References 85 -- 4 WiMAX Network Security 87 / Luca Adamo, Romano Fantacci and Leonardo Maccari -- 4.1 Introduction 87 -- 4.2 WiMAX Network Reference Model 88 -- 4.2.1 Functional Entities 89 -- 4.2.2 Logical Domains 90 -- 4.2.3 Reference Points 90 -- 4.2.4 ASN Profiles 91 -- 4.3 The RADIUS Server 92 -- 4.3.1 Authentication in WiMAX Infrastructure 93 -- 4.4 WiMAX Networking Procedures and Security 95 -- 4.4.1 Handover Procedure 95 -- 4.4.2 DHCP 97 -- 4.4.3 Security Issues 98 -- 4.4.4 Mobile IP Protocol 99 -- 4.4.5 PMIP 100 -- 4.4.6 PMIP Security Considerations 101 -- 4.4.7 CMIP 102 -- 4.4.8 CMIP Security Considerations 103 -- 4.4.9 QoS 104.
4.4.10 A Complete Authentication Procedure 104 -- 4.5 Further Reading 105 -- 4.6 Summary 106 -- References 107 -- Part C Quality of Service 109 -- 5 Cross-Layer End-to-End QoS Architecture: The Milestone of WiMAX 111 / Floriano De Rango, Andrea Malfitano and Salvatore Marano -- 5.1 Introduction 111 -- 5.2 QoS Definitions 112 -- 5.3 QoS Mechanisms Offered by IEEE 802.16 112 -- 5.3.1 Cross-Layer QoS Architecture 113 -- 5.3.2 MAC Layer Point of View 115 -- 5.3.3 Offering QoS in PMP Mode 117 -- 5.3.4 QoS Introduction in Mesh Mode 121 -- 5.3.5 QoS Application on Packet by Packet Basis 123 -- 5.3.6 PHY Layer Point of View 124 -- 5.3.7 ACM: Adaptive Coding and Modulation 125 -- 5.3.8 Mobility Support in IEEE 802.16 126 -- 5.4 What is Missing in the WiMAX Features? 128 -- 5.4.1 Absences in the MAC Layer 128 -- 5.4.2 Scheduling Algorithm 129 -- 5.4.3 Call Admission Control Algorithm 132 -- 5.4.4 PHY Layer Improvements 133 -- 5.4.5 QoS Based ACM Algorithm 133 -- 5.5 Future Challenges 134 -- 5.5.1 End-to-End QoS in the IP World 134 -- 5.5.2 New Ways to Resolve the WiMAX QoS Problem: Two Interesting Examples 136 -- 5.5.3 Game Theory in the WiMAX Scenario 136 -- 5.5.4 Fuzzy Logic: What Idea to Guarantee QoS? 138 -- 5.5.5 Designing Mobility / Mesh WiMAX 140 -- 5.5.6 How to Extend QoS Mechanisms 140 -- 5.6 Summary 141 -- References 141 -- 6 QoS in Mobile WiMAX 145 / Neila Krichene and Noureddine Boudriga -- 6.1 Introduction 145 -- 6.2 Architectural QoS Requirements 146 -- 6.2.1 QoS-Related Challenges 146 -- 6.2.2 Architectural Requirements 148 -- 6.3 Mobile WiMAX Service Flows 149 -- 6.3.1 Service Flows 150 -- 6.3.2 Scheduling Services Supporting Service Flows 151 -- 6.3.3 QoS Parameters 153 -- 6.4 Admission Control 154 -- 6.4.1 MAC Layer Connections 154 -- 6.4.2 Bandwidth Request Procedures 156 -- 6.4.3 Bandwidth Allocation Procedures 158 -- 6.5 Scheduling Service 160 -- 6.5.1 Scheduling Architecture in Mobile WiMAX 160 -- 6.5.2 Packet Schedulers Overview 162 -- 6.6 Maintaining QoS During Handover 165.
