Browse > Article

Hybrid Authentication Scheme for Mobile Multi-hop Relay in IEEE 802.16j  

Lee, Yong (Dept. of Electron. and Comm., ChungJu National University)
Lee, Goo-Yeon (Dept. of Computer Eng. Kangwon National University)
Publication Information
Abstract
It is easy to install and maintain a mobile multi-hop wireless network due to its self-organizing characteristics. However it has security weakness of the authentication of mobile multi-hop relay stations. Specially, the mobile multi-hop relay network in the IEEE 802.16j has the additional security weakness caused by the requirement of backward compatibility for mobile stations of the conventional IEEE 802.16 system. In this paper, we propose a novel mutual authentication scheme applicable to IEEE 802.16j-based mobile multi-hop relay network architecture. The scheme is able to resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which have been considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively. Also, we analyze the effectiveness of the proposed hybrid authentication method.
Keywords
IEEE 802.16j;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Baronti, P. Phllai, V.W.C. Chook, S. Chessa, A. Gotta, and Y.F. Hu, 'Wireless sensor networks : A survey on the state of the art and the 802.15.4 and ZigBee standards,' Computer Communications, Elsevier, Vol. 30, Issue 7, pp. 1655-1695, May 2007   DOI   ScienceOn
2 IEEE 802.11 WG, IEEE 802.11s/D0.01, March 2006. http://www.802wirelessworld.com
3 IEEE Standard 802.16-2004, 'Air Interface for Fixed Broadband Wireless Access Systems,' IEEE, October 2004
4 B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson and H. Levkowetz, 'Extension Authentication Protocol(EAP),' IETF RFC 3748, June 2004
5 EEE 802.16's Relay Task Group, ]http:// www.802wirelessworld.com
6 IEEE P802.16e/D7, 'Air Interface for Fixed and Mobile Broadband Wireless Access Systems: Amendment for Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands,' IEEE, April 2005
7 D 2.4 Multi-radio Access Architecture', WWI Ambient Network Project, 2005
8 Sen Xu, Manton Matthews and Chin-Tser Huang, 'Security Issues in Privacy and Key Management Protocols of IEEE 802.16,' ACM SE'06, Florida USA. March 2006
9 R. Falk, A. Prasad, and A. Tschofenig, 'Secure Access Over Multi-hop Relay Extension of Public Networks,' WPMC 2005, Aslborg, Denmark, Sep. 2005
10 I. F. Akyildiz, X. Wang and W. Wang, 'Wireless Mesh Networks: a survey,' Computer Networks, Elsevier, 2005
11 Srdjan Capkun, Levente Buttyan, and Jean-Pierre Hubaux, 'Self-Organized Public-Key Management for Mobile Ad Hoc Networks,' IEEE Transactionson Mobile Computing, Vol. 2, No. 1, pp. 52-64, Jan-Mar 2003   DOI   ScienceOn
12 Lidong Zhou and Zygmunt J. Haas, 'Securing Ad Hoc Networks,' IEEE Network Mag., 1999
13 Lusheng Ji, Brian Feldman and Jonathan Agre, 'Self-Organizing Security Scheme for Multi-hop Wireless Access Networks,' 2004 IEEE Aerospace Conference, pp. 1231-1240, 2004
14 Arkoudi-V. Aikaterini, Security of IEEE 802,16, MS thesis, Dept. of Computer and Systems Science, Royal Institute of Technology, 2006
15 Yanchao Zhang and Yuguang Gang, 'ARSA : An Attck-Resilient Security Architecture for Multihop Wireless Mesh Networks,' IEEE Journal on Selected Areas in Communications, Vol. 24, No. 10, pp. 1916-1928 Oct. 2006   DOI   ScienceOn