RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • SCIESCOPUSKCI등재

        An IBC and Certificate Based Hybrid Approach to WiMAX Security

        Rodoper, Mete,Trappe, Wade,Jung, Edward Tae-Chul The Korea Institute of Information and Commucation 2009 Journal of communications and networks Vol.11 No.6

        Worldwide inter-operability for microwave access (WiMAX) is a promising technology that provides high data throughput with low delays for various user types and modes of operation. While much research had been conducted on physical and MAC layers, little attention has been paid to a comprehensive and efficient security solution for WiMAX. We propose a hybrid security solution combining identity-based cryptography (IBC) and certificate based approaches. We provide detailed message exchange steps in order to achieve a complete security that addresses the various kind of threats identified in previous research. While attaining this goal, efficient fusion of both techniques resulted in a 53% bandwidth improvement compared to the standard's approach, PKMv2. Also, in this hybrid approach, we have clarified the key revocation procedures and key lifetimes. Consequently, to the best of knowledge our approach is the first work that unites the advantages of both techniques for improved security while maintaining the low overhead forWiMAX.

      • KCI등재
      • KCI등재

        An IBC and Certificate Based Hybrid Approach to WiMAX Security

        Mete Rodoper,Wade Trappe,Edward (Tae-Chul) Jung 한국통신학회 2009 Journal of communications and networks Vol.11 No.6

        Worldwide inter-operability for microwave access (WiMAX) is a promising technology that provides high data throughput with low delays for various user types and modes of operation. While much research had been conducted on physical and MAC layers, little attention has been paid to a comprehensive and efficient security solution for WiMAX. We propose a hybrid security solution combining identity-based cryptography (IBC) and certificate based approaches. We provide detailed message exchange steps in order to achieve a complete security that addresses the various kind of threats identified in previous research. While attaining this goal, efficient fusion of both techniques resulted in a 53% bandwidth improvement compared to the standard’s approach, PKMv2. Also, in this hybrid approach, we have clarified the key revocation procedures and key lifetimes. Consequently, to the best of knowledge our approach is the first work that unites the advantages of both techniques for improved security while maintaining the low overhead forWiMAX.

      • KCI등재

        An eavesdropping and jamming dilemma with sophisticated players

        Andrey Garnaev,Wade Trappe 한국통신학회 2023 ICT Express Vol.9 No.4

        Wireless networks are susceptible to malicious attacks, especially those involving eavesdropping and jamming. In this paper, we consider a communication scenario involving a transmitter who wishes to communicate secretly and reliably with a receiver, while an adversary wants to obstruct this communication by means of either eavesdropping or jamming. The transmitter as well as the adversary wants to achieve its own goal in a manner that is as unpredictable as possible to its rival. We model this problem by a non-zero sum game. The expected throughput that is delivered secretly and non-jammed to the receiver is considered as the metric that reflects communication secrecy and reliability. The entropy of the player’s strategies is considered as the metric to reflect the player’s unpredictability. The equilibrium is found in closed form, and parameters of the transmitter’s utility supporting both goals are optimized via a proportional fairness approach.

      • KCI등재

        A multiple access channel game with users implementing throughput and latency metrics

        Garnaev Andrey,Trappe Wade 한국통신학회 2023 ICT Express Vol.9 No.5

        We consider a multiple access channel (MAC) problem where several users communicate with a base station and in which the users may have different applications or communication purposes for using the network, which is reflected via associated communication metrics. Specifically, we use throughput as the metric to reflect regular data transmission purposes, and latency, modeled by the inverse throughput, is used to reflect data transmission speed as another metric. The problem is formulated as a non-zero sum game. The equilibrium is derived in closed form. Stability in communication for such a heterogeneous network is established by proving the uniqueness of the equilibrium, except for particular cases where stability still can be maintained via cooperation of users with throughput metric or their switching to latency metric.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