6.6.1 WiMAX Handover Schemes 165 -- 6.6.2 Optimizing Handover to Maintain the Required QoS 168 -- 6.7 Enhancing WiMAX QoS Issues: Research Work 170 -- 6.7.1 New QoS Mechanisms 171 -- 6.7.2 The WEIRD Project 171 -- 6.7.3 WiFi and WiMAX QoS Integration 173 -- 6.8 Further Reading 175 -- 6.9 Summary 176 -- References 176 -- 7 Mobility Management in WiMAX Networks 179 / Ikbal Chammakhi Msadaa, Daniel Cˆamara and Fethi Filali -- 7.1 Mobile WiMAX Architecture 180 -- 7.2 Horizontal Handover in 802.16e 183 -- 7.2.1 Network Topology Acquisition 183 -- 7.2.2 Handover Process 186 -- 7.2.3 Fast BS Switching (FBSS) and Macro Diversity Handover (MDHO) 187 / / Discussion 188 -- 7.3 Optimized 802.16e Handover Schemes 188 -- 7.3.1 L2 Handover Schemes 190 -- 7.3.2 L2-L3 Cross-Layer Handover Schemes 190 -- 7.3.3 Mobile IPv6 Fast Handovers Over IEEE 802.16e Networks 191 -- Discussion 195 -- 7.4 Vertical Handover 195 -- 7.4.1 Vertical Handover Mechanisms Involving 802.16e Networks 196 -- 7.4.2 IEEE 802.21, Media-Independent Handover Services 197 -- Discussion 200 -- 7.5 Roaming 200 -- 7.5.1 WiMAX Roaming Interface 203 -- 7.5.2 The Roaming Process 203 -- 7.6 Mobility Management in WiMESH Networks 204 -- 7.7 Conclusion 207 -- 7.8 Summary 207 -- References 208 -- Part D Advanced Topics 211 -- 8 QoS Challenges in the Handover Process 213 / Marina Aguado, Eduardo Jacob, Marion Berbineau and Ivan Lledo Samper -- 8.1 Introduction 213 -- 8.2 Handover in WiMAX 214 -- 8.3 The IEEE802.16 Handover Process 215 -- 8.3.1 The Network Entry Procedure 215 -- 8.3.2 Network Topology Advertising and Acquisition 218 -- 8.3.3 The Association Procedure 220 -- 8.3.4 Handover Stages in the IEEE 802.16 Standard 221 -- 8.3.5 Handover Execution Methods 225 -- 8.4 The Media Independent Handover Initiative / IEEE 802.21 227 -- 8.4.1 MIH Interactions with Layer 2 and Layer 3 Protocols 229 -- 8.4.2 MIH Scope and Limitations 229 -- 8.5 Enhancing the Handover Process 230 -- 8.5.1 Fast Ranging Mechanism 230 -- 8.5.2 Seamless Handover Mechanism 231.
8.5.3 Initiatives in the Cell Reselection Stage 232 -- 8.5.4 Initiatives in the Execution Stage 232 -- 8.6 Handover Scheduling 233 -- 8.7 Handover Performance Analysis 234 -- 8.8 Summary 238 -- References 238 -- 9 Resource Allocation in Mobile WiMAX Networks 241 / Tara Ali Yahiya -- 9.1 Introduction 241 -- 9.2 Background on IEEE 802.16e 242 -- 9.2.1 The Medium Access Control Layer / MAC 242 -- 9.2.2 The Physical Layer / PHY 243 -- 9.3 System Model 248 -- 9.4 OFDMA Key Principles / Analysis and Performance Characterizations 249 -- 9.4.1 Multiuser Diversity 249 -- 9.4.2 Adaptive Modulation and Coding / Burst Profiles 250 -- 9.4.3 Capacity Analysis / Time and Frequency Domain 250 -- 9.4.4 Mapping Messages 252 -- 9.5 Cross-Layer Resource Allocation in Mobile WiMAX 252 -- 9.6 Channel Aware Class Based Queue (CACBQ) / The Proposed Solution 253 -- 9.6.1 System Model 253 -- 9.6.2 Channel Aware Class Based Queue (CACBQ) Framework 255 -- 9.7 Summary and Conclusion 257 -- References 258 -- 10 QoS Issues and Challenges in WiMAX and WiMAX MMR Networks 261 / Kiran Kumari, Srinath Narasimha and Krishna M. Sivalingam -- 10.1 Introduction 261 -- 10.1.1 Motivation 262 -- 10.2 Multimedia Traffic 263 -- 10.2.1 Voice Codecs 264 -- 10.2.2 Video Codecs 265 -- 10.2.3 QoS Specifications 267 -- 10.2.4 QoS Effectiveness Measures 268 -- 10.3 Multimedia: WiFi versus WiMAX 269 -- 10.3.1 Limitations of Wireless LAN Technologies 269 -- 10.3.2 WiMAX MAC Layer 270 -- 10.3.3 QoS Architecture for WiMAX 272 -- 10.4 QoS Scheduling in WiMAX Networks 273 -- 10.4.1 Max-Min Weighted Fair Allocation 274 -- 10.4.2 Deficit Fair Priority Queue 274 -- 10.4.3 Weighted Fair Queuing 275 -- 10.4.4 Weighted Fair Priority Queuing 275 -- 10.5 Voice Traffic Scheduling in WiMAX 276 -- 10.5.1 Lee's Algorithm 276 -- 10.5.2 UGS with Activity Detection Scheduling (UGS-AD) 277 -- 10.5.3 Extended-rtPS Scheduling 277 -- 10.5.4 Multi-Tap Scheduling 278 -- 10.6 Video Traffic Scheduling in WiMAX 279 -- 10.6.1 Opportunistic Scheduling 279.
