A comparison of wi-fi and wimax with case studies - Florida State ...
A comparison of wi-fi and wimax with case studies - Florida State ...
A comparison of wi-fi and wimax with case studies - Florida State ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
PKM (Privacy <strong>and</strong> Key Management) authorization<br />
This protocol is used to send an authorization token to an authorized SS. And it contains<br />
three communication steps between SS <strong>and</strong> BS. Figure 4-3[52] The <strong>fi</strong>rst two steps are sent by SS<br />
for verifying itself <strong>wi</strong>th BS <strong>and</strong> the third one is used for response from BS to SS.<br />
Privacy <strong>and</strong> Key Management<br />
Figure 4-3 PKM Authorization Process <strong>and</strong> Parameters<br />
PKM is used to establish data SAs between SS <strong>and</strong> BS. This protocol can have two or three<br />
steps <strong>of</strong> message exchange between SS <strong>and</strong> BS. Figure 4-4[52] The <strong>fi</strong>rst step is optional. It<br />
depends on whether that BS requests rekeying or not. The second one, SS uses it to initiate the<br />
protocol <strong>and</strong> BS reply <strong>wi</strong>th the third one.<br />
50