Authentication based on multilayer clustering in ad hoc networks

  • Authors:
  • Keun-Ho Lee;Sang-Bum Han;Heyi-Sook Suh;SangKeun Lee;Chong-Sun Hwang

  • Affiliations:
  • Department of Computer Science & Engineering, Korea University, Seoul, Korea;Department of Computer Science & Engineering, Korea University, Seoul, Korea;Department of Computer Science & Engineering, Korea University, Seoul, Korea;Department of Computer Science & Engineering, Korea University, Seoul, Korea;Department of Computer Science & Engineering, Korea University, Seoul, Korea

  • Venue:
  • EURASIP Journal on Wireless Communications and Networking
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically examining cluster-based routing. Our proposed protocol, called "authentication based on multilayer clustering for ad hoc networks" (AMCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The AMCAN strategy takes advantage of a multilayer architecture that is designed for an authentication protocol in a cluster head (CH) using a new concept of control cluster head (CCH) scheme. We propose an authentication protocol that uses certificates containing an asymmetric key and a multilayer architecture so that the CCH is achieved using the threshold scheme, thereby reducing the computational overhead and successfully defeating all identified attacks. We also use a more extensive area, such as a CCH, using an identification protocol to build a highly secure, highly available authentication service, which forms the core of our security framework.