Cluster Based Certificate Revocation of Attacker’s Nodes in MANET

Authors

  • E.K. Neena Department of computer science, S.A Engineering college, Chennai, India
  • C. Balakrishnan Department of computer science, S.A Engineering college, Chennai, India

Keywords:

Certificate Revocation, Trusted Authority, Cluster Head, Regions

Abstract

Mobile ad hoc network (MANET) is a type of wireless ad hoc network. MANETs are very popular because of its infrastructure less network. Security is a major concern to provide protection between mobile nodes in hostile environment. Certificate revocation is one of the security components in mobile ad hoc networks (MANETs). Certificate revocation scheme, outperforms other techniques in terms of being able to quickly revoke attackers certificates and recover falsely accused certificates. The dynamic and wireless nature of mobile ad hoc network makes them more susceptible to many kinds of malicious attacks. Certificate revocation isolates the attackers from further participating in network activities. Certificates are issued and revoked by trusted party known as Certificate Authority. Certificate revocation invalidates the attacker�s certificate which is essential in keeping the network more secured. Sometimes malicious node will try to remove legitimate nodes from the network by falsely accusing them as attackers. Therefore, the issue of false accusation must be taken into account in designing certificate revocation mechanisms. Clustering approach is able to quickly revoke certificates of accused nodes and also to explicitly distinguish false accusations. Here Warned nodes will also be involved in certificate revocation to make the scheme more efficient and reliable. Cluster based routing protocol is used for revocation of certificates that provides more security in mobile ad hoc network.

References

. Yongguang Zhang, Wenke Lee, “Security in Mobile Ad-Hoc Networks” Springer-Verlag US., pp 249-268, 2005.

. H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in Mobile Ad Hoc Networks: Challenges and Solutions,” IEEE Wireless Comm., vol. 11, no. 1, pp. 38-47, Feb. 2004.

. Weiliu, Nirwan Ansari,“cluster-based certificate revocation with vindication capability for mobile ad hoc networks,” ieee transactions on parallel and distributed systems, vol. 24, no. 2, february 2013.

. Priti Rathi, Parikshit Mahalle, “Certificate Revocation in Mobile Ad Hoc Networks,” International Journal of Application or Innovation in Engineering & Management, Volume 2, Issue 1, January 2013.

. H. Yang, J. Shu, X. Meng, and S. Lu, “SCAN: Self-Organized Network-Layer Security in Mobile Ad Hoc Networks, ” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 261-273, Feb. 2006.

. H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, “URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks,” IEEE/ACM Trans. Networking, vol. 12, no. 6, pp. 1049-1063, Oct. 2004.

. LIU Xuening, YIN Hao, LIN Chuang, DU Changlai, “Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems”, tsinghua science and technology issnll1007-0214ll13/18llpp234-241 volume 14, number 2, april 2009.

. W. Liu, H. Nishiyama, N. Ansari, and N. Kato, “A Study on Certificate Revocation in Mobile Ad Hoc Network,” Proc. IEEE Int’l Conf. Comm. (ICC), June 2011.

Downloads

Published

2014-01-31

How to Cite

[1]
E.K. Neena and C. Balakrishnan, “Cluster Based Certificate Revocation of Attacker’s Nodes in MANET”, Int. J. Comp. Sci. Eng., vol. 2, no. 1, pp. 23–27, Jan. 2014.

Issue

Section

Research Article