New Methods for TVWS Database Protocol

Download Now
Provided by: International Journal of Computer Science and Telecommunications
Topic: Security
Format: PDF
In this paper, the authors study the authentication in the IEEE protocols (802.11-802.X1-802.11i- 802.16e - 802.22) and show the weakness and the problems that will arise when they use them and what efforts are done to overcome these problems. And also they analyze the database authentication. They find that IEEE 802.22 is the best protocol to use in the TVWS, because it is defined as the first wireless protocol for cognitive radio in WRAN. Finally, they explain the new idea to enhance this protocol to be more suitable in TVWS database authentication.
Download Now

Find By Topic