Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks

被引:34
|
作者
Liu, Wei [1 ]
Nishiyama, Hiroki [1 ]
Ansari, Nirwan [2 ]
Yang, Jie [3 ]
Kato, Nei [1 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi 9808579, Japan
[2] New Jersey Inst Technol, Dept Elect & Comp Engn, Adv Networking Lab, Newark, NJ 07102 USA
[3] Beijing Univ Posts & Telecommun, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
关键词
Mobile ad hoc networks (MANETs); certificate revocation; security; threshold; SECURITY;
D O I
10.1109/TPDS.2012.85
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless and dynamic natures render them more vulnerable to various types of security attacks than the wired networks. The major challenge is to guarantee secure network services. To meet this challenge, certificate revocation is an important integral component to secure network communications. In this paper, we focus on the issue of certificate revocation to isolate attackers from further participating in network activities. For quick and accurate certificate revocation, we propose the Cluster-based Certificate Revocation with Vindication Capability (CCRVC) scheme. In particular, to improve the reliability of the scheme, we recover the warned nodes to take part in the certificate revocation process; to enhance the accuracy, we propose the threshold-based mechanism to assess and vindicate warned nodes as legitimate nodes or not, before recovering them. The performances of our scheme are evaluated by both numerical and simulation analysis. Extensive results demonstrate that the proposed certificate revocation scheme is effective and efficient to guarantee secure communications in mobile ad hoc networks.
引用
收藏
页码:239 / 249
页数:11
相关论文
共 50 条
  • [21] Enhanced certificate revocation scheme with justification facility in mobile ad-hoc networks
    Krishnan, R. Santhana
    Julie, E. Golden
    Robinson, Y. Harold
    Kumar, Raghvendra
    Pham Huy Thong
    Le Hoang Son
    COMPUTERS & SECURITY, 2020, 97
  • [22] A New Cluster-Based Secure Communication Scheme for Mobile Ad Hoc Networks
    Shi, Fei
    Liu, Weijie
    Song, Jooseok
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (05): : 1127 - 1138
  • [23] A Cluster-Based Key Establishment Protocol for Wireless Mobile Ad Hoc Networks
    Zefreh, Mohammad Sheikh
    Fanian, Ali
    Sajadieh, Sayyed Mahdi
    Khadivi, Pejman
    Berenjkoub, Mehdi
    ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2008, 6 : 585 - 592
  • [24] An Implicit Cluster-based Overlay Multicast Protocol for Mobile Ad hoc Networks
    Choi, Younghwan
    Lee, Euisin
    Lee, Donghun
    Park, Soochang
    Yu, Fucai
    Kim, Sang-Ha
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 3510 - +
  • [25] Cluster-based consistency scheme of cooperative caching in mobile Ad Hoc networks
    Xie, Gao-Gang
    Li, Zhen-Yu
    Chen, Jia-Ning
    Ruan Jian Xue Bao/Journal of Software, 2008, 19 (11): : 3042 - 3052
  • [26] Identity Mapping using Cluster-based Certificate technique for Vehicular Ad-Hoc Networks
    Naresh, M.
    Srinija, K.
    Varsha, N.
    Kalpana, M.
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 1205 - 1209
  • [27] An enhanced message exchange mechanism in cluster-based mobile ad hoc networks
    Lou, W
    Wu, J
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2004, 3358 : 223 - 232
  • [28] Replica dissemination and update strategies in cluster-based mobile ad hoc networks
    Denko, Mieso K.
    Lu, Hua
    MOBILE INFORMATION SYSTEMS, 2006, 2 (04) : 193 - 209
  • [29] An enhanced message exchange mechanism in cluster-based mobile ad hoc networks
    Lou, Wei
    Wu, Jie
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3358 : 223 - 232
  • [30] A cluster-based routing method with authentication capability in Vehicular Ad hoc Networks (VANETs)
    Azhdari, Mohammad Sadegh
    Barati, Ali
    Barati, Hamid
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2022, 169 : 1 - 23