Skip to main content

Cluster-Based Secure Data Transmission Solution for Ad Hoc Network

  • Conference paper
Agent Computing and Multi-Agent Systems (PRIMA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4088))

Included in the following conference series:

  • 952 Accesses

Abstract

This study proposes a cluster-based data transmission solution for ad hoc networks. In the proposed concept, when a cluster is formed, cluster head receives the trust values of neighboring nodes and evaluates the trust of cluster member nodes in an accurate and efficient way using trust values it received and its own leader value. This mechanism enables cluster head to authenticate new nodes randomly joining the cluster. In addition, a limited broadcasting mechanism was used by reducing the amount of control packets in an effort to enhance the efficiency in data transmission. The number of cluster heads, the communication path length and the amount of control packets were measured to verify the efficiency of the proposed concept.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Luo, H., Lu, S.: Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks. Technical Report TR-200030, Dept. of Computer Science, UCLA (2000)

    Google Scholar 

  2. Venkatraman, L., Agrawal, D.P.: A Novel Authentication scheme for Ad Hoc Networks. In: Wireless Communications and Networking Conference (2000)

    Google Scholar 

  3. Desmedt, Y., Jajodia, S.: Redistributing secret shares to new access structures and its applications., George Mason Univ., Tech. Rep (1997)

    Google Scholar 

  4. Zhou, L., Hass, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)

    Article  Google Scholar 

  5. Bayya, A., Gupte, S., Shukla, Y., Garikapati, A.: Security in Ad hoc networks, CS 685, Computer Science Department University of Kentucky

    Google Scholar 

  6. Lo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing ad hoc wireless networks. In: Proc. 7th IEEE Symp. On Comp. and Communication (ISCC), Taormina (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, HS., Kim, JM., Park, SK. (2006). Cluster-Based Secure Data Transmission Solution for Ad Hoc Network. In: Shi, ZZ., Sadananda, R. (eds) Agent Computing and Multi-Agent Systems. PRIMA 2006. Lecture Notes in Computer Science(), vol 4088. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11802372_86

Download citation

  • DOI: https://doi.org/10.1007/11802372_86

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-36707-9

  • Online ISBN: 978-3-540-36860-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics