Skip to main content

Security Model Based on Cluster Formation in Ad Hoc Network

  • Conference paper
  • First Online:
  • 883 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 219))

Abstract

We apply the idea of systems analysis and integration to constructing the AD hoc network security model based on cluster formation in this paper. In this security model for ad hoc networks, the initial nodes are authorized by the user, or validated by the cluster headers in other clusters when the cluster is created. The cluster header is elected by all nodes in the cluster, and there is a temporary cluster header in charge of the cluster header elections.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Goldsmith A, Wicker SB (2002) Design challenges for energy constrained Ad hoc wireless networks. IEEE Wireless Commun 9(4):8–27

    Article  Google Scholar 

  2. Kachirski O, Guha R (2002) Intrusion detection using mobile agents in wireless Ad Hoc networks. IEEE workshop on knowledge media networking (KMN’02), Tokyo, Japan vol 15, issue no 12, pp 153–158

    Google Scholar 

  3. Tseng C-Y, Balasubramanyam P (2003) Based intrusion Detection system for AODV on Security of Ad Hoc and Sensor Networks (SA VA), USA 10(9):135–139

    Google Scholar 

  4. Royer E, Toh CK (1999) A review of current routing protocols for ad hoc mobile wireless network. IEEE Pers Commun 6(2):46–55

    Article  Google Scholar 

  5. Capkun S, Hubaux J-P, Buttyan L (2003) Mobility helps security in Ad hoc networks. The fourth ACM interational symposium on mobile Ad hoc networking and computing. Annapolis, vol 6, issue no 4, Maryland, pp 46–56

    Google Scholar 

  6. Zhou L, Hass ZJ (1999) Securing ad hoc networks. IEEE Netw 13(6):24–30

    Google Scholar 

  7. Johnson DB, Waltz DA (1996) Dynamic source routing in ad hoc wireless, TImielinski. HK 4th. Mobile computing, vol 6, issue no 3, Kluwer Academic Publisher, Dordrecht, pp 153–181

    Google Scholar 

  8. Zhang Y, Lee W (2007) Intrusion detection in wireless Ad2Hoc networks, Proceedings of the sixth international conference on mobile computing and networking (MobiCom 2000), Boston, vol 7, issue no 3, pp 275–283

    Google Scholar 

  9. Ping Y, Jiag Y-C, Zhang S-yY, Zhong Y-P (2005) A survey of security for mobile ad hoc networks. Acta Electronica Sinica 31(2):161–165

    Google Scholar 

  10. Proctor PE (2002) The practical intrusion detection Handbook. vol 34, issue no 27, Prentice Hall, New York, pp 627–634

    Google Scholar 

  11. Ghosh AK, Schwartzbard A (2009) A study in using neural network for anomaly and misuse detection. In: Proceedings of the 8th USENIX security symposium, vol 14, issue no 9, pp 74–82

    Google Scholar 

  12. Zhag Y, Lee W (2000) Intrusion detection in wireless ad hoc networks. The 6th Annual It conference on mobile computing and networking, Boston, vol 12, issue no 8, pp 275–283

    Google Scholar 

  13. Montenegro G, Castelluccia C (2002) Statistically unique and cryptographically verifable (SUCV) identifers and addresses. Netw Sec Conf 18(9):76–85

    Google Scholar 

  14. Zhou H, Li J, Zhao N, Dai F, Jiang R (2008) An intrusion detection system model for Ad Hoc networks based on the adjacent agent. In: Proceedings of 2008 international conference on multimedia and information technology (MMT 2008), IEEE Computer Society, vol 12, issue no 9, Three Gorges, China, pp 598–601, Dec 30–31

    Google Scholar 

  15. Zhao N, Dai F, Yu Y, Li T (2008) An extended process model supporting software evolution. In: Proceedings of 2008 International symposium on intelligent information technology application (IITA 2008), vol 12, issue no 9, IEEE Computer Society, Shanghai, China, pp 1013–1016

    Google Scholar 

  16. Zhao N, Yang Z, Li T (2005) A method of modelling and performance analysis for concurrent development process of software. In: Proceedings of the 11th joint international computer conference, vol 24, issue no 11, World Scientific, New Jersey, pp 803–809

    Google Scholar 

  17. Zhao N, Li T, Yang LL, Yu Y, Dai F, Zhang W (2009) The resource optimization of software evolution processes. In: Proceedings of 2009 international conference on advanced computer control (ICACC 2009), vol 12, issue no 8, Singapore, pp 332–336

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shuyu Hu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this paper

Cite this paper

Hu, S. (2013). Security Model Based on Cluster Formation in Ad Hoc Network. In: Zhong, Z. (eds) Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012. Lecture Notes in Electrical Engineering, vol 219. Springer, London. https://doi.org/10.1007/978-1-4471-4853-1_21

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4853-1_21

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4852-4

  • Online ISBN: 978-1-4471-4853-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics