**FS1**, **AN3**,θ**ABBH**,**<sup>1</sup>**

[**ABBH** : **SIMO**]*<sup>X</sup>* Honest(*Y*ˆ) <sup>⊃</sup> FirstSend(*Y*, *<sup>y</sup>*, *<sup>X</sup>*ˆ, *<sup>Y</sup>*ˆ, "ABBH1", *INFOY*, *<sup>y</sup>*) (11)

7, 11, **FS2**,θ**ABBH**,**<sup>1</sup>** [**ABBH** : **SIMO**]*<sup>X</sup>* KOHonest(*ptkX*,*Y*, {*pmkX*,*Y*, *pmkY*,*X*}) ⊃ Send(*Y*, *X*ˆ, *Y*ˆ, "ABBH1", *INFOY*, *y*) < Receive(*Y*, *X*ˆ, *Y*ˆ, "ABBH1", *INFOY*, *y*) (12)

1, 7, 8, 10, 12,θ**ABBH**,**<sup>1</sup>** [**ABBH** : **SIMO**]*<sup>X</sup>* KOHonest(*ptkX*,*Y*, {*pmkX*,*Y*, *pmkY*,*X*}) ⊃ (Send(*X*,*Y*ˆ, *<sup>X</sup>*<sup>ˆ</sup> , "ABBH1", *INFOX*, *<sup>x</sup>*) <sup>&</sup>lt; Receive(*Y*,*Y*ˆ, *<sup>X</sup>*<sup>ˆ</sup> , "ABBH1", *INFOX*, *<sup>x</sup>*))<sup>∧</sup> (Send(*Y*, *<sup>X</sup>*<sup>ˆ</sup> , *<sup>Y</sup>*ˆ, "ABBH1", *INFOY*, *<sup>y</sup>*) <sup>&</sup>lt; Receive(*Y*, *<sup>X</sup>*<sup>ˆ</sup> ,*Y*ˆ, "ABBH1", *INFOY*, *<sup>y</sup>*))<sup>∧</sup> (Send(*Y*, *<sup>X</sup>*<sup>ˆ</sup> , *<sup>Y</sup>*ˆ, "ABBH5", *INFOY*, *<sup>y</sup>*, *<sup>x</sup>*,*enc*1, *mic*1) <sup>&</sup>lt; Receive(*X*, *<sup>X</sup>*<sup>ˆ</sup> ,*Y*ˆ, "ABBH5", *INFOY*, *<sup>y</sup>*, *<sup>x</sup>*,*enc*1, *mic*1))<sup>∧</sup> (Send(*X*,*Y*ˆ, *X*ˆ , "ABBH1", *INFOX*, *x*) < Receive(*X*, *X*ˆ ,*Y*ˆ, "ABBH1", *INFOY*, *y*) < (Receive(*X*, *<sup>X</sup>*ˆ, *<sup>Y</sup>*ˆ, "ABBH5", *INFOY*, *<sup>y</sup>*, *<sup>x</sup>*,*enc*1, *mic*1) <sup>∧</sup> Send(*X*,*Y*ˆ, *<sup>X</sup>*<sup>ˆ</sup> , "ABBH5", *INFOX*, *<sup>x</sup>*, *<sup>y</sup>*,*enc*0, *mic*0)))<sup>∧</sup> (Send(*Y*, *X*ˆ , *Y*ˆ, "ABBH1", *INFOY*, *y*) < Receive(*Y*,*Y*ˆ, *X*ˆ, "ABBH1", *INFOX*, *x*) <

Send(*Y*, *X*ˆ, *Y*ˆ, "ABBH5", *INFOY*, *y*, *x*,*enc*1, *mic*1)) (13)

#### **7. References**

	- URL: *citeseer.ist.psu.edu/datta03derivation.html*

24 Will-be-set-by-IN-TECH

Send(*Y*, *X*ˆ, *Y*ˆ, "ABBH5", *INFOY*, *y*, *x*,*enc*1, *mic*1) < Receive(*X*, *X*ˆ, *Y*ˆ, "ABBH5", *INFOY*, *y*, *x*,*enc*1, *mic*1)

FirstSend(*X*, *x*,*Y*ˆ, *X*ˆ , "ABBH1", *INFOX*, *x*) (9)

Send(*X*, *Y*ˆ, *X*ˆ, "ABBH1", *INFOX*, *x*) < Receive(*Y*,*Y*ˆ, *X*ˆ, "ABBH1", *INFOX*, *x*) (10)

Honest(*Y*ˆ) <sup>⊃</sup> FirstSend(*Y*, *<sup>y</sup>*, *<sup>X</sup>*ˆ, *<sup>Y</sup>*ˆ, "ABBH1", *INFOY*, *<sup>y</sup>*) (11)

Send(*Y*, *X*ˆ, *Y*ˆ, "ABBH1", *INFOY*, *y*) < Receive(*Y*, *X*ˆ, *Y*ˆ, "ABBH1", *INFOY*, *y*) (12)

(Send(*Y*, *<sup>X</sup>*<sup>ˆ</sup> , *<sup>Y</sup>*ˆ, "ABBH5", *INFOY*, *<sup>y</sup>*, *<sup>x</sup>*,*enc*1, *mic*1) <sup>&</sup>lt; Receive(*X*, *<sup>X</sup>*<sup>ˆ</sup> ,*Y*ˆ, "ABBH5", *INFOY*, *<sup>y</sup>*, *<sup>x</sup>*,*enc*1, *mic*1))<sup>∧</sup>

