Abstract
We apply the idea of systems analysis and integration to constructing the AD hoc network security model based on cluster formation in this paper. In this security model for ad hoc networks, the initial nodes are authorized by the user, or validated by the cluster headers in other clusters when the cluster is created. The cluster header is elected by all nodes in the cluster, and there is a temporary cluster header in charge of the cluster header elections.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Goldsmith A, Wicker SB (2002) Design challenges for energy constrained Ad hoc wireless networks. IEEE Wireless Commun 9(4):8–27
Kachirski O, Guha R (2002) Intrusion detection using mobile agents in wireless Ad Hoc networks. IEEE workshop on knowledge media networking (KMN’02), Tokyo, Japan vol 15, issue no 12, pp 153–158
Tseng C-Y, Balasubramanyam P (2003) Based intrusion Detection system for AODV on Security of Ad Hoc and Sensor Networks (SA VA), USA 10(9):135–139
Royer E, Toh CK (1999) A review of current routing protocols for ad hoc mobile wireless network. IEEE Pers Commun 6(2):46–55
Capkun S, Hubaux J-P, Buttyan L (2003) Mobility helps security in Ad hoc networks. The fourth ACM interational symposium on mobile Ad hoc networking and computing. Annapolis, vol 6, issue no 4, Maryland, pp 46–56
Zhou L, Hass ZJ (1999) Securing ad hoc networks. IEEE Netw 13(6):24–30
Johnson DB, Waltz DA (1996) Dynamic source routing in ad hoc wireless, TImielinski. HK 4th. Mobile computing, vol 6, issue no 3, Kluwer Academic Publisher, Dordrecht, pp 153–181
Zhang Y, Lee W (2007) Intrusion detection in wireless Ad2Hoc networks, Proceedings of the sixth international conference on mobile computing and networking (MobiCom 2000), Boston, vol 7, issue no 3, pp 275–283
Ping Y, Jiag Y-C, Zhang S-yY, Zhong Y-P (2005) A survey of security for mobile ad hoc networks. Acta Electronica Sinica 31(2):161–165
Proctor PE (2002) The practical intrusion detection Handbook. vol 34, issue no 27, Prentice Hall, New York, pp 627–634
Ghosh AK, Schwartzbard A (2009) A study in using neural network for anomaly and misuse detection. In: Proceedings of the 8th USENIX security symposium, vol 14, issue no 9, pp 74–82
Zhag Y, Lee W (2000) Intrusion detection in wireless ad hoc networks. The 6th Annual It conference on mobile computing and networking, Boston, vol 12, issue no 8, pp 275–283
Montenegro G, Castelluccia C (2002) Statistically unique and cryptographically verifable (SUCV) identifers and addresses. Netw Sec Conf 18(9):76–85
Zhou H, Li J, Zhao N, Dai F, Jiang R (2008) An intrusion detection system model for Ad Hoc networks based on the adjacent agent. In: Proceedings of 2008 international conference on multimedia and information technology (MMT 2008), IEEE Computer Society, vol 12, issue no 9, Three Gorges, China, pp 598–601, Dec 30–31
Zhao N, Dai F, Yu Y, Li T (2008) An extended process model supporting software evolution. In: Proceedings of 2008 International symposium on intelligent information technology application (IITA 2008), vol 12, issue no 9, IEEE Computer Society, Shanghai, China, pp 1013–1016
Zhao N, Yang Z, Li T (2005) A method of modelling and performance analysis for concurrent development process of software. In: Proceedings of the 11th joint international computer conference, vol 24, issue no 11, World Scientific, New Jersey, pp 803–809
Zhao N, Li T, Yang LL, Yu Y, Dai F, Zhang W (2009) The resource optimization of software evolution processes. In: Proceedings of 2009 international conference on advanced computer control (ICACC 2009), vol 12, issue no 8, Singapore, pp 332–336
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this paper
Cite this paper
Hu, S. (2013). Security Model Based on Cluster Formation in Ad Hoc Network. In: Zhong, Z. (eds) Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012. Lecture Notes in Electrical Engineering, vol 219. Springer, London. https://doi.org/10.1007/978-1-4471-4853-1_21
Download citation
DOI: https://doi.org/10.1007/978-1-4471-4853-1_21
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-4852-4
Online ISBN: 978-1-4471-4853-1
eBook Packages: EngineeringEngineering (R0)