{"title":"Network entry process security in IEEE 802.16 mesh mode","authors":"Mohamed Amin Jabri, Lamia Ben Azzouz","doi":"10.1109/WD.2008.4812902","DOIUrl":null,"url":null,"abstract":"IEEE 802.16 in its mesh mode relies on the Network Entry Process to authenticate and register new node joining the network. This process is fundamental to form the mesh network topology. However, few research activities have addressed the security of this process. In this paper, we show that the network entry process can fail under many attacks (Topological attacks, Selfish behavior and denial of service attacks), and then we give solutions in order to avoid these threats.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"221 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 1st IFIP Wireless Days","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WD.2008.4812902","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
IEEE 802.16 in its mesh mode relies on the Network Entry Process to authenticate and register new node joining the network. This process is fundamental to form the mesh network topology. However, few research activities have addressed the security of this process. In this paper, we show that the network entry process can fail under many attacks (Topological attacks, Selfish behavior and denial of service attacks), and then we give solutions in order to avoid these threats.