Skip to content

Advertisement

  • Research Article
  • Open Access

Authentication Based on Multilayer Clustering in Ad Hoc Networks

  • 1Email author,
  • 1,
  • 2,
  • 1 and
  • 1
EURASIP Journal on Wireless Communications and Networking20052005:289767

https://doi.org/10.1155/WCN.2005.731

  • Received: 30 June 2004
  • Published:

Abstract

In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically examining cluster-based routing. Our proposed protocol, called "authentication based on multilayer clustering for ad hoc networks" (AMCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The AMCAN strategy takes advantage of a multilayer architecture that is designed for an authentication protocol in a cluster head (CH) using a new concept of control cluster head (CCH) scheme. We propose an authentication protocol that uses certificates containing an asymmetric key and a multilayer architecture so that the CCH is achieved using the threshold scheme, thereby reducing the computational overhead and successfully defeating all identified attacks. We also use a more extensive area, such as a CCH, using an identification protocol to build a highly secure, highly available authentication service, which forms the core of our security framework.

Keywords

  • authentication
  • clustering
  • cluster head
  • ad hoc network
  • multilayer

Authors’ Affiliations

(1)
Department of Computer Science & Engineering, Korea University, 1, 5-Ga, Anam-dong, Sungbuk-ku, Seoul, 136-701, Korea
(2)
Department of Computer Science & Engineering, Korea University, 77-6 Sejong-ro, Jongro-gu, Seoul, 110-760, Korea

Copyright

Advertisement