Authentication based on multilayer clustering in ad hoc networks

Keun Ho Lee, Sang Bum Han, Heyi Sook Suh, Sang-Geun Lee, Chong Sun Hwang

Research output: Contribution to journalArticle

6 Citations (Scopus)

Abstract

In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically examining cluster-based routing. Our proposed protocol, called "authentication based on multilayer clustering for ad hoc networks" (AMCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The AMCAN strategy takes advantage of a multilayer architecture that is designed for an authentication protocol in a cluster head (CH) using a new concept of control cluster head (CCH) scheme. We propose an authentication protocol that uses certificates containing an asymmetric key and a multilayer architecture so that the CCH is achieved using the threshold scheme, thereby reducing the computational overhead and successfully defeating all identified attacks. We also use a more extensive area, such as a CCH, using an identification protocol to build a highly secure, highly available authentication service, which forms the core of our security framework.

Original languageEnglish
Pages (from-to)731-742
Number of pages12
JournalEurasip Journal on Wireless Communications and Networking
Volume2005
Issue number5
DOIs
Publication statusPublished - 2005

Keywords

  • Ad hoc network
  • Authentication
  • Cluster head
  • Clustering
  • Multilayer

ASJC Scopus subject areas

  • Signal Processing
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Authentication based on multilayer clustering in ad hoc networks'. Together they form a unique fingerprint.

  • Cite this