【資料名稱】:WiMAX-MobileFi - Advanced Research and T
【資料作者】:Yang Xiao
【資料日期】:© 2008
【資料語言】:英文
【資料格式】:PDF
【資料目錄和簡介】:
Auerbach Publications
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2008 by Taylor & Francis Group, LLC
Auerbach is an imprint of Taylor & Francis Group, an Informa business
No claim to original U.S. Government works
Printed in the United States of America on acid-free paper
10 9 8 7 6 5 4 3 2 1
International Standard Book Number-13: 978-1-4200-4351-8 (Hardcover)
This book contains information obtained from authentic and highly regarded sources. Reprinted
material is quoted with permission, and sources are indicated. A wide variety of references are
listed. Reasonable efforts have been made to publish reliable data and information, but the author
and the publisher cannot assume responsibility for the validity of all materials or for the consequences
of their use.
No part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any
electronic, mechanical, or other means, now known or hereafter invented, including photocopying,
microfilming, and recording, or in any information storage or retrieval system, without written
permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.
copyright.com (
http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC)
222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that
provides licenses and registration for a variety of users. For organizations that have been granted a
photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and
are used only for identification and explanation without intent to infringe.
Library of Congress Cataloging-in-Publication Data
WiMAX/MobileFi : advanced research and technology / Yang Xiao, [editor].
p. cm.
Includes bibliographical references and index.
ISBN 978-1-4200-4351-8 (alk. paper)
1. Wireless communication systems. 2. Mobile communication systems. 3.
IEEE 802.16 (Standard) I. Xiao, Yang.
TK5103.2.W55 2008
621.384--dc22 2007025386'
Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
About the Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
Chapter 1 Connection Admission Control in
OFDMA-Based WiMAX Networks:
Performance Modeling and Analysis . . . . . . . . . . . . . . . 1
Dusit Niyato and Ekram Hossain
1.1 Introduction .......................................................................................... 2
1.2 Related Work on Queueing Analysis for Wireless Transmission
Systems .................................................................................................. 3
1.3 Preliminaries on Queueing Analysis ...................................................... 5
1.3.1 Stochastic Process ....................................................................... 6
1.3.1.1 Stationary Process ......................................................... 6
1.3.1.2 Markov Process ............................................................ 7
1.3.1.3 Birth–Death Process .................................................... 7
1.3.2 Discrete Time Markov Chain ..................................................... 7
1.3.2.1 Transient State Behavior .............................................. 8
1.3.2.2 Steady-State Behavior .................................................. 9
1.4 Connection Admission Control for OFDMA-Based WiMAX
Networks ............................................................................................... 10
1.4.1 System Model ............................................................................. 10
1.4.2 OFDMA Transmission .............................................................. 10
1.4.2.1 CAC Policies ................................................................ 12
1.4.2.2 Th reshold-Based CAC ................................................. 13
1.4.2.3 Queue-Aware CAC ...................................................... 13
1.4.3 Formulation of the Queueing Model .......................................... 13
1.4.4 State Space and Probability Transition Matrix ............................ 14
1.4.4.1 Th reshold-Based CAC Algorithm ................................ 15
1.4.4.2 Queue-Aware CAC Algorithm ..................................... 15
1.4.4.3 Transition Matrix for the Queue .................................. 16
1.4.5 QoS Measures ............................................................................ 17
1.4.5.1 Connection Blocking Probability ................................. 18
1.4.5.2 Average Number of Ongoing Connections ................... 18
1.4.5.3 Average Queue Length ................................................. 18
1.4.5.4 Packet Dropping Probability ........................................ 19
1.4.5.5 Queue Th roughput ....................................................... 19
1.4.5.6 Average Delay ............................................................... 19
1.4.6 Numerical Results ...................................................................... 20
1.4.6.1 Parameter Setting ......................................................... 20
1.4.6.2 Performance of CAC .................................................... 20
1.5 Summary ............................................................................................... 26
References ....................................................................................................... 26
Chapter 2 Mobile Wimax Networks and Th eir Integration
with WiFi Networks . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Wen-Hsin Yang and Yu-Chee Tseng
2.1 Introduction ........................................................................................... 31
2.2 Overview of the Mobile WiMAX Specifi cation ..................................... 32
2.2.1 IEEE 802.16 Standard ............................................................... 32
2.2.2 WiMAX Network Architecture ................................................. 33
2.2.3 IEEE 802.16e-2005 Specifi cation ............................................. 34
2.3 WiMAX Mobility Management ............................................................ 36
2.3.1 Network Entry and Initialization ............................................... 37
2.3.2 Ranging Process ......................................................................... 37
2.3.3 Handover Process ....................................................................... 37
2.3.3.1 Hard Handover and Soft Handover ............................. 38
2.3.3.2 MAC Layer Handover Procedure ................................ 38
2.3.4 Mobile Multi-Hop Relay Network ............................................. 41
2.4 Techniques for Integrating Mobile WiMAX and WiFi
Networks .......................................................................................... 42
2.4.1 Service Scenarios .................................................................... 42
2.4.2 Network Architecture ................................................................ 43
2.4.3 Mobility Patterns ....................................................................... 43
2.4.4 Technical Challenges for Handover .......................................... 44
2.4.5 Energy-Aware Vertical Handover ............................................... 45
2.5 Conclusion and Future Work ................................................................ 47
References ....................................................................................................... 47
vi Contents
Chapter 3 QoS Support in IEEE 802.16-Based Broadband
Wireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Hsi-Lu Chao and Yi-Bing Lin
3.1 Introduction ........................................................................................... 49
3.2 IEEE 802.16 Architecture ...................................................................... 50
3.2.1 Reference Model ........................................................................ 50
3.2.2 Frame Structure ......................................................................... 51
3.3 MAC Layer ............................................................................................ 52
3.3.1 Security ...................................................................................... 53
3.3.2 Network Entry and Initiation .................................................... 53
3.3.3 Scheduling Services .................................................................... 56
3.4 PHY Layer ............................................................................................. 58
3.5 CAC and Scheduling ............................................................................. 63
3.5.1 Class-Based Scheduling ............................................................ 64
3.5.2 Connection-Based Scheduling .................................................. 64
3.6 Conclusions ........................................................................................ 66
References .................................................................................................... 66
Chapter 4 Security in Fixed and Mobile
IEEE 802.16 Networks . . . . . . . . . . . . . . . . . . . . . . . 69
Subbu Ponnuswamy, Todor Cooklev, Yang Xiao,
and Krishna Sumanth Velidi
4.1 Introduction ........................................................................................... 70
4.1.1 Encryption Methods ................................................................... 70
4.1.2 Overview of IEEE 802.16 ........................................................... 72
4.1.3 Acronyms and Defi nitions .......................................................... 73
4.2 Security Sublayer Overview ................................................................... 73
4.2.1 IEEE 802.16 Encryption Overview ............................................ 75
4.2.2 PKM Protocol Overview ............................................................ 75
4.2.3 Authentication Overview ........................................................... 76
4.3 Cryptographic Methods ........................................................................ 77
4.3.1 Data Encryption: DES in CBC Mode ........................................ 78
4.3.2 Data Encryption: AES in CCM Mode ....................................... 78
4.3.3 Data Encryption: AES in CTR Mode ........................................ 79
4.3.4 Data Encryption: AES in CBC Mode ........................................ 79
4.3.5 Encryption of TEK-128 with AES Key Wrap ............................ 80
4.3.6 Calculation of HMAC Digests .................................................. 80
4.3.7 Derivation of TEKs, KEKs, and Message Authentication
Keys ............................................................................................ 81
4.3.8 Cipher-Based MAC .................................................................... 82
4.3.9 Key Derivation Functions for PKM Version 2 ............................ 83
Contents vii
viii Contents
