Kejie Lu and Yi Qian and Hsiao-Hwa Chent
Using a mesh 802.16 deployment requires additional guarantees for security, specially when intermediate nodes are actually end user equipment, not controlled by the network operator. What could actually be useful to me is the security overview, to improve the security section of my article.
Maybe I have not higlighted enough that, when sharing infrastructure, tunneling offers additional value.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment