计算机科学 ›› 2015, Vol. 42 ›› Issue (2): 46-49.doi: 10.11896/j.issn.1002-137X.2015.02.010

• 网络与通信 • 上一篇    下一篇

移动多跳中继网络中的混合式认证延时性能分析

鲁蔚锋,於科远,陈思光   

  1. 南京邮电大学计算机学院 南京210003;江苏省无线传感网高技术研究重点实验室 南京210003;宽带无线通信与传感网技术教育部重点实验室 南京210003,南京邮电大学计算机学院 南京210003;江苏省无线传感网高技术研究重点实验室 南京210003;宽带无线通信与传感网技术教育部重点实验室 南京210003,南京邮电大学物联网学院 南京210003;江苏省无线传感网高技术研究重点实验室 南京210003;宽带无线通信与传感网技术教育部重点实验室 南京210003
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金(61201160),江苏省自然科学基金(BK20131377),江苏省高校优秀中青年教师和校长境外研修计划资助

Performance Analysis of Time-delay of Hybrid Authentication in Mobile Multihop Relay Networks

LU Wei-feng, YU Ke-yuan and CHEN Si-guang   

  • Online:2018-11-14 Published:2018-11-14

摘要: 首先分析了在移动多跳中继(Mobile Multihop Relay,MMR)WiMAX网络中,新的移动中继(Relay Station,RS)节点在进入网络之前存在的两种认证方案:集中式和分布式接入认证方案。接着在这两种接入认证方式的基础上,提出了一种新的混合式认证方案。然后使用排队论对集中式和混合式认证方案在不同中继节点分布下的认证延时性能进行了分析。最后数值分析结果表明,混合式认证方案相较于集中式认证方案在认证延时性能方面具有更大的优势。

关键词: 全球微波互联接入,移动多跳中继网络,混合式认证,延时

Abstract: This paper firstly analyzed the existing two authentication schemes,the centralized authentication scheme and the distributed authentication scheme before a new relay node accessing into the MMR WiMAX Network.Secondly a new hybrid authentication scheme was proposed based on the two existing authentication schemes.Then we used the queuing theory to analyze time-delay of the centralized and hybrid authentication scheme under different relay nodes distribution.Finally the results of numerical analysis show that the hybrid authentication scheme has great advantage in the performance of authentication time-delay compared with the centralized authentication scheme.

Key words: Worldwide interoperability for microwave access,Mobile multi-hop relays network,Hybrid authentication scheme,Time-delay

[1] Daan P,Bart L,Ingrid M,et al.The History of WiMAX:AComplete Survey of the Evolution in Certification and Standardization for IEEE 802.16 and WiMAX[J].IEEE Communications Surveys & Tutorials,2012,4(4):1183-1211
[2] Steven W S,Robert W H.The Future of WiMAX:Multihop Relaying with IEEE 802.16j[J].IEEE Standards in Communication and networking,2009,47(1):104-111
[3] 吴乾.WiMAX无线网络安全接入技术分析[J].技术研发,2013(20):61-70
[4] Perumalraja R,Lung C-H,Anand S.Design of Distributed Security Architecture for Multihop WiMAX Networks[C]∥2010 Eighth Annual International Conference on Privacy Security and Trust.Ottawa,Canada,2010:54-61
[5] LAN/MAN Standards Committee of the IEEE Computer Society,IEEE Microwave Theory and Techniques Society.IEEE Standard for Local and metropolitan area networks Part 16:Air Interface for Broadband Wireless Access Systems Amendment 1:Multihop Relay Specification[S].New York,the Institute of Electrical and Electronics Engineers,2009
[6] Dai Xin-min,Xie Xiao-yao.Analysis and Research of Security Mechanism in IEEE 802.16j [C]∥2010 International Conference on Anti-Counterfeiting Security and Identification in Communication.Chengdu,China,2010:33-36 (下转第54页)(上接第49页)
[7] Yang Fan,Qian Ya-li.Two Different Schemes of Authentication in IEEE802.16j Multi-hop Relay Network[C]∥2012 8th International Conference on Wireless Communications,Networking and Mobile Computing.Shanghai,China,2012:1-4
[8] Huang Jie,Huang Chin-Tser.Secure Mutual AuthenticationProtocols for Mobile Multi-hop Relay Wimax Networks against Rogue Base/Relay Stations[C]∥2011 IEEE International Conference on Communications.Kyoto,Japan,2011:1-5
[9] 郎为民,刘波.WiMAX技术原理与应用 [M].北京:机械工业出版社,2008
[10] Anju B,Ramesh P,Chaurasia B K.Traffic Analysis for WiMAX [C]∥2013 5th International Conference on Computational Intelligence and Communication Networks.Mathura,India,2013:138-140
[11] Stuart J.WiMAX Subscriber and Mobile Station Authentication Challenges [J].IEEE communications Magazine,2011,49(11):166-172
[12] Sun Hung-min,Chang Shih-Ying,Lin Yue-Hsun,et al.Efficient Authentication Schemes for Handover in Mobile WiMax [C]∥Eighth International Conference on Intelligent Systems Design and Applications.Kaohsiung,Taiwan,2008,3:235-240
[13] Kleinrock L.Queueing Systems volume 1 [M].New York:A Wiley-Interscience Publication,1975:126-137

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!