CFP last date
20 May 2024
Reseach Article

Improved certificate Revocation Method in Mobile Ad Hoc Network

by T. R. Panke, B. M.patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 12
Year of Publication: 2013
Authors: T. R. Panke, B. M.patil
10.5120/13911-1746

T. R. Panke, B. M.patil . Improved certificate Revocation Method in Mobile Ad Hoc Network. International Journal of Computer Applications. 80, 12 ( October 2013), 8-12. DOI=10.5120/13911-1746

@article{ 10.5120/13911-1746,
author = { T. R. Panke, B. M.patil },
title = { Improved certificate Revocation Method in Mobile Ad Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 12 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 8-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number12/13911-1746/ },
doi = { 10.5120/13911-1746 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:54:20.954126+05:30
%A T. R. Panke
%A B. M.patil
%T Improved certificate Revocation Method in Mobile Ad Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 12
%P 8-12
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The mobile Ad Hoc networks (MANETs) having wireless and dynamic nature. MANETs are more susceptible to security attacks rather than wired networks. So they are vulnerable to security attacks from malicious node due to which it is important to detect malicious nodes to avoid attacks. In this paper certificate Authority (CA) provides it's secret key to all nodes (normal). When node want to send data to other nodes Cluster Head (CH) broadcast R2mod N to all nodes and it gives challenge to that node whether it sending same data, if it sends RS mod N to CH with its secrete key which is provided by CA, then CH compares its data with itself data. If it is same, then it considers it is as a normal node otherwise as malicious node. Here CA should be legitimate. Finally if node is found as a malicious then revocation of certificate is done for that malicious node and other normal nodes are released due to which the number of normal nodes will increase in mobile network and it get secured from susceptible attacks.

References
  1. A. Mohammed and A. Zuriati,"Performance Comparisons of AODV and Adaptive Secure AODV Routing Protocols in Free Attack Simulation Environment," European Journal of Scientific research, vol . 32, no. 3, p. p. 430-443, 2009.
  2. S. Mutlu and G. Yilmaz,"A Distributed Cooperative Trust Based Intrusion Detection Framework MANETs",the seventh International Conference on Networking and Services (ICNS) pp 292 to 298,2011.
  3. M. Ilyas "The Handbook of Ad Hoc Wireless Networks".
  4. A. Mishra,"Security and Quality of Service in Ad Hoc Wireless Networks",ISBN-13978-0-521-87824-1 Handbook.
  5. P. Sakarindr and N. Ansari,"Security services in group communications and wireless infrastructure ,mobile ad hoc, And wireless sensor networks ,"IEEE wireless communications,14(5),pp. 8-20,2007.
  6. L. Zhou and I. J. Haas,"Securing ad hoc networks",IEEE Network Magazine,13(6),pp. 24-30,1999.
  7. S. Micali, "Efficient certificate revocation," Massachusetts institute of technology, Cambridge, MA, 1996.
  8. H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, "URSA: ubiquitous and robust access control for mobile ad hoc networks," IEEE/ACM Trans. Networking, vol. 12, no. 6, pp. 1049-1063, Oct. 2004.
  9. G. Arboit, C. Crepeau et al. , "A Localized Certificate Revocation Scheme for Mobile Ad Hoc Networks,"Ad Hoc Network, vol. 6, no. 1, pp. 17-31, Jan. 2008.
  10. C. Crepeau and C. R. Davis, "A Certificate Revocation Scheme for Wireless Ad Hoc Networks," Proc. of ACM Workshop Security of Ad Hoc and Sensor Networks, 2003.
  11. J. Clulow and T. Moore, "Suicide for the Common Good: A Strategy for Credential Revocation in Self-organizing Systems,"ACMSIGOPS Operating Systems Reviews, vol. 40, no. 3, pp. 18-21, Jul. 2.
  12. H. Chan, V. D. Gligor et al. , "On the distribution and revocation of cryptographic keys in sensor networks,"IEEE Trans. Dependable and Secure Computing, vol. 2, no. 3, pp. 233-247. Oct. -Dec. 2005.
  13. W. Liu and N. Ansari"Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks "IEEE Transactions on parallel And Distributed systems,vol. 24,no. 2,Feb. 2013.
  14. Zero-Knowledge Proof. [Online]. Available: http://en. wikipedia. org/wiki/Zero-knowledge_proof
  15. S. Goldwasser,J. Lagarias et al. ,"Cryptology and computaional number theory," in Proc. Symp. Appl. Math. , 1989, pp. 89–114.
  16. J. Binder,H. Peter,"zero knowledge proofs of Identify for Ad-Hoc Wireless Networks An In-Depth Study,TechnicalReport",2003. http://www. cs. rit. edu/jsb7384/zkp-survey. pdf
  17. G. Simari,"A Primer on Zero Knowledge Protocols", Department de Ciencias e Ingeniaria de la Computacion
  18. K. Park,H. Nishiyama et al. ,"certificatess revocation to cope with false accusations in mobile ad hoc networks," proc. 2010 IEEE 71st Vehicular Taipei,Taiwan,may 16-19,2010.
  19. W. Liu,H. Nishiyam et al. ,"A Study on Certificate Revocation in Mobile Ad Hoc Networks,"IEEE ICC 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Warn List White List Block List