(Receive(*X*, *<sup>X</sup>*ˆ, *<sup>Y</sup>*ˆ, "ABBH5", *INFOY*, *<sup>y</sup>*, *<sup>x</sup>*,*enc*1, *mic*1) <sup>∧</sup> Send(*X*,*Y*ˆ, *<sup>X</sup>*<sup>ˆ</sup> , "ABBH5", *INFOX*, *<sup>x</sup>*, *<sup>y</sup>*,*enc*0, *mic*0)))<sup>∧</sup>

Send(*Y*, *X*ˆ, *Y*ˆ, "ABBH5", *INFOY*, *y*, *x*,*enc*1, *mic*1)) (13)

[1] 802.11-2007, I. S. [2007]. Local and metropolitan area networks – specific requirements – part 11: Wireless LAN medium access control and physical layer specifications. [2] Bellare, M. & Rogaway, P. [1993]. Entity authentication and key distribution., *CRYPTO*,

[3] Blunk, L., Vollbrecht, J., Aboba, B., Carlson, J. & Levkowetz, H. [2004]. Extensible authentication protocol (EAP), http://tools.ietf.org/html/draft-ietf-eap-rfc2284bis-09. [4] Braskich, T. & Emeott, S. [2007a]. Clarification and update of MSA overview and MKD functionality text, https://mentor.ieee.org/802.11/documents doc 11-07/2119r1.

(Send(*X*,*Y*ˆ, *<sup>X</sup>*<sup>ˆ</sup> , "ABBH1", *INFOX*, *<sup>x</sup>*) <sup>&</sup>lt; Receive(*Y*,*Y*ˆ, *<sup>X</sup>*<sup>ˆ</sup> , "ABBH1", *INFOX*, *<sup>x</sup>*))<sup>∧</sup> (Send(*Y*, *<sup>X</sup>*<sup>ˆ</sup> , *<sup>Y</sup>*ˆ, "ABBH1", *INFOY*, *<sup>y</sup>*) <sup>&</sup>lt; Receive(*Y*, *<sup>X</sup>*<sup>ˆ</sup> ,*Y*ˆ, "ABBH1", *INFOY*, *<sup>y</sup>*))<sup>∧</sup>

(Send(*X*,*Y*ˆ, *X*ˆ , "ABBH1", *INFOX*, *x*) < Receive(*X*, *X*ˆ ,*Y*ˆ, "ABBH1", *INFOY*, *y*) <

(Send(*Y*, *X*ˆ , *Y*ˆ, "ABBH1", *INFOY*, *y*) < Receive(*Y*,*Y*ˆ, *X*ˆ, "ABBH1", *INFOX*, *x*) <

(8)

2, 7,θ**ABBH**,**<sup>1</sup>** [**ABBH** : **SIMO**]*<sup>X</sup>*

**FS1**, **AN3**,*θ***ABBH**,**<sup>1</sup>** [**ABBH** : **SIMO**]*<sup>X</sup>*

9, **FS2**,θ**ABBH**,**<sup>1</sup>** [**ABBH** : **SIMO**]*<sup>X</sup>*

**FS1**, **AN3**,θ**ABBH**,**<sup>1</sup>** [**ABBH** : **SIMO**]*<sup>X</sup>*

7, 11, **FS2**,θ**ABBH**,**<sup>1</sup>** [**ABBH** : **SIMO**]*<sup>X</sup>*

1, 7, 8, 10, 12,θ**ABBH**,**<sup>1</sup>** [**ABBH** : **SIMO**]*<sup>X</sup>*

**7. References**

pp. 232–249.

KOHonest(*ptkX*,*Y*, {*pmkX*,*Y*, *pmkY*,*X*}) ⊃

KOHonest(*ptkX*,*Y*, {*pmkX*,*Y*, *pmkY*,*X*}) ⊃

KOHonest(*ptkX*,*Y*, {*pmkX*,*Y*, *pmkY*,*X*}) ⊃

	- URL: *citeseer.ist.psu.edu/article/durgin02compositional.html*
	- [23] Fu, J., Jiang, X., Ping, L. & Fan, R. [2009]. A novel rekeying protocol for 802.11s key management, *Proceedings of the 2009 International Conference on Information Management and Engineering*, ICIME '09, IEEE Computer Society, Washington, DC, USA, pp. 295–299. URL: *http://dx.doi.org/10.1109/ICIME.2009.14*

**Achieving Fault-Tolerant Network**

Additional information is available at the end of the chapter

Mobile station

**Figure 1.** Wireless mesh networks and radio coverage

Service area

Svilen Ivanov and Edgar Nett

http://dx.doi.org/10.5772/50173

**1. Introduction**

**Topology in Wireless Mesh Networks**

*Wireless Mesh Network* (WMN) is an ad-hoc network with a fixed network infrastructure (see an example in figure 1). The physical structure of a WMN includes base stations, a backbone and mobile stations. The *base stations* (also known as mesh routers or mesh points) are static wireless nodes, forming the network infrastructure and providing wireless network access to the mobile stations. The *backbone* is a wireless ad-hoc network among the base stations. The fixed network infrastructure provides wireless network access to the mobile stations in a service area. *Service area* is a finite three-dimensional space. The *mobile stations* are wireless

**Chapter 9**

Base station

©2012 Ivanov and Nett" licensee InTech. This is an open access chapter distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0), which permits unrestricted

© 2012 The Author(s). Licensee InTech. This chapter is distributed under the terms of the Creative Commons Attribution License http://creativecommons.org/licenses/by/3.0), which permits unrestricted use, distribution,

use, distribution, and reproduction in any medium, provided the original work is properly cited.

and reproduction in any medium, provided the original work is properly cited.

