PJST 2 JUNE.pmd

نویسندگان

  • Monika Rani
  • Mridul Chawla
چکیده

Worldwide Interoperability for Microwave Access (WiMAX) is a telecommunications technology providing wireless data, voice and videos over long distances with efficiency.” The main goal of WiMAX is to deliver wireless communications with security or it can be said that security is the major issue in WiMAX networks. In this study, different cryptographic techniques like Advanced Encryption Standard (AES), Data Encryption Standard (DES), Triple DES (3DES), (DES+MD5), (Message Digest) MD5 have been used for different packet sizes and evaluated their performances on the basis of trade of index to provide security at the network layer. Several WiMAX scenarios have been studied based on these techniques, which can be further, extended for large no of scenarios for studying the behavior of IPSec over WiMAX. KeywordsSymmetric keys, cryptography, IPSec, IKE

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PJST 2 JUNE.pmd

A work on neural network and fuzzy logic based technique for solving the problem of unit commitment in any electric utility is presented in this paper. The effectiveness of economic dispatch is well understood when the objective is to schedule the committed generators to meet the load, maintain voltages and frequency within prescribed tolerances and minimize operating cost without unduly stress...

متن کامل

PJST 2 JUNE.pmd

The aim of this experimental work was to achieve improvement the thermal efficiency of LPG stove and to save fuel. Due to the shortage of petroleum resources and its high prices, it is the duty of each and every person to save it. Most of the families in rural areas use wood or cow-dung for cooking purposes but it is not possible in urban areas. In urban areas, 90% houses consume LPG, as its us...

متن کامل

PJST 2 JUNE.pmd

Research in the field of computer and network sciences demands for tools and methodology to test their security effectively. Intrusion Detection System is used to perform the same with a fact that an intruder’s behavior will be noticeably different from that of a legitimate user and would exploit security vulnerabilities. IDS have thousands of alerts per day; some are mistakenly triggered by be...

متن کامل

Dataset. Relationship between Urinary Level of Phytate and Valvular Calcification in an Elderly Population: a Cross-Sectional Study

Subject Urinary volume (mL) pH Phytate (mg/L) SEM Age (years) Sex (H:male; M:female) Height (m) Weight (kg) BMI (kg/m2) Diabetes_ 1yes_2not HTA_ 1yes_ 2not HCol_ 1yes_ 2not IRC_1 yes_2 not RenalLit _1yes_2 not ACV_ 1yes_ 2not IAM_ 1yes_ 2not EVPer_ 1yes_2 not Artr _1ye s_2n ot OPor. _1yes _2not Gout_ 1yes_ 2not C.Colon_ 1yes_2no t Cancer_ 1yes_2n ot AAS_ 1yes _2no t Ticlopid._ 1yes_2no t Estati...

متن کامل

Feature Extraction of Artificial Tongue Data Using Gram-schmidt Orthonormalization

,# / # ) # @ ) # ) # & & & 2 & # )) ) 2 ; = ) $ B C D # # 2 $ / ) & # $ ) / # 2 E @ C(D # # ,# ) ) / # 2 # @ # & ) ) 2# # / 2 # # C%D # # 2 & ) $ ) $ / , # # $ # # ) ) * + $ / 2 # $ # / / B @ C8D # @ 2 ) ) 2 # / = # ) / ) # 2 2 # @ ) 2 # # # A / / * # + ) = # ) / # $ # ) # $ $ ) ) # / 2 2 # ) # / 2 / / 2 # # ,# / / # ) ) # )) = # # / ) / C!D ,# # # / ) # # # = ; # # # # )) # & $ / ; # F 2 # $ 2...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012