Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Securing mobile ad hoc networks
The handbook of ad hoc wireless networks
Overview of IEEE 802.16 Security
IEEE Security and Privacy
Wireless mesh networks: a survey
Computer Networks and ISDN Systems
Security issues in privacy and key management protocols of IEEE 802.16
Proceedings of the 44th annual Southeast regional conference
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
Computer Communications
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
A self-adaptive K selection mechanism for re-authentication load balancing in large-scale systems
The Journal of Supercomputing
Hi-index | 0.00 |
Mobile multi-hop relay (MMR) network is known to have the strength of easy installation and convenient management because of its self-organizing and self-healing characteristics. However, MMR is also known to be vulnerable to security problems for the very same reason. In this paper, we propose a new hybrid authentication algorithm for IEEE 802.16j MMR network service. The proposed scheme uses centralized authentication when a mobile station (MS) or a relay station (RS) initially joins the MMR network, and uses distributed authentication for hop-by-hop authentication between the mobile nodes. We analyze the procedure of the proposed scheme in detail, and examine its usefulness when applied to the MMR network. The proposed scheme can be used in any mobile multi-hop network as well as IEEE 802.16j MMR network.