Skip to main content

Authentication Based on Multilayer Clustering in Ad Hoc Networks


In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically examining cluster-based routing. Our proposed protocol, called "authentication based on multilayer clustering for ad hoc networks" (AMCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The AMCAN strategy takes advantage of a multilayer architecture that is designed for an authentication protocol in a cluster head (CH) using a new concept of control cluster head (CCH) scheme. We propose an authentication protocol that uses certificates containing an asymmetric key and a multilayer architecture so that the CCH is achieved using the threshold scheme, thereby reducing the computational overhead and successfully defeating all identified attacks. We also use a more extensive area, such as a CCH, using an identification protocol to build a highly secure, highly available authentication service, which forms the core of our security framework.

Author information



Corresponding author

Correspondence to Keun-Ho Lee.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Lee, K., Han, S., Suh, H. et al. Authentication Based on Multilayer Clustering in Ad Hoc Networks. J Wireless Com Network 2005, 289767 (2005).

Download citation


  • authentication
  • clustering
  • cluster head
  • ad hoc network
  • multilayer