An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
A fast quantum mechanical algorithm for database search
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Overview of IEEE 802.16 Security
IEEE Security and Privacy
Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks
Journal of Parallel and Distributed Computing
Secured macro/micro-mobility protocol for multi-hop cellular IP
Pervasive and Mobile Computing
Hi-index | 0.00 |
Mobile Relay Stations (RSs) provide Broadband Wireless Access (BWA) networks with additional mobility, which extends network coverage and advances dynamic networking and ubiquitous computing. However, there are many unresolved security velnerabilities in the current IEEE 802.16 standard, such as BS/RS spoofing. Additional measures are needed to ensure that each component in the network is a trusted entity, verified by a trusted server and accessible through secure private channels. We suggest a Distributed Trust Relationship (DTR) with Polynomial-based Key Generation as a way of mutually validating trustworthiness between network components and preventing compromised components from infecting the entire network.