10.6.2 Opportunistic DRR 281 -- 10.6.3 Summary 282 -- 10.7 Introduction to WiMAX MMR Networks 282 -- 10.7.1 How WiMAX MMR Networks Work 284 -- 10.7.2 Performance Impact 286 -- 10.7.3 Radio Resource Management Strategies 287 -- 10.8 Scheduling in WiMAX MMR Networks 288 -- 10.8.1 Objectives of Scheduling 288 -- 10.8.2 Constraints on Scheduling 289 -- 10.8.3 Diversity Gains 290 -- 10.9 Basic Wireless Scheduling Algorithms 290 -- 10.9.1 Round Robin Scheduling 290 -- 10.9.2 Max-SINR Scheduling 291 -- 10.9.3 Extension for Multi-Hop Case 291 -- 10.9.4 Proportional Fair Scheduling 292 -- 10.9.5 Extension for Multi-Hop Case 292 -- 10.9.6 Performance Comparison 293 -- 10.9.7 The PFMR Scheduling Algorithm 293 -- 10.10 Scheduling Algorithms for WiMAX MMR Networks 294 -- 10.10.1 The Scheduling Problem 294 -- 10.10.2 The GenArgMax Scheduling Algorithm 295 -- 10.10.3 The TreeTraversingScheduler Algorithm 297 -- 10.10.4 The FastHeuristic16j Scheduling Algorithm 299 -- 10.10.5 Improved Hop-Specific Scheduling Algorithms 300 -- 10.10.6 Performance Evaluation 302 -- 10.11 Further Reading 304 -- 10.12 Summary 305 -- References 305 -- 11 On the Integration of WiFi and WiMAX Networks 309 / Tara Ali Yahiya and Hakima Chaouchi -- 11.1 Introduction 309 -- 11.2 General Design Principles of the Interworking Architecture 310 -- 11.2.1 Functional Decomposition 310 -- 11.2.2 Deployment Modularity and Flexibility 310 -- 11.2.3 Support for Variety of Usage Models 311 -- 11.2.4 Extensive use of IETF Protocols 311 -- 11.3 WiFi/Mobile WiMAX Interworking Architecture 311 -- 11.4 Network Discovery and Selection 313 -- 11.5 Authentication and Security Architecture 314 -- 11.5.1 General Network Access Control Architecture 314 -- 11.5.2 EAP and PANA 316 -- 11.5.3 RADIUS and Diameter 317 -- 11.6 Security in WiFi and WiMAX Networks 318 -- 11.6.1 Security in WiFi 318 -- 11.6.2 Security in WiMAX 319 -- 11.6.3 Security Consideration in WiFi-WiMAX 320 -- 11.6.4 WiFi-WiMAX Interworking Scenarios 321 -- 11.7 Mobility Management 324.
