Cluster-Based Secure Data Transmission Solution for Ad Hoc Network

  • Hwan-Seok Yang
  • Joung-Min Kim
  • Seung-Kyu Park
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4088)


This study proposes a cluster-based data transmission solution for ad hoc networks. In the proposed concept, when a cluster is formed, cluster head receives the trust values of neighboring nodes and evaluates the trust of cluster member nodes in an accurate and efficient way using trust values it received and its own leader value. This mechanism enables cluster head to authenticate new nodes randomly joining the cluster. In addition, a limited broadcasting mechanism was used by reducing the amount of control packets in an effort to enhance the efficiency in data transmission. The number of cluster heads, the communication path length and the amount of control packets were measured to verify the efficiency of the proposed concept.


Mobile Node Cluster Head Neighboring Node Control Packet Gateway Node 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Luo, H., Lu, S.: Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks. Technical Report TR-200030, Dept. of Computer Science, UCLA (2000)Google Scholar
  2. 2.
    Venkatraman, L., Agrawal, D.P.: A Novel Authentication scheme for Ad Hoc Networks. In: Wireless Communications and Networking Conference (2000)Google Scholar
  3. 3.
    Desmedt, Y., Jajodia, S.: Redistributing secret shares to new access structures and its applications., George Mason Univ., Tech. Rep (1997)Google Scholar
  4. 4.
    Zhou, L., Hass, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)CrossRefGoogle Scholar
  5. 5.
    Bayya, A., Gupte, S., Shukla, Y., Garikapati, A.: Security in Ad hoc networks, CS 685, Computer Science Department University of KentuckyGoogle Scholar
  6. 6.
    Lo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing ad hoc wireless networks. In: Proc. 7th IEEE Symp. On Comp. and Communication (ISCC), Taormina (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Hwan-Seok Yang
    • 1
  • Joung-Min Kim
    • 1
  • Seung-Kyu Park
    • 2
  1. 1.Computer Science and Statistic Graduate SchoolChosun UnivKorea
  2. 2.Dept. of Cyber Investigation PoliceHowon UnivKorea

Personalised recommendations