New Methods for TVWS Database Protocol

In this paper, the authors study the authentication in the IEEE protocols (802.11-802.X1-802.11i- 802.16e - 802.22) and show the weakness and the problems that will arise when they use them and what efforts are done to overcome these problems. And also they analyze the database authentication. They find that IEEE 802.22 is the best protocol to use in the TVWS, because it is defined as the first wireless protocol for cognitive radio in WRAN. Finally, they explain the new idea to enhance this protocol to be more suitable in TVWS database authentication.

Provided by: International Journal of Computer Science and Telecommunications Topic: Security Date Added: Feb 2015 Format: PDF

Find By Topic