11.7.1 Handover Support 325 -- 11.7.2 Cell Selection 325 -- 11.7.3 IP for Mobility Management 326 -- 11.7.4 Session Initiation Protocol for Mobility Management 326 -- 11.7.5 Identity Based Mobility 328 -- 11.8 Quality of Service Architecture 330 -- 11.8.1 End-to-End QoS Interworking Framework 330 -- 11.8.2 QoS Considerations 332 -- 11.9 Summary 335 -- References 335 -- 12 QoS Simulation and An Enhanced Solution of Cell Selection for WiMAX Network 337 / Xinbing Wang, Shen Gu, Yuan Wu and Jiajing Wang -- 12.1 Introduction 337 -- 12.2 WiMAX Simulation Tools / Overview 338 -- 12.2.1 NS2 338 -- 12.2.2 OPNet Modeler 338 -- 12.2.3 QualNet 339 -- 12.3 QoS Simulation of WiMAX Network 339 -- 12.3.1 Performance Comparison Between Different Services 339 -- 12.3.2 Mobility Support 344 -- 12.4 Analysis of QoS Simulation Results 353 -- 12.4.1 Fixed SSs 353 -- 12.4.2 Mobile SSs with Same Speed 356 -- 12.4.3 Mobile SSs with Varying Speed 356 -- 12.5 Enhancement / A New Solution of Cell Selection 356 -- 12.5.1 System Model 356 -- 12.5.2 Simulation Result 360 -- 12.6 Summary 363 -- References 363 -- Appendix List of Standards 365 -- Index 371.
Record Nr. UNINA-9910139188303321
Chichester, West Sussex, U.K. ; , : Wiley, , c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
WiMAX security and quality of service : an end-to-end perspective / / edited by Seok-Yee Tang, Peter Muller, and Hamid Sharif
WiMAX security and quality of service : an end-to-end perspective / / edited by Seok-Yee Tang, Peter Muller, and Hamid Sharif
Edizione [1st ed.]
Pubbl/distr/stampa Chichester, West Sussex, U.K. ; ; Hoboken, NJ, : Wiley, c2010
Descrizione fisica 1 online resource (425 p.)
Disciplina 621.382/1
Altri autori (Persone) TangSeok-Yee <1968->
MullerPeter <1961 July 8->
SharifHamid R <1958-> (Hamid Reza)
Soggetto topico Wireless metropolitan area networks - Security measures
IEEE 802.16 (Standard)
ISBN 1-119-95620-X
1-282-69145-7
9786612691454
0-470-66574-2
0-470-66575-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Preface xv -- Acknowledgement xix -- List of Contributors xxi -- List of Acronyms xxv -- List of Figures xxxv -- List of Tables xxxix -- Part A Introduction 1 -- 1 Overview of End-to-End WiMAX Network Architecture 3 / Dr Mohuya Chakraborty and Dr Debika Bhattacharyya -- 1.1 Introduction 3 -- 1.2 Wireless Primer 4 -- 1.2.1 Wireless Network Topologies 4 -- 1.2.2 Wireless Technologies 4 -- 1.2.3 Performance Parameters of Wireless Networks 5 -- 1.2.4 WiFi and WiMAX 6 -- 1.3 Introduction to WiMAX Technology 6 -- 1.3.1 Operational Principles 7 -- 1.3.2 WiMAX Speed and Range 8 -- 1.3.3 Spectrum 9 -- 1.3.4 Limitations 10 -- 1.3.5 Need for WiMAX 10 -- 1.4 Mobile WiMAX 10 -- 1.4.1 Overview of Mobile WiMAX 10 -- 1.4.2 Handover Process in Mobile WiMAX 11 -- 1.4.3 LTE vs. Mobile WiMAX 12 -- 1.5 Overview of End-to-End WiMAX Network Architecture 12 -- 1.6 Radio Interface Specifications for WiMAX 16 -- 1.6.1 Overview 16 -- 1.6.2 802.16e-2005 Technology 17 -- 1.6.3 Applications 19 -- 1.6.4 WiMAX Simulation Tools 19 -- 1.7 Interoperability Issues in WiMAX 19 -- 1.8 Summary 21 -- References 22 -- Part B Security 23 -- 2 WiMAX Security Defined in 802.16 Standards 25 / Slim Rekhis and Noureddine Boudriga -- 2.1 Introduction 25 -- 2.2 Overview of 802.16 WMAN Networks 26 -- 2.2.1 IEEE 802.16 Standards and Connectivity Modes 26 -- 2.2.2 Network Architecture 28 -- 2.2.3 Protocol Architecture 31 -- 2.2.4 Network Entry Procedure 32 -- 2.3 Security Requirements for Broadband Access in WMAN Networks 33 -- 2.4 Security Mechanisms in Initial 802.16 Networks 35 -- 2.4.1 Security Associations 35 -- 2.4.2 Use of Certificates 37 -- 2.4.3 PKM Protocol 38 -- 2.4.4 PKM Authorization 38 -- 2.4.5 Privacy and Key Management 41 -- 2.4.6 Data Encryption 42 -- 2.5 Analysis of Security Weaknesses in Initial Versions of 802.16 42 -- 2.5.1 Physical-Level Based Attacks 43 -- 2.5.2 Attacks on Authentication 44 -- 2.5.3 Attacks on Key Management 45 -- 2.5.4 Attacks on Privacy 47 -- 2.5.5 Attacks on Availability 47.
