ABSTRACT
Mobile multi-hop relay (MMR) network is known to have the strength of easy installation and convenient management because of its self-organizing and self-healing characteristics. However, MMR is also known to be vulnerable to security problems for the very same reason. In this paper, we propose a new hybrid authentication algorithm for IEEE 802.16j MMR network service. The proposed scheme uses centralized authentication when a mobile station (MS) or a relay station (RS) initially joins the MMR network, and uses distributed authentication for hop-by-hop authentication between the mobile nodes. We analyze the procedure of the proposed scheme in detail, and examine its usefulness when applied to the MMR network. The proposed scheme can be used in any mobile multi-hop network as well as IEEE 802.16j MMR network.
- I. F. Akyildiz, X. Wang and W. Wang. Wireless Mesh Networks: a survey. Computer Networks. Elsevier. 2005. Google ScholarDigital Library
- P. Baronti, P. Phllai, V. W. C. Chook, S. Chessa, A. Gotta, and Y. F. Hu. Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards. Computer Communications. Vol. 30. Issue 7. Elsevier(May 2007) 1655--1695. Google ScholarDigital Library
- IEEE 802.11 WG, IEEE 802.11s/D0.01. March 2006. http://www.802wirelessworld.com.Google Scholar
- D 2.4 Multi-radio Access Architecture. WWI Ambient Network Project. 2005.Google Scholar
- IEEE 802.16's Relay Task Group. http://www.802wirelessworld.com.Google Scholar
- Lidong Zhou and Zygmunt J. Haas. Securing Ad Hoc Networks. IEEE Network Mag. 1999.Google Scholar
- Yanchao Zhang and Yuguang Gang. ARSA: An Attck-Resilient Security Architecture for Multihop Wireless Mesh Networks. IEEE Journal on Selected Areas in Communications. Vol. 24. No. 10. (Oct. 2006) 1916--1928.Google Scholar
- R. Falk, A. Prasad, and A. Tschofenig. Secure Access Over Multi-hop Relay Extension of Public Networks. In WPMC 2005. Aslborg. Denmark. Sep. 2005.Google Scholar
- Srdjan Capkun, Levente Buttyan, and Jean-Pierre Hubaux. Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Transactionson Mobile Computing. Vol. 2. No. 1. (Jan-Mar 2003) 52--64. Google ScholarDigital Library
- B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson and H. Levkowetz. Extension Authentication Protocol (EAP). IETF RFC 3748, June 2004.Google Scholar
- Lusheng Ji, Brian Feldman and Jonathan Agre,. Self-Organizing Security Scheme for Multi-hop Wireless Access Networks. In 2004 IEEE Aerospace Conference. 1231--1240, 2004.Google Scholar
- IEEE Standard 802.16-2004. Air Interface for Fixed Broadband Wireless Access Systems. October 2004.Google Scholar
- IEEE P802.16e/D7. Air Interface for Fixed and Mobile Broadband Wireless Access Systems: Amendment for Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands. April 2005.Google Scholar
- Arkoudi-V. Aikaterini, Security of IEEE 802, 16. MS thesis. Dept. of Computer and Systems Science, Royal Institute of Technology, 2006.Google Scholar
- Sen Xu, Manton Matthews and Chin-Tser Huang. Security Issues in Privacy and Key Management Protocols of IEEE 802.16. In ACM SE'06. Florida USA. March 2006. Google ScholarDigital Library
- David Johnston and Jesse Walker. Overview of IEEE 802.16 Security. IEEE Security & Privacy, Society. May/June 2004. 40--48. Google ScholarDigital Library
- G. Glaretta, R. Lopez, Y. Ohba, S. Thomson and H. Tschofenig. Usage Scenarios and Requirements for Multihop EAP Lower Layer. internet-draft, IETF. Feb. 2005.Google Scholar
- P. Papadimitratos and Zygmunt J. Haas. Securing Mobile Ad Hoc Networks. The Handbook of Ad Hoc Wireless Networks. CRC Press 2003. Google ScholarDigital Library
- H. Yang, H. Luo, F. Ye, S. Lu and L. Zhang. Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Mag., Feb. 2004. Google ScholarDigital Library
Index Terms
- Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j
Recommendations
Performance analysis of authentication and key distribution scheme for mobile multi-hop relay in IEEE 802.16j
Mobile multi-hop relay (MMR) network is known to be easy to install and convenient to manage because of its self-organizing and self-healing characteristics. However, MMR is vulnerable to security problems because of the same reason. In this paper, we ...
Network coding-based relay for IEEE 802.16j multi-hop relay network
ICACT'10: Proceedings of the 12th international conference on Advanced communication technologyIEEE 802.16j is to enable the operation of multi-hop Relay Stations (RS). It aims to enhance the coverage, per nser throughput and system capacity of IEEE 802.16e. However, the Mobile Stations (MSs) which connect to the RS are suffering from ...
Reduction of relay overhead in IEEE 802.16j mobile multi-hop relay (MMR) networks
CCNC'09: Proceedings of the 6th IEEE Conference on Consumer Communications and Networking ConferenceIn IEEE 802.16j standard, relays are added to increase coverage and improve throughput. However, some overhead results from the inclusion of the relays. One typical example is an addition of R-MAP (Relay MAP) to be included in the header of the frames ...
Comments