Certificate Revocation in Mobile Ad Hoc Networks with a Threshold value
Main Article Content
Abstract
In Mobile Ad hoc NET works (MANETs) certificate revocation play an important role in maintaining networks security. Due to the self-configuring infrastructures less network and dynamic nature, MANETs are defense less to security attacks from malicious nodes. When malicious node certificate is revoked, it is declined from all activities and detached from the network. The main challenge for certificate revocation is to revoke the certificates of malicious nodes promptly and accurately. In this paper, we build upon our previously proposed scheme, a clustering-based certificate revocation scheme, which outperforms other techniques in terms of being able to quickly revoke attacker’s certificates and recover falsely accused certificates. In order to increase the number of malicious nodes in the network leads to decrease the efficiency of certificate revocation scheme. To solve the above problem we propose a new method based on a threshold to ensure sufficient normal nodes to accuse malicious nodes in MANETs.
Keywords: certificate revocation, recovery, clustering, certificate authority, threshold.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.