Skip to main content
Log in

Performance analysis of authentication and key distribution scheme for mobile multi-hop relay in IEEE 802.16j

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Mobile multi-hop relay (MMR) network is known to be easy to install and convenient to manage because of its self-organizing and self-healing characteristics. However, MMR is vulnerable to security problems because of the same reason. In this paper, we propose a new hybrid authentication and key distribution algorithm for IEEE 802.16j MMR service. The proposed scheme uses centralized authentication when a mobile station or a relay station initially joins the MMR network and uses distributed authentication for hop-by-hop authentication between mobile nodes. We examine the procedure of the proposed scheme and its usefulness when applied to MMR networks. We also analyze the performance of the hybrid scheme. The proposed scheme can be used in any mobile multi-hop network as well as IEEE 802.16j MMR network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Akyildiz IF, Wang X,Wang W (2005) Wireless mesh networks: a survey. Comput Netw 47:445–487

    Google Scholar 

  2. Baronti P, Phllai P, Chook VWC, Chessa S, Gotta A, Hu YF (2007) Wireless sensor networks: a survey on the state of the art and the 802.15.4 and ZigBee standards. Comput Commun 30:1655–1695

    Article  Google Scholar 

  3. IEEE 802.11 WG, IEEE 802.11s/D0.01 (2006) http://www.802wirelessworld.com

  4. D 2.4 Multi-radio Access Architecture (2005) WWI Ambient Network Project

  5. IEEE 802.16’s relay task group, http://www.802wirelessworld.com

  6. Zhou L, Haas ZJ (1999) Securing Ad Hoc Networks. IEEE Netw Mag, pp 24–30

  7. Yanchao Z, Yuguang G (2006) ARSA: an attck-resilient security architecture for multihop wireless mesh networks. IEEE J Sel Areas Commun 24:1916–1928

    Article  Google Scholar 

  8. Falk R, Tschofenig H, Prasad A (2005) Secure access over multi-hop relay extensions of public networks. Proc. Int. Symp. The 8th international symposium on wireless personal multimedia communications (WPMC 2005), Aalborg, Denmark, 18–22 September 2005, pp 46–50

  9. Srdjan C, Buttyan L, Hubaux J-P (2003) Self-organized public-key management for mobile ad hoc networks. IEEE Trans Mob Comput 2:52–64

    Article  Google Scholar 

  10. Khan A, Fisal N, Kamilah S, Abbas M (2010) Efficient distributed authentication key scheme for multi-hop relay in IEEE 802.16j network for IEEE 802.16j architecture. Int J Eng Sci Technol 2(6):2192–2199

    Google Scholar 

  11. Aboba B, Blunk L, Vollbrecht J, Carlson J, Levkowetz H (2004) Extensible Authentication Protocol (EAP). IETF RFC 3748

  12. Ji L, Feldman B, Agre J (2004) Self-organizing security scheme for multi-hop wireless access networks. 2004 IEEE Aerospace Conference, pp 1231–1240

  13. Bogdanoski M, Latkoski P, Risteski A, Popvski B (2008) IEEE 802.16 Security Issues. 16th Telecommunications forum TELFOR

  14. IEEE Standard 802.16-2004 (2004) Air interface for fixed broadband wireless access systems

  15. IEEE P802.16e/D7 (2005) Air interface for fixed and mobile broadband wireless access systems: amendment for physical and medium access control layers for combined fixed and mobile operation in licensed bands

  16. Aikaterini A-V (2006) Security of IEEE 802,16, MS thesis, Royal Institute of Technology

  17. Xu S, Matthews M, Huang C-T (2006) Security issues in privacy and key management protocols of IEEE 802.16 ACM SE’06

  18. Kleinrock L (1975) Queueing systems vol 1: theory. Wiley, New York

    Google Scholar 

Download references

Acknowledgments

This research was supported by Kangwon National University and the LG Yonam Foundation, Korea, and also was supported by the MKE(The Ministry of Knowledge Economy), Korea, under the ITRC(Information Technology Research Center) support program supervised by the NIPA(National IT Industry Promotion Agency) (NIPA-2010-(C1090-1011-0013)).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Goo Yeon Lee.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lee, Y., Lee, G.Y., Kim, H.J. et al. Performance analysis of authentication and key distribution scheme for mobile multi-hop relay in IEEE 802.16j. Pers Ubiquit Comput 16, 697–706 (2012). https://doi.org/10.1007/s00779-011-0427-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-011-0427-8

Keywords

Navigation