Security Model Based on Cluster Formation in Ad Hoc Network

  • Shuyu Hu
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 219)


We apply the idea of systems analysis and integration to constructing the AD hoc network security model based on cluster formation in this paper. In this security model for ad hoc networks, the initial nodes are authorized by the user, or validated by the cluster headers in other clusters when the cluster is created. The cluster header is elected by all nodes in the cluster, and there is a temporary cluster header in charge of the cluster header elections.


Ad hoc networks Cluster formation Security 


  1. 1.
    Goldsmith A, Wicker SB (2002) Design challenges for energy constrained Ad hoc wireless networks. IEEE Wireless Commun 9(4):8–27CrossRefGoogle Scholar
  2. 2.
    Kachirski O, Guha R (2002) Intrusion detection using mobile agents in wireless Ad Hoc networks. IEEE workshop on knowledge media networking (KMN’02), Tokyo, Japan vol 15, issue no 12, pp 153–158Google Scholar
  3. 3.
    Tseng C-Y, Balasubramanyam P (2003) Based intrusion Detection system for AODV on Security of Ad Hoc and Sensor Networks (SA VA), USA 10(9):135–139Google Scholar
  4. 4.
    Royer E, Toh CK (1999) A review of current routing protocols for ad hoc mobile wireless network. IEEE Pers Commun 6(2):46–55CrossRefGoogle Scholar
  5. 5.
    Capkun S, Hubaux J-P, Buttyan L (2003) Mobility helps security in Ad hoc networks. The fourth ACM interational symposium on mobile Ad hoc networking and computing. Annapolis, vol 6, issue no 4, Maryland, pp 46–56Google Scholar
  6. 6.
    Zhou L, Hass ZJ (1999) Securing ad hoc networks. IEEE Netw 13(6):24–30Google Scholar
  7. 7.
    Johnson DB, Waltz DA (1996) Dynamic source routing in ad hoc wireless, TImielinski. HK 4th. Mobile computing, vol 6, issue no 3, Kluwer Academic Publisher, Dordrecht, pp 153–181Google Scholar
  8. 8.
    Zhang Y, Lee W (2007) Intrusion detection in wireless Ad2Hoc networks, Proceedings of the sixth international conference on mobile computing and networking (MobiCom 2000), Boston, vol 7, issue no 3, pp 275–283Google Scholar
  9. 9.
    Ping Y, Jiag Y-C, Zhang S-yY, Zhong Y-P (2005) A survey of security for mobile ad hoc networks. Acta Electronica Sinica 31(2):161–165Google Scholar
  10. 10.
    Proctor PE (2002) The practical intrusion detection Handbook. vol 34, issue no 27, Prentice Hall, New York, pp 627–634Google Scholar
  11. 11.
    Ghosh AK, Schwartzbard A (2009) A study in using neural network for anomaly and misuse detection. In: Proceedings of the 8th USENIX security symposium, vol 14, issue no 9, pp 74–82Google Scholar
  12. 12.
    Zhag Y, Lee W (2000) Intrusion detection in wireless ad hoc networks. The 6th Annual It conference on mobile computing and networking, Boston, vol 12, issue no 8, pp 275–283Google Scholar
  13. 13.
    Montenegro G, Castelluccia C (2002) Statistically unique and cryptographically verifable (SUCV) identifers and addresses. Netw Sec Conf 18(9):76–85Google Scholar
  14. 14.
    Zhou H, Li J, Zhao N, Dai F, Jiang R (2008) An intrusion detection system model for Ad Hoc networks based on the adjacent agent. In: Proceedings of 2008 international conference on multimedia and information technology (MMT 2008), IEEE Computer Society, vol 12, issue no 9, Three Gorges, China, pp 598–601, Dec 30–31Google Scholar
  15. 15.
    Zhao N, Dai F, Yu Y, Li T (2008) An extended process model supporting software evolution. In: Proceedings of 2008 International symposium on intelligent information technology application (IITA 2008), vol 12, issue no 9, IEEE Computer Society, Shanghai, China, pp 1013–1016Google Scholar
  16. 16.
    Zhao N, Yang Z, Li T (2005) A method of modelling and performance analysis for concurrent development process of software. In: Proceedings of the 11th joint international computer conference, vol 24, issue no 11, World Scientific, New Jersey, pp 803–809Google Scholar
  17. 17.
    Zhao N, Li T, Yang LL, Yu Y, Dai F, Zhang W (2009) The resource optimization of software evolution processes. In: Proceedings of 2009 international conference on advanced computer control (ICACC 2009), vol 12, issue no 8, Singapore, pp 332–336Google Scholar

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  1. 1.Liaoning Medical UniversityJinzhouChina

Personalised recommendations