This document discusses a self-adaptive automatch protocol for batch identification in wireless mobile networks. It proposes two algorithms, Condensed Binary Identification (CBI) and Multiple Rounds Identification (MRI), to improve the performance of identifying invalid signatures when batch verification fails at the receiver or sink node. The system forms nodes, transmits encrypted messages through intermediate nodes which may include attackers, and uses the sink node to perform batch verification and identify invalid signatures using the most suitable identification algorithm based on the transaction history of attackers.