Skip to main content

Tipp

Weitere Kapitel dieses Buchs durch Wischen aufrufen

Erschienen in:
Buchtitelbild

2010 | OriginalPaper | Buchkapitel

Design and Simulation of Security Sub-layer of WMAN IEEE 802.16 Standard (Wi-Max Compliant)

verfasst von : Rajat Sheel Jain, Neeraj Kumar, Brijesh Kumar

Erschienen in: Information and Communication Technologies

Verlag: Springer Berlin Heidelberg

share
TEILEN

The Data could be provided from the MAC Layer to the Security Sub Layer that is going to be designed & simulated. In this paper the security sub-layer will provide subscribers with total privacy across the fixed broadband wireless network. This is done by encrypting connections between Subscriber Station (SS) and Base Station (BS). Also, strong protection from theft of service is provided through the BS protection to data transport services, by enforcing encryption of the associated service flows across the network. The data when entered into the security sub layer first will be certified. After the certification of the data, it could be encrypted through techniques like Data Encryption Standard (DES), Advanced Encryption Standard (AES) that we will call as the Data Encryption. After the encryption, the data is again encrypted through Secure Hash Algorithm (SHA-1) which is used for the message digest of that encrypted data. This operation will take place in the Integrity Unit (part).

Metadaten
Titel
Design and Simulation of Security Sub-layer of WMAN IEEE 802.16 Standard (Wi-Max Compliant)
verfasst von
Rajat Sheel Jain
Neeraj Kumar
Brijesh Kumar
Copyright-Jahr
2010
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-642-15766-0_1

Premium Partner