Secure and reliable certificate chains recovery protocol for mobile ad hoc networks

被引:9
|
作者
Omar, Mawloud [1 ]
Boufaghes, Hamida [1 ]
Mammeri, Lydia [1 ]
Taalba, Amel [1 ]
Tari, Abdelkamel [1 ]
机构
[1] Univ Bejaia, Fac Sci Exactes, Lab Informat Med, Bejaia 06000, Algeria
关键词
Mobile ad hoc network; Certificate; Public-key; Web-of-trust; SCHEME;
D O I
10.1016/j.jnca.2016.01.007
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. There is a host of research efforts in the trustworthy area to securing mobile ad hoc networks. Among the most used approaches are based on public-key certificates and gave birth to miscellaneous trust models ranging from centralized models to web-of-trust and distributed certification authorities. Certificates management in mobile ad hoc networks is a veritable challenge because of constrictions imposed by the nature of the network. The freedom of nodes mobility involves some constraints when designing reliable certification systems. In this paper, we address this issue and we propose a secure and reliable certificate chains recovery protocol for mobile ad hoc networks. Our proposal is based on web-of-trust in which the users ensure themselves the role of the certification service by issuing and managing the public-key certificates. The shortest and the safest certificate chains are selected in order to reduce the communication overhead and resist against compromised nodes which can generate false certificates. An analytical model is developed and simulations are performed in order evaluate the performances of our protocol, in which it demonstrates interesting results. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:153 / 162
页数:10
相关论文
共 50 条
  • [1] A secure incentive protocol for mobile ad hoc networks
    Zhang, Yanchao
    Lou, Wenjing
    Liu, Wei
    Fang, Yuguang
    [J]. WIRELESS NETWORKS, 2007, 13 (05) : 569 - 582
  • [2] A secure incentive protocol for mobile ad hoc networks
    Yanchao Zhang
    Wenjing Lou
    Wei Liu
    Yuguang Fang
    [J]. Wireless Networks, 2007, 13 : 569 - 582
  • [3] A secure routing protocol for mobile Ad hoc networks
    Li, Zhitang
    Shi, Shudong
    [J]. 6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 153 - +
  • [4] Secure and Reliable Ad-Hoc on Demand Multipath Distance Vector Routing Protocol for Mobile Ad Hoc Networks
    Manjre, Bhushan M.
    Gulhane, Veena A.
    [J]. INFORMATION AND NETWORK TECHNOLOGY, 2011, 4 : 79 - 83
  • [5] SECRET: A Secure and Efficient Certificate Revocation Scheme for Mobile Ad Hoc Networks
    Mall, Dieynaba
    Konate, Karim
    Pathan, Al-Sakib Khan
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 137 - 143
  • [6] A reliable multicast routing protocol in mobile ad hoc networks
    Sun, BL
    Chen, H
    Li, LY
    [J]. ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1123 - 1129
  • [7] Towards Secure Localized Certificate Revocation in Mobile Ad-Hoc Networks
    Masdari, Mohammad
    [J]. IETE TECHNICAL REVIEW, 2017, 34 (05) : 561 - 571
  • [8] A secure routing protocol SDSR for mobile ad hoc networks
    Huang, CH
    Li, JW
    Jia, XH
    [J]. MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2005, 3794 : 269 - 277
  • [9] A secure data transmission protocol for mobile ad hoc networks
    Lu, Shejie
    Li, Jun
    Liu, Zhiyuan
    Cui, Guohua
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, 2007, 4430 : 184 - +
  • [10] A secure multipath routing protocol in mobile ad hoc networks
    Yin, Hao
    Wang, Yang
    Min, Geyong
    Berton, Sebastien
    Guo, Rui
    Lin, Chuang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2010, 22 (04): : 481 - 502