Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to Increase Digital C 2009
DOI: 10.1145/1551722.1551734
|View full text |Cite
|
Sign up to set email alerts
|

Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…At the same time, there must exist other equally secure ways of authentication so that the network can function even if the authentication server is unreachable [26,27]. A similar approach that implements hybrid authentication is presented in [22] which, discusses a multi-level model for authentication. However, the model can only be applied to static wireless mesh networks and not the dynamic wireless mesh networks.…”
Section: Related Workmentioning
confidence: 99%
“…At the same time, there must exist other equally secure ways of authentication so that the network can function even if the authentication server is unreachable [26,27]. A similar approach that implements hybrid authentication is presented in [22] which, discusses a multi-level model for authentication. However, the model can only be applied to static wireless mesh networks and not the dynamic wireless mesh networks.…”
Section: Related Workmentioning
confidence: 99%
“…In order to solve the problems like security zone key update, DDoS attack, and rogue RS attack, in [20], the authors propose a design of hybrid authentication and key distribution scheme to support the IEEE 802.16j (part of current IEEE 802.16-2012 standard) MMR requirements. Although the authors claim that this hybrid design is robust enough to prevent rogue node attack, they only consider the case when a rogue RS tries to join the network at initial phase, and they do not take rogue BS attack into account.…”
Section: Related Workmentioning
confidence: 99%
“…However, the authors did not take rogue access node attack into consideration. In order to solve the problems like security zone key update, DDoS attack and rogue RS attack, in [8], the authors propose a design of hybrid authentication and key distribution scheme to support the IEEE 802.16j MMR requirements. Although the authors claim that this hybrid design is robust enough to prevent rogue node attack, they only consider the case when a rogue RS tries to join the network at initial phase, and they do not take rogue BS attack into account.…”
Section: Related Workmentioning
confidence: 99%