2.6 Security Amendments in Recent Versions if IEEE 802.16 48 -- 2.6.1 Authorization, Mutual Authentication and Access Control 48 -- 2.6.2 TEK Three-Way Handshake 50 -- 2.6.3 Encryption and Key Hierarchy 51 -- 2.6.4 Multicast and Broadcast Service (MBS) 52 -- 2.6.5 Security of Handover Schemes 53 -- 2.7 Analysis of Security Weaknesses in 802.16e 54 -- 2.7.1 Attacks on Authorization 54 -- 2.7.2 Analysis of SA-TEK Three-Way Handshake 56 -- 2.7.3 Vulnerability to Denial of Service Attacks 56 -- 2.7.4 Broadcasting and Multicasting Related Weaknesses 58 -- 2.7.5 Weaknesses in Handover Schemes 59 -- 2.8 Further Reading 59 -- 2.9 Summary 60 -- References 60 -- 3 Key Management in 802.16e 63 / Georgios Kambourakis and Stefanos Gritzalis -- 3.1 Introduction 63 -- 3.2 Privacy Key Management Protocol 64 -- 3.3 PKM Version 1 65 -- 3.4 PKM Version 2 67 -- 3.4.1 Security Negotiation 68 -- 3.4.2 Authentication/Authorization 68 -- 3.4.3 Key Derivation and Hierarchy 70 -- 3.4.4 Three-Way Handshake 72 -- 3.4.5 Key Delivery 74 -- 3.5 Vulnerabilities and Countermeasures 75 -- 3.5.1 Authorization 76 -- 3.5.2 Key Derivation 76 -- 3.5.3 Three-Way Handshake 77 -- 3.5.4 Key Delivery 77 -- 3.5.5 Attacks on Confidentiality 78 -- 3.5.6 MBS Attacks 79 -- 3.5.7 Mesh Mode Considerations 80 -- 3.5.8 Handovers 81 -- 3.6 Comparisons with 802.11/UMTS 81 -- 3.7 Summary 84 -- References 85 -- 4 WiMAX Network Security 87 / Luca Adamo, Romano Fantacci and Leonardo Maccari -- 4.1 Introduction 87 -- 4.2 WiMAX Network Reference Model 88 -- 4.2.1 Functional Entities 89 -- 4.2.2 Logical Domains 90 -- 4.2.3 Reference Points 90 -- 4.2.4 ASN Profiles 91 -- 4.3 The RADIUS Server 92 -- 4.3.1 Authentication in WiMAX Infrastructure 93 -- 4.4 WiMAX Networking Procedures and Security 95 -- 4.4.1 Handover Procedure 95 -- 4.4.2 DHCP 97 -- 4.4.3 Security Issues 98 -- 4.4.4 Mobile IP Protocol 99 -- 4.4.5 PMIP 100 -- 4.4.6 PMIP Security Considerations 101 -- 4.4.7 CMIP 102 -- 4.4.8 CMIP Security Considerations 103 -- 4.4.9 QoS 104.
4.4.10 A Complete Authentication Procedure 104 -- 4.5 Further Reading 105 -- 4.6 Summary 106 -- References 107 -- Part C Quality of Service 109 -- 5 Cross-Layer End-to-End QoS Architecture: The Milestone of WiMAX 111 / Floriano De Rango, Andrea Malfitano and Salvatore Marano -- 5.1 Introduction 111 -- 5.2 QoS Definitions 112 -- 5.3 QoS Mechanisms Offered by IEEE 802.16 112 -- 5.3.1 Cross-Layer QoS Architecture 113 -- 5.3.2 MAC Layer Point of View 115 -- 5.3.3 Offering QoS in PMP Mode 117 -- 5.3.4 QoS Introduction in Mesh Mode 121 -- 5.3.5 QoS Application on Packet by Packet Basis 123 -- 5.3.6 PHY Layer Point of View 124 -- 5.3.7 ACM: Adaptive Coding and Modulation 125 -- 5.3.8 Mobility Support in IEEE 802.16 126 -- 5.4 What is Missing in the WiMAX Features? 128 -- 5.4.1 Absences in the MAC Layer 128 -- 5.4.2 Scheduling Algorithm 129 -- 5.4.3 Call Admission Control Algorithm 132 -- 5.4.4 PHY Layer Improvements 133 -- 5.4.5 QoS Based ACM Algorithm 133 -- 5.5 Future Challenges 134 -- 5.5.1 End-to-End QoS in the IP World 134 -- 5.5.2 New Ways to Resolve the WiMAX QoS Problem: Two Interesting Examples 136 -- 5.5.3 Game Theory in the WiMAX Scenario 136 -- 5.5.4 Fuzzy Logic: What Idea to Guarantee QoS? 138 -- 5.5.5 Designing Mobility / Mesh WiMAX 140 -- 5.5.6 How to Extend QoS Mechanisms 140 -- 5.6 Summary 141 -- References 141 -- 6 QoS in Mobile WiMAX 145 / Neila Krichene and Noureddine Boudriga -- 6.1 Introduction 145 -- 6.2 Architectural QoS Requirements 146 -- 6.2.1 QoS-Related Challenges 146 -- 6.2.2 Architectural Requirements 148 -- 6.3 Mobile WiMAX Service Flows 149 -- 6.3.1 Service Flows 150 -- 6.3.2 Scheduling Services Supporting Service Flows 151 -- 6.3.3 QoS Parameters 153 -- 6.4 Admission Control 154 -- 6.4.1 MAC Layer Connections 154 -- 6.4.2 Bandwidth Request Procedures 156 -- 6.4.3 Bandwidth Allocation Procedures 158 -- 6.5 Scheduling Service 160 -- 6.5.1 Scheduling Architecture in Mobile WiMAX 160 -- 6.5.2 Packet Schedulers Overview 162 -- 6.6 Maintaining QoS During Handover 165.
6.6.1 WiMAX Handover Schemes 165 -- 6.6.2 Optimizing Handover to Maintain the Required QoS 168 -- 6.7 Enhancing WiMAX QoS Issues: Research Work 170 -- 6.7.1 New QoS Mechanisms 171 -- 6.7.2 The WEIRD Project 171 -- 6.7.3 WiFi and WiMAX QoS Integration 173 -- 6.8 Further Reading 175 -- 6.9 Summary 176 -- References 176 -- 7 Mobility Management in WiMAX Networks 179 / Ikbal Chammakhi Msadaa, Daniel Cˆamara and Fethi Filali -- 7.1 Mobile WiMAX Architecture 180 -- 7.2 Horizontal Handover in 802.16e 183 -- 7.2.1 Network Topology Acquisition 183 -- 7.2.2 Handover Process 186 -- 7.2.3 Fast BS Switching (FBSS) and Macro Diversity Handover (MDHO) 187 / / Discussion 188 -- 7.3 Optimized 802.16e Handover Schemes 188 -- 7.3.1 L2 Handover Schemes 190 -- 7.3.2 L2-L3 Cross-Layer Handover Schemes 190 -- 7.3.3 Mobile IPv6 Fast Handovers Over IEEE 802.16e Networks 191 -- Discussion 195 -- 7.4 Vertical Handover 195 -- 7.4.1 Vertical Handover Mechanisms Involving 802.16e Networks 196 -- 7.4.2 IEEE 802.21, Media-Independent Handover Services 197 -- Discussion 200 -- 7.5 Roaming 200 -- 7.5.1 WiMAX Roaming Interface 203 -- 7.5.2 The Roaming Process 203 -- 7.6 Mobility Management in WiMESH Networks 204 -- 7.7 Conclusion 207 -- 7.8 Summary 207 -- References 208 -- Part D Advanced Topics 211 -- 8 QoS Challenges in the Handover Process 213 / Marina Aguado, Eduardo Jacob, Marion Berbineau and Ivan Lledo Samper -- 8.1 Introduction 213 -- 8.2 Handover in WiMAX 214 -- 8.3 The IEEE802.16 Handover Process 215 -- 8.3.1 The Network Entry Procedure 215 -- 8.3.2 Network Topology Advertising and Acquisition 218 -- 8.3.3 The Association Procedure 220 -- 8.3.4 Handover Stages in the IEEE 802.16 Standard 221 -- 8.3.5 Handover Execution Methods 225 -- 8.4 The Media Independent Handover Initiative / IEEE 802.21 227 -- 8.4.1 MIH Interactions with Layer 2 and Layer 3 Protocols 229 -- 8.4.2 MIH Scope and Limitations 229 -- 8.5 Enhancing the Handover Process 230 -- 8.5.1 Fast Ranging Mechanism 230 -- 8.5.2 Seamless Handover Mechanism 231.
8.5.3 Initiatives in the Cell Reselection Stage 232 -- 8.5.4 Initiatives in the Execution Stage 232 -- 8.6 Handover Scheduling 233 -- 8.7 Handover Performance Analysis 234 -- 8.8 Summary 238 -- References 238 -- 9 Resource Allocation in Mobile WiMAX Networks 241 / Tara Ali Yahiya -- 9.1 Introduction 241 -- 9.2 Background on IEEE 802.16e 242 -- 9.2.1 The Medium Access Control Layer / MAC 242 -- 9.2.2 The Physical Layer / PHY 243 -- 9.3 System Model 248 -- 9.4 OFDMA Key Principles / Analysis and Performance Characterizations 249 -- 9.4.1 Multiuser Diversity 249 -- 9.4.2 Adaptive Modulation and Coding / Burst Profiles 250 -- 9.4.3 Capacity Analysis / Time and Frequency Domain 250 -- 9.4.4 Mapping Messages 252 -- 9.5 Cross-Layer Resource Allocation in Mobile WiMAX 252 -- 9.6 Channel Aware Class Based Queue (CACBQ) / The Proposed Solution 253 -- 9.6.1 System Model 253 -- 9.6.2 Channel Aware Class Based Queue (CACBQ) Framework 255 -- 9.7 Summary and Conclusion 257 -- References 258 -- 10 QoS Issues and Challenges in WiMAX and WiMAX MMR Networks 261 / Kiran Kumari, Srinath Narasimha and Krishna M. Sivalingam -- 10.1 Introduction 261 -- 10.1.1 Motivation 262 -- 10.2 Multimedia Traffic 263 -- 10.2.1 Voice Codecs 264 -- 10.2.2 Video Codecs 265 -- 10.2.3 QoS Specifications 267 -- 10.2.4 QoS Effectiveness Measures 268 -- 10.3 Multimedia: WiFi versus WiMAX 269 -- 10.3.1 Limitations of Wireless LAN Technologies 269 -- 10.3.2 WiMAX MAC Layer 270 -- 10.3.3 QoS Architecture for WiMAX 272 -- 10.4 QoS Scheduling in WiMAX Networks 273 -- 10.4.1 Max-Min Weighted Fair Allocation 274 -- 10.4.2 Deficit Fair Priority Queue 274 -- 10.4.3 Weighted Fair Queuing 275 -- 10.4.4 Weighted Fair Priority Queuing 275 -- 10.5 Voice Traffic Scheduling in WiMAX 276 -- 10.5.1 Lee's Algorithm 276 -- 10.5.2 UGS with Activity Detection Scheduling (UGS-AD) 277 -- 10.5.3 Extended-rtPS Scheduling 277 -- 10.5.4 Multi-Tap Scheduling 278 -- 10.6 Video Traffic Scheduling in WiMAX 279 -- 10.6.1 Opportunistic Scheduling 279.
