skip to main content
10.1145/1551722.1551734acmotherconferencesArticle/Chapter ViewAbstractPublication Pageseatis-orgConference Proceedingsconference-collections
research-article

Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j

Published: 03 June 2009 Publication History

Abstract

Mobile multi-hop relay (MMR) network is known to have the strength of easy installation and convenient management because of its self-organizing and self-healing characteristics. However, MMR is also known to be vulnerable to security problems for the very same reason. In this paper, we propose a new hybrid authentication algorithm for IEEE 802.16j MMR network service. The proposed scheme uses centralized authentication when a mobile station (MS) or a relay station (RS) initially joins the MMR network, and uses distributed authentication for hop-by-hop authentication between the mobile nodes. We analyze the procedure of the proposed scheme in detail, and examine its usefulness when applied to the MMR network. The proposed scheme can be used in any mobile multi-hop network as well as IEEE 802.16j MMR network.

References

[1]
I. F. Akyildiz, X. Wang and W. Wang. Wireless Mesh Networks: a survey. Computer Networks. Elsevier. 2005.
[2]
P. Baronti, P. Phllai, V. W. C. Chook, S. Chessa, A. Gotta, and Y. F. Hu. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards. Computer Communications. Vol. 30. Issue 7. Elsevier(May 2007) 1655--1695.
[3]
IEEE 802.11 WG, IEEE 802.11s/D0.01. March 2006. http://www.802wirelessworld.com.
[4]
D 2.4 Multi-radio Access Architecture. WWI Ambient Network Project. 2005.
[5]
IEEE 802.16's Relay Task Group. http://www.802wirelessworld.com.
[6]
Lidong Zhou and Zygmunt J. Haas. Securing Ad Hoc Networks. IEEE Network Mag. 1999.
[7]
Yanchao Zhang and Yuguang Gang. ARSA: An Attck-Resilient Security Architecture for Multihop Wireless Mesh Networks. IEEE Journal on Selected Areas in Communications. Vol. 24. No. 10. (Oct. 2006) 1916--1928.
[8]
R. Falk, A. Prasad, and A. Tschofenig. Secure Access Over Multi-hop Relay Extension of Public Networks. In WPMC 2005. Aslborg. Denmark. Sep. 2005.
[9]
Srdjan Capkun, Levente Buttyan, and Jean-Pierre Hubaux. Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Transactionson Mobile Computing. Vol. 2. No. 1. (Jan-Mar 2003) 52--64.
[10]
B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson and H. Levkowetz. Extension Authentication Protocol (EAP). IETF RFC 3748, June 2004.
[11]
Lusheng Ji, Brian Feldman and Jonathan Agre,. Self-Organizing Security Scheme for Multi-hop Wireless Access Networks. In 2004 IEEE Aerospace Conference. 1231--1240, 2004.
[12]
IEEE Standard 802.16-2004. Air Interface for Fixed Broadband Wireless Access Systems. October 2004.
[13]
IEEE P802.16e/D7. Air Interface for Fixed and Mobile Broadband Wireless Access Systems: Amendment for Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands. April 2005.
[14]
Arkoudi-V. Aikaterini, Security of IEEE 802, 16. MS thesis. Dept. of Computer and Systems Science, Royal Institute of Technology, 2006.
[15]
Sen Xu, Manton Matthews and Chin-Tser Huang. Security Issues in Privacy and Key Management Protocols of IEEE 802.16. In ACM SE'06. Florida USA. March 2006.
[16]
David Johnston and Jesse Walker. Overview of IEEE 802.16 Security. IEEE Security & Privacy, Society. May/June 2004. 40--48.
[17]
G. Glaretta, R. Lopez, Y. Ohba, S. Thomson and H. Tschofenig. Usage Scenarios and Requirements for Multihop EAP Lower Layer. internet-draft, IETF. Feb. 2005.
[18]
P. Papadimitratos and Zygmunt J. Haas. Securing Mobile Ad Hoc Networks. The Handbook of Ad Hoc Wireless Networks. CRC Press 2003.
[19]
H. Yang, H. Luo, F. Ye, S. Lu and L. Zhang. Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Mag., Feb. 2004.

Cited By

View all

Index Terms

  1. Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image ACM Other conferences
            EATIS '09: Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship
            June 2009
            207 pages
            ISBN:9781605583983
            DOI:10.1145/1551722
            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            In-Cooperation

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            Published: 03 June 2009

            Permissions

            Request permissions for this article.

            Check for updates

            Author Tags

            1. IEEE 802.16j
            2. hybrid authentication
            3. mobile wireless network
            4. multi hop relay
            5. mutual authentication

            Qualifiers

            • Research-article

            Funding Sources

            Conference

            EATIS '09

            Acceptance Rates

            Overall Acceptance Rate 17 of 64 submissions, 27%

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)2
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 28 Jan 2025

            Other Metrics

            Citations

            Cited By

            View all

            View Options

            Login options

            View options

            PDF

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            Figures

            Tables

            Media

            Share

            Share

            Share this Publication link

            Share on social media