Open Access

Authentication Based on Multilayer Clustering in Ad Hoc Networks

  • Keun-Ho Lee1Email author,
  • Sang-Bum Han1,
  • Heyi-Sook Suh2,
  • Sang Keun Lee1 and
  • Chong-Sun Hwang1
EURASIP Journal on Wireless Communications and Networking20052005:289767

Received: 30 June 2004

Published: 12 December 2005


In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically examining cluster-based routing. Our proposed protocol, called "authentication based on multilayer clustering for ad hoc networks" (AMCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The AMCAN strategy takes advantage of a multilayer architecture that is designed for an authentication protocol in a cluster head (CH) using a new concept of control cluster head (CCH) scheme. We propose an authentication protocol that uses certificates containing an asymmetric key and a multilayer architecture so that the CCH is achieved using the threshold scheme, thereby reducing the computational overhead and successfully defeating all identified attacks. We also use a more extensive area, such as a CCH, using an identification protocol to build a highly secure, highly available authentication service, which forms the core of our security framework.


authenticationclusteringcluster headad hoc networkmultilayer

Authors’ Affiliations

Department of Computer Science & Engineering, Korea University
Department of Computer Science & Engineering, Korea University


© Keun-Ho Lee et al. 2005

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.