Authentication Based on Multilayer Clustering in Ad Hoc Networks

  • PDF / 1,084,655 Bytes
  • 12 Pages / 612 x 792 pts (letter) Page_size
  • 14 Downloads / 198 Views

DOWNLOAD

REPORT


Authentication Based on Multilayer Clustering in Ad Hoc Networks Keun-Ho Lee Department of Computer Science & Engineering, Korea University, 1, 5-Ga, Anam-dong, Sungbuk-ku, Seoul 136-701, Korea Email: [email protected]

Sang-Bum Han Department of Computer Science & Engineering, Korea University, 1, 5-Ga, Anam-dong, Sungbuk-ku, Seoul 136-701, Korea Email: [email protected]

Heyi-Sook Suh Department of Computer Science & Engineering, Korea University, 77-6 Sejong-ro, Jongro-gu, Seoul 110-760, Korea Email: [email protected]

SangKeun Lee Department of Computer Science & Engineering, Korea University, 1, 5-Ga, Anam-dong, Sungbuk-ku, Seoul 136-701, Korea Email: [email protected]

Chong-Sun Hwang Department of Computer Science & Engineering, Korea University, 1, 5-Ga, Anam-dong, Sungbuk-ku, Seoul 136-701, Korea Email: [email protected] Received 30 June 2004; Revised 2 August 2005 In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically examining cluster-based routing. Our proposed protocol, called “authentication based on multilayer clustering for ad hoc networks” (AMCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The AMCAN strategy takes advantage of a multilayer architecture that is designed for an authentication protocol in a cluster head (CH) using a new concept of control cluster head (CCH) scheme. We propose an authentication protocol that uses certificates containing an asymmetric key and a multilayer architecture so that the CCH is achieved using the threshold scheme, thereby reducing the computational overhead and successfully defeating all identified attacks. We also use a more extensive area, such as a CCH, using an identification protocol to build a highly secure, highly available authentication service, which forms the core of our security framework. Keywords and phrases: authentication, clustering, cluster head, ad hoc network, multilayer.

1.

INTRODUCTION

Mobile ad hoc networks consist of devices that are autonomously self-organized into networks. In ad hoc networks, the devices themselves are the network, and this allows seamless communication, at low cost, with a selforganizing capability, which makes mobile ad hoc networks completely different from any other networking solution. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Mobile ad hoc networking is one of the most innovative and challenging areas of wireless networking. Ad hoc networks are a key step in the evolution of wireless networks. An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administra