Multistage Authentication Scheme for Mobile Ad-Hoc Network Using Clustering Mechanism

  • Hyewon K. Lee
  • Jaeyoung Choi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4208)


While applicable fields of ad-hoc network become extensive, security gets more attention, especially authentication. Threshold cryptography [7] allows ad-hoc nodes to authenticate each other by cooperation of nodes. There are many authentication schemes based on threshold cryptography, but these assume pre-key distribution before network configuration. This paper proposes a reliable multistage authentication scheme for clustering based wireless ad-hoc networks. The secured key distribution mechanism is considered in contrast to current schemes. Every node in networks is required to authenticate another before data transmission. The effectiveness of the proposed scheme is verified by means of simulations.


Cluster Head Destination Node Authentication Scheme Common Node Total Latency 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Zhou, L., Hass, Z.J.: Securing Ad-Hoc Networks. IEEE Network Magazine 13(6), 24–30 (1999)CrossRefGoogle Scholar
  2. 2.
    Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In: ICNP 2001, pp. 251–260 (2001)Google Scholar
  3. 3.
    Frankel, Y., Desmedt, Y.G.: Parallel Reliable Threshold Multisignature. Tech. Report TR-92-04-02, Univ. of Wisconsin-Milwaukee (2002)Google Scholar
  4. 4.
    Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, Heidelberg (1990)Google Scholar
  5. 5.
    Heinzelman, W.R., Chandrakasan, A., Balakrishnon, H.: Energy Efficient Communication in Protocol for Wireless Microsensor Networks. In: IEEE Proc. Hawaii Int’l. Conf. Sys. Sci., pp. 1–10 (2000)Google Scholar
  6. 6.
    Kulik, J., Heinzelman, W.R., Balakrishnon, H.: Negotiation-Based Protocols for Disseminating Information Dissemination in Wireless Sensor Networks. Selected Papers from Mobicom 1999, pp. 169–185 (2002)Google Scholar
  7. 7.
    Shamir, A.: How to Share a Secret. Massachusetts Institute of Technology Communication of the ACM 22(11), 612–613 (1979)MATHMathSciNetGoogle Scholar
  8. 8.
    Chiang, C., Wu, H., Liu, W., Gerla, M.: Routing in Clustered Multihop, Mobile wireless Networks with Fading Channel. In: Proc. IEEE Singapore International Conference on Networks, Singapore (1997)Google Scholar
  9. 9.
    Jordan, R., Abdallah, C.T.: Wireless Communications and Networking: an Overview. Antennas and Propagation Magazine, IEEE (2002)Google Scholar
  10. 10.
    Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in Mobile Ad Hoc Networks: Challenge and Solution. IEEE Wireless Communications (2004)Google Scholar
  11. 11.
    Mishra, A., Nadkarni, K., Patcha, A., Tech, V.: Intrusion Detection in Wireless Ad Hoc Networks. IEEE Wireless Communications (2004)Google Scholar
  12. 12.
    Perkins, C., Bhagwat, P.: Highly Dynamic Destination Sequence Distance Vector Routing (DSDV) for Mobile Computers. In: Proceedings of ACM SIGCOMM 1994, London, UK, pp. 234–244 (1994)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Hyewon K. Lee
    • 1
  • Jaeyoung Choi
    • 2
  1. 1.Korea Information Security AgencySeoulKorea
  2. 2.School of ComputingSoongsil UniversitySeoulKorea

Personalised recommendations