Authentication based on multilayer clustering in ad hoc networks

Keun Ho Lee, Sang Bum Han, Heyi Sook Suh, Sang-Geun Lee, Chong Sun Hwang

Research output: Contribution to journalArticle

6 Citations (Scopus)

Abstract

In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically examining cluster-based routing. Our proposed protocol, called "authentication based on multilayer clustering for ad hoc networks" (AMCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The AMCAN strategy takes advantage of a multilayer architecture that is designed for an authentication protocol in a cluster head (CH) using a new concept of control cluster head (CCH) scheme. We propose an authentication protocol that uses certificates containing an asymmetric key and a multilayer architecture so that the CCH is achieved using the threshold scheme, thereby reducing the computational overhead and successfully defeating all identified attacks. We also use a more extensive area, such as a CCH, using an identification protocol to build a highly secure, highly available authentication service, which forms the core of our security framework.

Original languageEnglish
Pages (from-to)731-742
Number of pages12
JournalEurasip Journal on Wireless Communications and Networking
Volume2005
Issue number5
DOIs
Publication statusPublished - 2005 Dec 1

Fingerprint

Ad hoc networks
Authentication
Multilayers
Network protocols
Routing protocols

Keywords

  • Ad hoc network
  • Authentication
  • Cluster head
  • Clustering
  • Multilayer

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications
  • Media Technology

Cite this

Authentication based on multilayer clustering in ad hoc networks. / Lee, Keun Ho; Han, Sang Bum; Suh, Heyi Sook; Lee, Sang-Geun; Hwang, Chong Sun.

In: Eurasip Journal on Wireless Communications and Networking, Vol. 2005, No. 5, 01.12.2005, p. 731-742.

Research output: Contribution to journalArticle

Lee, Keun Ho ; Han, Sang Bum ; Suh, Heyi Sook ; Lee, Sang-Geun ; Hwang, Chong Sun. / Authentication based on multilayer clustering in ad hoc networks. In: Eurasip Journal on Wireless Communications and Networking. 2005 ; Vol. 2005, No. 5. pp. 731-742.
@article{00c5141fbc564da69a3f8896b8778516,
title = "Authentication based on multilayer clustering in ad hoc networks",
abstract = "In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically examining cluster-based routing. Our proposed protocol, called {"}authentication based on multilayer clustering for ad hoc networks{"} (AMCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The AMCAN strategy takes advantage of a multilayer architecture that is designed for an authentication protocol in a cluster head (CH) using a new concept of control cluster head (CCH) scheme. We propose an authentication protocol that uses certificates containing an asymmetric key and a multilayer architecture so that the CCH is achieved using the threshold scheme, thereby reducing the computational overhead and successfully defeating all identified attacks. We also use a more extensive area, such as a CCH, using an identification protocol to build a highly secure, highly available authentication service, which forms the core of our security framework.",
keywords = "Ad hoc network, Authentication, Cluster head, Clustering, Multilayer",
author = "Lee, {Keun Ho} and Han, {Sang Bum} and Suh, {Heyi Sook} and Sang-Geun Lee and Hwang, {Chong Sun}",
year = "2005",
month = "12",
day = "1",
doi = "10.1155/WCN.2005.731",
language = "English",
volume = "2005",
pages = "731--742",
journal = "Eurasip Journal on Wireless Communications and Networking",
issn = "1687-1472",
publisher = "Springer Publishing Company",
number = "5",

}

TY - JOUR

T1 - Authentication based on multilayer clustering in ad hoc networks

AU - Lee, Keun Ho

AU - Han, Sang Bum

AU - Suh, Heyi Sook

AU - Lee, Sang-Geun

AU - Hwang, Chong Sun

PY - 2005/12/1

Y1 - 2005/12/1

N2 - In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically examining cluster-based routing. Our proposed protocol, called "authentication based on multilayer clustering for ad hoc networks" (AMCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The AMCAN strategy takes advantage of a multilayer architecture that is designed for an authentication protocol in a cluster head (CH) using a new concept of control cluster head (CCH) scheme. We propose an authentication protocol that uses certificates containing an asymmetric key and a multilayer architecture so that the CCH is achieved using the threshold scheme, thereby reducing the computational overhead and successfully defeating all identified attacks. We also use a more extensive area, such as a CCH, using an identification protocol to build a highly secure, highly available authentication service, which forms the core of our security framework.

AB - In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically examining cluster-based routing. Our proposed protocol, called "authentication based on multilayer clustering for ad hoc networks" (AMCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The AMCAN strategy takes advantage of a multilayer architecture that is designed for an authentication protocol in a cluster head (CH) using a new concept of control cluster head (CCH) scheme. We propose an authentication protocol that uses certificates containing an asymmetric key and a multilayer architecture so that the CCH is achieved using the threshold scheme, thereby reducing the computational overhead and successfully defeating all identified attacks. We also use a more extensive area, such as a CCH, using an identification protocol to build a highly secure, highly available authentication service, which forms the core of our security framework.

KW - Ad hoc network

KW - Authentication

KW - Cluster head

KW - Clustering

KW - Multilayer

UR - http://www.scopus.com/inward/record.url?scp=33746827782&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33746827782&partnerID=8YFLogxK

U2 - 10.1155/WCN.2005.731

DO - 10.1155/WCN.2005.731

M3 - Article

AN - SCOPUS:33746827782

VL - 2005

SP - 731

EP - 742

JO - Eurasip Journal on Wireless Communications and Networking

JF - Eurasip Journal on Wireless Communications and Networking

SN - 1687-1472

IS - 5

ER -