4.4 X.509 Digital Certifi cates ................................................................... 84
4.4.1 SS X.509 Digital Certifi cate .................................................... 84
4.4.2 BS Certifi cate ........................................................................... 86
4.5 PKM Version 1: Security Associations .................................................. 86
4.6 PKM Version 1: Authorization and Key Exchange ............................... 88
4.6.1 SS Authorization and AK Exchange ......................................... 88
4.6.2 TEK Exchange Overview ......................................................... 91
4.6.3 Encryption of TEK with 3-DES .............................................. 91
4.6.4 Authorization State Machine .................................................... 92
4.6.4.1 States .......................................................................... 93
4.6.4.2 Messages .................................................................... 94
4.6.4.3 Events ........................................................................ 94
4.6.5 TEK State Machine .................................................................. 94
4.6.5.1 States .......................................................................... 95
4.6.5.2 Messages .................................................................... 95
4.6.5.3 Events ........................................................................ 96
4.7 PKM Version 1: Parameter Values ....................................................... 96
4.8 PKM Version 1: Message Encodings .................................................... 98
4.9 PKM Version 2: Th ree-Way Handshake ................................................ 98
4.10 PKM Version 2: Mutual Authentication .............................................. 100
4.11 PKM Version 2: Multicast and Broadcast ............................................ 102
4.11.1 Multicast and Broadcast Services Support ................................ 102
4.11.2 Optional Multicast Broadcast Rekeying Algorithm .................. 103
4.12 Key Usage .......................................................................................... 105
4.12.1 AK Key Lifetime ....................................................................... 105
4.12.2 AK Transition Period on BS Side .............................................. 105
4.12.3 BS Usage of AK ........................................................................ 105
4.12.3.1 Calculation of HMAC-Digests ................................ 106
4.12.3.2 Derivation of DES, Authentication
Keys ......................................................................... 106
4.12.3.3 Derivation of HMAC Authentication
Keys ......................................................................... 107
4.12.3.4 Encryption of AK ..................................................... 107
4.12.4 AK Period on SS Side ................................................................ 107
4.12.4.1 SS Authorization ...................................................... 107
4.12.4.2 SS Usage of AK ........................................................ 108
4.12.5 TEK Lifetime ........................................................................... 109
4.12.5.1 BS Usage of TEK ..................................................... 109
4.12.5.2 SS Usage of TEK ...................................................... 109
4.13 Conclusions ........................................................................................ 110
Acknowledgment .......................................................................................... 111
References ..................................................................................................... 111
Contents ix
Chapter 5 Mobility Support and Conservation of Terminal
Energy in IEEE 802.16 Wireless Networks . . . . . . 113
Sayandev Mukherjee, Kin K. Leung, and
George E. Rittenhouse
5.1 Introduction ......................................................................................... 114
5.2 Protocols for Connection Handoff ....................................................... 115
5.2.1 Handoff Objective and Mobility Management ......................... 115
5.2.2 Initialization Process ................................................................ 116
5.2.3 Functionalities for Connection Handoff .................................. 118
5.2.4 Handoff Protocol and Message Exchanges ............................... 119
5.2.5 Use of Existing Message to Request and ACK Handoff ............ 122
5.3 Energy Conservation via Sleep Mode ................................................... 123
5.3.1 Need for “Sleep” and “Wakeup” Modes .................................... 123
5.3.2 Message Exchanges to Enter Sleep Mode .................................. 123
5.3.3 Message Exchanges to Wakeup a Sleeping SS ........................... 124
5.3.3.1 SS Wakes Up on Its Own ........................................... 124
5.3.3.2 BS Wakes Up the SS via a Paging Message ................ 124
5.4 Feasibility of Supporting Hard Handoff ............................................... 125
5.5 Conclusion ........................................................................................... 130
Acknowledgments ......................................................................................... 131
References ..................................................................................................... 131