Multiple-key cryptography-based distributed certificate authority in mobile ad-hoc networks

被引:0
|
作者
Zhou, HB [1 ]
Mutka, MW [1 ]
Ni, LM [1 ]
机构
[1] Slippery Rock Univ, Dept Comp Sci, Slippery Rock, PA 16057 USA
关键词
distributed certificate authority; MANET; security; Sybil attack;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Most prevalent Distributed Certificate Authority (DCA) schemes in the MANET are based upon threshold cryptography, which is invulnerable to mobile adversaries and tolerable to missing or faulty DCA server nodes, and thus becomes the "de facto" standard for the security framework in the MANET. However, this scheme cannot defeat Sybil attacks, in which a malicious node impersonates many identities. To solve the problem, a multiple-key cryptography-based DCA scheme, namely the MC-DCA scheme, is proposed in the paper. It is invulnerable to Sybil attacks, and achieves lower communication overhead and moderate latency compared with the threshold-based scheme, which is supported by the simulation results.
引用
收藏
页码:1681 / 1685
页数:5
相关论文
共 50 条
  • [31] INTERNET-BASED ADAPTIVE DISTRIBUTED SIMULATION OF MOBILE AD-HOC NETWORKS
    D'Angelo, Gabriele
    Ferretti, Stefano
    Tan, Gary S. H.
    [J]. 2019 WINTER SIMULATION CONFERENCE (WSC), 2019, : 2641 - 2652
  • [32] Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks
    Kanellopoulos, Dimitris
    Cuomo, Francesca
    [J]. ELECTRONICS, 2021, 10 (04)
  • [33] An anonymous distributed routing protocol in mobile ad-hoc networks
    Ren-Junn Hwang
    Yu-Kai Hsiao
    [J]. The Journal of Supercomputing, 2013, 66 : 888 - 906
  • [34] Distributed Secure Routing Protocol for Mobile Ad-Hoc Networks
    Khalil, Issa
    Bataineh, Sameer
    Qubajah, Liana
    Khreishah, Abdallah
    [J]. 2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 106 - 110
  • [35] An architecture for key management in hierarchical mobile ad-hoc networks
    Rhee, KH
    Park, YH
    Tsudik, G
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2004, 6 (02) : 156 - 162
  • [36] Enhanced certificate revocation scheme with justification facility in mobile ad-hoc networks
    Krishnan, R. Santhana
    Julie, E. Golden
    Robinson, Y. Harold
    Kumar, Raghvendra
    Pham Huy Thong
    Le Hoang Son
    [J]. COMPUTERS & SECURITY, 2020, 97
  • [37] An anonymous distributed routing protocol in mobile ad-hoc networks
    Hwang, Ren-Junn
    Hsiao, Yu-Kai
    [J]. JOURNAL OF SUPERCOMPUTING, 2013, 66 (02): : 888 - 906
  • [38] Distributed passive routing decisions in mobile ad-hoc networks
    Skraba, P
    Aghajan, H
    Bahai, A
    [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 2814 - 2818
  • [39] A distributed mutual exclusion algorithm for mobile ad-hoc networks
    Baldoni, R
    Virgillito, A
    Petrassi, R
    [J]. ISCC 2002: SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2002, : 539 - 544
  • [40] An efficient certificate management for mobile ad-hoc network
    Lee, Dae-Young
    Jeong, Hyun-Cheol
    [J]. AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2006, 4104 : 355 - 364