Authentication Based on Multilayer Clustering in Ad Hoc Networks
EURASIP Journal on Wireless Communications and Networking volume 2005, Article number: 289767 (2005)
In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically examining cluster-based routing. Our proposed protocol, called "authentication based on multilayer clustering for ad hoc networks" (AMCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The AMCAN strategy takes advantage of a multilayer architecture that is designed for an authentication protocol in a cluster head (CH) using a new concept of control cluster head (CCH) scheme. We propose an authentication protocol that uses certificates containing an asymmetric key and a multilayer architecture so that the CCH is achieved using the threshold scheme, thereby reducing the computational overhead and successfully defeating all identified attacks. We also use a more extensive area, such as a CCH, using an identification protocol to build a highly secure, highly available authentication service, which forms the core of our security framework.
About this article
Cite this article
Lee, KH., Han, SB., Suh, HS. et al. Authentication Based on Multilayer Clustering in Ad Hoc Networks. J Wireless Com Network 2005, 289767 (2005). https://doi.org/10.1155/WCN.2005.731
- cluster head
- ad hoc network