M. Tech. Electrical Engineering. / Discusses the study as limited to the formal specification/modelling and formal verification of protocols proposed and applicable to the initial network entry procedure in WiMAX networks. Secondly, formal specification of the existing protocols under consideration will be based on their informal specification available in the literature and not on proprietary protocols for which little or no information is available. Thirdly, this research work does not intend to wipe out the state space explosion problem but rather applies existing optimization techniques to supress it. Finally, the study does not assess the usability performance impact of the proposed security scheme and thus recommends that this analysis should be done as future work to evaluate the functionality and soundness of deploying the proposed security scheme.
Identifer | oai:union.ndltd.org:netd.ac.za/oai:union.ndltd.org:tut/oai:encore.tut.ac.za:d1000636 |
Date | January 2012 |
Creators | Komu, Beth Njeri. |
Contributors | Mzyece, Mjumo., Djouani, K. (Karim) |
Source Sets | South African National ETD Portal |
Language | English |
Detected Language | English |
Type | Text |
Format |
Page generated in 0.0017 seconds