Open Access   Article Go Back

Cluster Based Certificate Revocation of Attacker�s Nodes in MANET

E.K. Neena1 , C. Balakrishnan2

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-1 , Page no. 23-27, Jan-2014

Online published on Feb 04, 2014

Copyright © E.K. Neena, C. Balakrishnan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: E.K. Neena, C. Balakrishnan, “Cluster Based Certificate Revocation of Attacker�s Nodes in MANET,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.1, pp.23-27, 2014.

MLA Style Citation: E.K. Neena, C. Balakrishnan "Cluster Based Certificate Revocation of Attacker�s Nodes in MANET." International Journal of Computer Sciences and Engineering 2.1 (2014): 23-27.

APA Style Citation: E.K. Neena, C. Balakrishnan, (2014). Cluster Based Certificate Revocation of Attacker�s Nodes in MANET. International Journal of Computer Sciences and Engineering, 2(1), 23-27.

BibTex Style Citation:
@article{Neena_2014,
author = {E.K. Neena, C. Balakrishnan},
title = {Cluster Based Certificate Revocation of Attacker�s Nodes in MANET},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2014},
volume = {2},
Issue = {1},
month = {1},
year = {2014},
issn = {2347-2693},
pages = {23-27},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=34},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=34
TI - Cluster Based Certificate Revocation of Attacker�s Nodes in MANET
T2 - International Journal of Computer Sciences and Engineering
AU - E.K. Neena, C. Balakrishnan
PY - 2014
DA - 2014/02/04
PB - IJCSE, Indore, INDIA
SP - 23-27
IS - 1
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
4075 3687 downloads 3732 downloads
  
  
           

Abstract

Mobile ad hoc network (MANET) is a type of wireless ad hoc network. MANETs are very popular because of its infrastructure less network. Security is a major concern to provide protection between mobile nodes in hostile environment. Certificate revocation is one of the security components in mobile ad hoc networks (MANETs). Certificate revocation scheme, outperforms other techniques in terms of being able to quickly revoke attackers certificates and recover falsely accused certificates. The dynamic and wireless nature of mobile ad hoc network makes them more susceptible to many kinds of malicious attacks. Certificate revocation isolates the attackers from further participating in network activities. Certificates are issued and revoked by trusted party known as Certificate Authority. Certificate revocation invalidates the attacker�s certificate which is essential in keeping the network more secured. Sometimes malicious node will try to remove legitimate nodes from the network by falsely accusing them as attackers. Therefore, the issue of false accusation must be taken into account in designing certificate revocation mechanisms. Clustering approach is able to quickly revoke certificates of accused nodes and also to explicitly distinguish false accusations. Here Warned nodes will also be involved in certificate revocation to make the scheme more efficient and reliable. Cluster based routing protocol is used for revocation of certificates that provides more security in mobile ad hoc network.

Key-Words / Index Term

Certificate Revocation, Trusted Authority, Cluster Head, Regions.

References

[1]. Yongguang Zhang, Wenke Lee, �Security in Mobile Ad-Hoc Networks� Springer-Verlag US., pp 249-268, 2005.
[2]. H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, �Security in Mobile Ad Hoc Networks: Challenges and Solutions,� IEEE Wireless Comm., vol. 11, no. 1, pp. 38-47, Feb. 2004.
[3]. Weiliu, Nirwan Ansari,�cluster-based certificate revocation with vindication capability for mobile ad hoc networks,� ieee transactions on parallel and distributed systems, vol. 24, no. 2, february 2013.
[4]. Priti Rathi, Parikshit Mahalle, �Certificate Revocation in Mobile Ad Hoc Networks,� International Journal of Application or Innovation in Engineering & Management, Volume 2, Issue 1, January 2013.
[5]. H. Yang, J. Shu, X. Meng, and S. Lu, �SCAN: Self-Organized Network-Layer Security in Mobile Ad Hoc Networks, � IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 261-273, Feb. 2006.
[6]. H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, �URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks,� IEEE/ACM Trans. Networking, vol. 12, no. 6, pp. 1049-1063, Oct. 2004.
[7]. LIU Xuening, YIN Hao, LIN Chuang, DU Changlai, �Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems�, tsinghua science and technology issnll1007-0214ll13/18llpp234-241 volume 14, number 2, april 2009.
W. Liu, H. Nishiyama, N. Ansari, and N. Kato, �A Study on Certificate Revocation in Mobile Ad Hoc Network,� Proc. IEEE Int�l Conf. Comm. (ICC), June 2011.