Computer Science ›› 2015, Vol. 42 ›› Issue (2): 46-49.doi: 10.11896/j.issn.1002-137X.2015.02.010

Previous Articles     Next Articles

Performance Analysis of Time-delay of Hybrid Authentication in Mobile Multihop Relay Networks

LU Wei-feng, YU Ke-yuan and CHEN Si-guang   

  • Online:2018-11-14 Published:2018-11-14

Abstract: This paper firstly analyzed the existing two authentication schemes,the centralized authentication scheme and the distributed authentication scheme before a new relay node accessing into the MMR WiMAX Network.Secondly a new hybrid authentication scheme was proposed based on the two existing authentication schemes.Then we used the queuing theory to analyze time-delay of the centralized and hybrid authentication scheme under different relay nodes distribution.Finally the results of numerical analysis show that the hybrid authentication scheme has great advantage in the performance of authentication time-delay compared with the centralized authentication scheme.

Key words: Worldwide interoperability for microwave access,Mobile multi-hop relays network,Hybrid authentication scheme,Time-delay

[1] Daan P,Bart L,Ingrid M,et al.The History of WiMAX:AComplete Survey of the Evolution in Certification and Standardization for IEEE 802.16 and WiMAX[J].IEEE Communications Surveys & Tutorials,2012,4(4):1183-1211
[2] Steven W S,Robert W H.The Future of WiMAX:Multihop Relaying with IEEE 802.16j[J].IEEE Standards in Communication and networking,2009,47(1):104-111
[3] 吴乾.WiMAX无线网络安全接入技术分析[J].技术研发,2013(20):61-70
[4] Perumalraja R,Lung C-H,Anand S.Design of Distributed Security Architecture for Multihop WiMAX Networks[C]∥2010 Eighth Annual International Conference on Privacy Security and Trust.Ottawa,Canada,2010:54-61
[5] LAN/MAN Standards Committee of the IEEE Computer Society,IEEE Microwave Theory and Techniques Society.IEEE Standard for Local and metropolitan area networks Part 16:Air Interface for Broadband Wireless Access Systems Amendment 1:Multihop Relay Specification[S].New York,the Institute of Electrical and Electronics Engineers,2009
[6] Dai Xin-min,Xie Xiao-yao.Analysis and Research of Security Mechanism in IEEE 802.16j [C]∥2010 International Conference on Anti-Counterfeiting Security and Identification in Communication.Chengdu,China,2010:33-36 (下转第54页)(上接第49页)
[7] Yang Fan,Qian Ya-li.Two Different Schemes of Authentication in IEEE802.16j Multi-hop Relay Network[C]∥2012 8th International Conference on Wireless Communications,Networking and Mobile Computing.Shanghai,China,2012:1-4
[8] Huang Jie,Huang Chin-Tser.Secure Mutual AuthenticationProtocols for Mobile Multi-hop Relay Wimax Networks against Rogue Base/Relay Stations[C]∥2011 IEEE International Conference on Communications.Kyoto,Japan,2011:1-5
[9] 郎为民,刘波.WiMAX技术原理与应用 [M].北京:机械工业出版社,2008
[10] Anju B,Ramesh P,Chaurasia B K.Traffic Analysis for WiMAX [C]∥2013 5th International Conference on Computational Intelligence and Communication Networks.Mathura,India,2013:138-140
[11] Stuart J.WiMAX Subscriber and Mobile Station Authentication Challenges [J].IEEE communications Magazine,2011,49(11):166-172
[12] Sun Hung-min,Chang Shih-Ying,Lin Yue-Hsun,et al.Efficient Authentication Schemes for Handover in Mobile WiMax [C]∥Eighth International Conference on Intelligent Systems Design and Applications.Kaohsiung,Taiwan,2008,3:235-240
[13] Kleinrock L.Queueing Systems volume 1 [M].New York:A Wiley-Interscience Publication,1975:126-137

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!