10.6.2 Opportunistic DRR 281 -- 10.6.3 Summary 282 -- 10.7 Introduction to WiMAX MMR Networks 282 -- 10.7.1 How WiMAX MMR Networks Work 284 -- 10.7.2 Performance Impact 286 -- 10.7.3 Radio Resource Management Strategies 287 -- 10.8 Scheduling in WiMAX MMR Networks 288 -- 10.8.1 Objectives of Scheduling 288 -- 10.8.2 Constraints on Scheduling 289 -- 10.8.3 Diversity Gains 290 -- 10.9 Basic Wireless Scheduling Algorithms 290 -- 10.9.1 Round Robin Scheduling 290 -- 10.9.2 Max-SINR Scheduling 291 -- 10.9.3 Extension for Multi-Hop Case 291 -- 10.9.4 Proportional Fair Scheduling 292 -- 10.9.5 Extension for Multi-Hop Case 292 -- 10.9.6 Performance Comparison 293 -- 10.9.7 The PFMR Scheduling Algorithm 293 -- 10.10 Scheduling Algorithms for WiMAX MMR Networks 294 -- 10.10.1 The Scheduling Problem 294 -- 10.10.2 The GenArgMax Scheduling Algorithm 295 -- 10.10.3 The TreeTraversingScheduler Algorithm 297 -- 10.10.4 The FastHeuristic16j Scheduling Algorithm 299 -- 10.10.5 Improved Hop-Specific Scheduling Algorithms 300 -- 10.10.6 Performance Evaluation 302 -- 10.11 Further Reading 304 -- 10.12 Summary 305 -- References 305 -- 11 On the Integration of WiFi and WiMAX Networks 309 / Tara Ali Yahiya and Hakima Chaouchi -- 11.1 Introduction 309 -- 11.2 General Design Principles of the Interworking Architecture 310 -- 11.2.1 Functional Decomposition 310 -- 11.2.2 Deployment Modularity and Flexibility 310 -- 11.2.3 Support for Variety of Usage Models 311 -- 11.2.4 Extensive use of IETF Protocols 311 -- 11.3 WiFi/Mobile WiMAX Interworking Architecture 311 -- 11.4 Network Discovery and Selection 313 -- 11.5 Authentication and Security Architecture 314 -- 11.5.1 General Network Access Control Architecture 314 -- 11.5.2 EAP and PANA 316 -- 11.5.3 RADIUS and Diameter 317 -- 11.6 Security in WiFi and WiMAX Networks 318 -- 11.6.1 Security in WiFi 318 -- 11.6.2 Security in WiMAX 319 -- 11.6.3 Security Consideration in WiFi-WiMAX 320 -- 11.6.4 WiFi-WiMAX Interworking Scenarios 321 -- 11.7 Mobility Management 324.
11.7.1 Handover Support 325 -- 11.7.2 Cell Selection 325 -- 11.7.3 IP for Mobility Management 326 -- 11.7.4 Session Initiation Protocol for Mobility Management 326 -- 11.7.5 Identity Based Mobility 328 -- 11.8 Quality of Service Architecture 330 -- 11.8.1 End-to-End QoS Interworking Framework 330 -- 11.8.2 QoS Considerations 332 -- 11.9 Summary 335 -- References 335 -- 12 QoS Simulation and An Enhanced Solution of Cell Selection for WiMAX Network 337 / Xinbing Wang, Shen Gu, Yuan Wu and Jiajing Wang -- 12.1 Introduction 337 -- 12.2 WiMAX Simulation Tools / Overview 338 -- 12.2.1 NS2 338 -- 12.2.2 OPNet Modeler 338 -- 12.2.3 QualNet 339 -- 12.3 QoS Simulation of WiMAX Network 339 -- 12.3.1 Performance Comparison Between Different Services 339 -- 12.3.2 Mobility Support 344 -- 12.4 Analysis of QoS Simulation Results 353 -- 12.4.1 Fixed SSs 353 -- 12.4.2 Mobile SSs with Same Speed 356 -- 12.4.3 Mobile SSs with Varying Speed 356 -- 12.5 Enhancement / A New Solution of Cell Selection 356 -- 12.5.1 System Model 356 -- 12.5.2 Simulation Result 360 -- 12.6 Summary 363 -- References 363 -- Appendix List of Standards 365 -- Index 371.
Record Nr. UNINA-9910816251003321
Chichester, West Sussex, U.K. ; ; Hoboken, NJ, : Wiley, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui