{"title":"Security and AAA Architecture for WiFi-WiMAX Mesh Network","authors":"A. Samhat, Miloud Abdi","doi":"10.1109/ISWCS.2007.4392408","DOIUrl":null,"url":null,"abstract":"This paper presents a flexible architecture for hybrid wireless network where WiFi and WiMAX in mesh mode are deployed in a complementary way. The end user can access to high bit rate Internet services directly by WiMAX technology through the 802.16 base stations or by WiFi technology through a CPE/AP connected to the 802.16 base station. We provide a brief description of the different functional entities and we investigate several technical issues including infrastructure and aspects related to the AAA (authentication, authorization, accounting) procedures for users as well as the system security.","PeriodicalId":261480,"journal":{"name":"2007 4th International Symposium on Wireless Communication Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 4th International Symposium on Wireless Communication Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISWCS.2007.4392408","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18
Abstract
This paper presents a flexible architecture for hybrid wireless network where WiFi and WiMAX in mesh mode are deployed in a complementary way. The end user can access to high bit rate Internet services directly by WiMAX technology through the 802.16 base stations or by WiFi technology through a CPE/AP connected to the 802.16 base station. We provide a brief description of the different functional entities and we investigate several technical issues including infrastructure and aspects related to the AAA (authentication, authorization, accounting) procedures for users as well as the system security.