skip to main content
10.1145/1551722.1551734acmotherconferencesArticle/Chapter ViewAbstractPublication Pageseatis-orgConference Proceedingsconference-collections
research-article

Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j

Authors Info & Claims
Published:03 June 2009Publication History

ABSTRACT

Mobile multi-hop relay (MMR) network is known to have the strength of easy installation and convenient management because of its self-organizing and self-healing characteristics. However, MMR is also known to be vulnerable to security problems for the very same reason. In this paper, we propose a new hybrid authentication algorithm for IEEE 802.16j MMR network service. The proposed scheme uses centralized authentication when a mobile station (MS) or a relay station (RS) initially joins the MMR network, and uses distributed authentication for hop-by-hop authentication between the mobile nodes. We analyze the procedure of the proposed scheme in detail, and examine its usefulness when applied to the MMR network. The proposed scheme can be used in any mobile multi-hop network as well as IEEE 802.16j MMR network.

References

  1. I. F. Akyildiz, X. Wang and W. Wang. Wireless Mesh Networks: a survey. Computer Networks. Elsevier. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. P. Baronti, P. Phllai, V. W. C. Chook, S. Chessa, A. Gotta, and Y. F. Hu. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards. Computer Communications. Vol. 30. Issue 7. Elsevier(May 2007) 1655--1695. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. IEEE 802.11 WG, IEEE 802.11s/D0.01. March 2006. http://www.802wirelessworld.com.Google ScholarGoogle Scholar
  4. D 2.4 Multi-radio Access Architecture. WWI Ambient Network Project. 2005.Google ScholarGoogle Scholar
  5. IEEE 802.16's Relay Task Group. http://www.802wirelessworld.com.Google ScholarGoogle Scholar
  6. Lidong Zhou and Zygmunt J. Haas. Securing Ad Hoc Networks. IEEE Network Mag. 1999.Google ScholarGoogle Scholar
  7. Yanchao Zhang and Yuguang Gang. ARSA: An Attck-Resilient Security Architecture for Multihop Wireless Mesh Networks. IEEE Journal on Selected Areas in Communications. Vol. 24. No. 10. (Oct. 2006) 1916--1928.Google ScholarGoogle Scholar
  8. R. Falk, A. Prasad, and A. Tschofenig. Secure Access Over Multi-hop Relay Extension of Public Networks. In WPMC 2005. Aslborg. Denmark. Sep. 2005.Google ScholarGoogle Scholar
  9. Srdjan Capkun, Levente Buttyan, and Jean-Pierre Hubaux. Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Transactionson Mobile Computing. Vol. 2. No. 1. (Jan-Mar 2003) 52--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson and H. Levkowetz. Extension Authentication Protocol (EAP). IETF RFC 3748, June 2004.Google ScholarGoogle Scholar
  11. Lusheng Ji, Brian Feldman and Jonathan Agre,. Self-Organizing Security Scheme for Multi-hop Wireless Access Networks. In 2004 IEEE Aerospace Conference. 1231--1240, 2004.Google ScholarGoogle Scholar
  12. IEEE Standard 802.16-2004. Air Interface for Fixed Broadband Wireless Access Systems. October 2004.Google ScholarGoogle Scholar
  13. IEEE P802.16e/D7. Air Interface for Fixed and Mobile Broadband Wireless Access Systems: Amendment for Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands. April 2005.Google ScholarGoogle Scholar
  14. Arkoudi-V. Aikaterini, Security of IEEE 802, 16. MS thesis. Dept. of Computer and Systems Science, Royal Institute of Technology, 2006.Google ScholarGoogle Scholar
  15. Sen Xu, Manton Matthews and Chin-Tser Huang. Security Issues in Privacy and Key Management Protocols of IEEE 802.16. In ACM SE'06. Florida USA. March 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. David Johnston and Jesse Walker. Overview of IEEE 802.16 Security. IEEE Security & Privacy, Society. May/June 2004. 40--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. G. Glaretta, R. Lopez, Y. Ohba, S. Thomson and H. Tschofenig. Usage Scenarios and Requirements for Multihop EAP Lower Layer. internet-draft, IETF. Feb. 2005.Google ScholarGoogle Scholar
  18. P. Papadimitratos and Zygmunt J. Haas. Securing Mobile Ad Hoc Networks. The Handbook of Ad Hoc Wireless Networks. CRC Press 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. H. Yang, H. Luo, F. Ye, S. Lu and L. Zhang. Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Mag., Feb. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              EATIS '09: Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship
              June 2009
              207 pages
              ISBN:9781605583983
              DOI:10.1145/1551722

              Copyright © 2009 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 3 June 2009

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              Overall Acceptance Rate17of64submissions,27%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader