The Data could be provided from the MAC Layer to the Security Sub Layer that is going to be designed & simulated. In this paper the security sub-layer will provide subscribers with total privacy across the fixed broadband wireless network. This is done by encrypting connections between Subscriber Station (SS) and Base Station (BS). Also, strong protection from theft of service is provided through the BS protection to data transport services, by enforcing encryption of the associated service flows across the network. The data when entered into the security sub layer first will be certified. After the certification of the data, it could be encrypted through techniques like Data Encryption Standard (DES), Advanced Encryption Standard (AES) that we will call as the Data Encryption. After the encryption, the data is again encrypted through Secure Hash Algorithm (SHA-1) which is used for the message digest of that encrypted data. This operation will take place in the Integrity Unit (part).
Weitere Kapitel dieses Buchs durch Wischen aufrufen
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
- Design and Simulation of Security Sub-layer of WMAN IEEE 802.16 Standard (Wi-Max Compliant)
- verfasst von
Rajat Sheel Jain
- Springer Berlin Heidelberg