A High-Performance Distributed Certificate Revocation Scheme for Mobile Ad Hoc Networks

被引:1
|
作者
Guo, Chongxian [1 ]
Xu, Huaqiang [1 ]
Ju, Lei [1 ]
Jia, Zhiping [1 ]
Xu, Jihai [2 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan, Peoples R China
[2] Xi An Jiao Tong Univ, Software Engn Sch, Xian, Peoples R China
关键词
mobile ad hoc networks (MANETs); certificate revocation; trust; accusation function; INTRUSION DETECTION; ATTACKS;
D O I
10.1109/TrustCom.2014.136
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networks (MANETs) are wireless networks which have a wide range applications due to their dynamic topologies and easy to deployment. However, such networks are also more vulnerable to attacks compared with traditional wireless networks. Certificate revocation is an effective mechanism for providing network security services. Existing schemes are not well suited for MANETs because of incurring much overhead or bring low accuracy on certificate revocation. Therefore, we propose a high-performance distributed certificate revocation scheme in which certificates of malicious nodes will be revoked quickly and accurately. Certificate revocation is the result of the collaborative effect of multiple accusations. For diluting damages to networks, one accusation is enough to limit the accusation function of the accused node. To enhance the accuracy of certificate revocation, our scheme requires nodes just accepting those accusations in which trust levels of accuser nodes are not less than accused nodes'. To guarantee the rapidity, we restore accusation functions of the falsely accused nodes after revoking certificates of all malicious nodes who ever accused them. Moreover, we design one mechanism to reward nodes who ever accused those malicious nodes, and in return, accusations made by them will accelerate the certificate revocation processes of other malicious nodes. Simulation results demonstrate the effectiveness and efficiency of our scheme in certificate revocation. In addition, our scheme achieves a great improvement of just limiting accusation functions of malicious nodes.
引用
收藏
页码:156 / 163
页数:8
相关论文
共 50 条
  • [21] Dynamic distributed certificate authority services for mobile ad hoc networks
    Dong, Y.
    Li, Victor O. K.
    Hui, Lucas C. K.
    Yiu, S. M.
    [J]. 2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 2627 - +
  • [22] Providing distributed certificate authority service in mobile ad hoc networks
    Dong, Y
    Go, HW
    Sui, AF
    Li, VOK
    Hui, LCK
    Yiu, SM
    [J]. FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, : 149 - 156
  • [23] A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks
    Mohammad Masdari
    Sam Jabbehdari
    Mohammad Reza Ahmadi
    Seyyed Mohsen Hashemi
    Jamshid Bagherzadeh
    Ahmad Khadem-Zadeh
    [J]. EURASIP Journal on Wireless Communications and Networking, 2011
  • [24] Certificate Revocation in Vehicular Ad Hoc Networks: A Novel Approach
    Islam, Nazmul
    [J]. 2016 INTERNATIONAL CONFERENCE ON NETWORKING SYSTEMS AND SECURITY (NSYSS), 2016, : 146 - 150
  • [25] Comprehensive Evaluation of the Localized Certificate Revocation in Mobile Ad Hoc Network
    Masdari, Mohammad
    Bidaki, Moazam
    Naghiloo, Farah
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) : 977 - 1001
  • [26] Comprehensive Evaluation of the Localized Certificate Revocation in Mobile Ad Hoc Network
    Mohammad Masdari
    Moazam Bidaki
    Farah Naghiloo
    [J]. Wireless Personal Communications, 2017, 94 : 977 - 1001
  • [27] A scheme of certificate authority for ad hoc networks
    Sen, Jaydip
    Chandra, M. Girish
    Balamuralidhar, P.
    Harihara, S. G.
    Reddy, Harish
    [J]. DEXA 2007: 18TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2007, : 615 - +
  • [28] A distributed certificate authority and key establishment protocol for mobile ad hoc networks
    Zefreh, Mohammad Sheikh
    Fanian, Ali
    Sajadieh, Sayyed Mahdi
    Berenjkoub, Mahdi
    Khadivi, Pejman
    [J]. 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1157 - 1162
  • [29] A distributed intrusion detection scheme for mobile Ad Hoc networks
    Fu, Yingfang
    He, Jingsha
    Li, Guorui
    [J]. COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 75 - +
  • [30] A distributed trust establishment scheme for mobile ad hoc networks
    Sen, Jaydip
    Chowdhury, Piyali Roy
    Sengupta, Indranil
    [J]. ICCTA 2007: INTERNATIONAL CONFERENCE ON COMPUTING: THEORY AND APPLICATIONS, PROCEEDINGS, 2007, : 51 - +