Abstract
In this paper, we have proposed a novel certificate-less on-demand public key management (CLPKM) protocol for self-organized MANETs. The protocol works on flat network architecture, and distinguishes between authentication layer and routing layer of the network. We put an upper limit on the length of verification route and use the end-to-end trust value of a route to evaluate its strength. The end-to-end trust value is used by the protocol to select the most trusted verification route for accomplishing public key verification. Also, the protocol uses MAC function instead of RSA certificates to perform public key verification. By doing this, the protocol saves considerable computation power, bandwidth and storage space. The saved storage space is utilized by the protocol to keep a number of pre-established routes in the network nodes, which helps in reducing the average verification delay of the protocol. Analysis and simulation results confirm the effectiveness of the proposed protocol.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Yi, S., Kravets, R.: MOCA: MObile Certificate Authority for Wireless Ad Hoc Networks. In: The Second Annual PKI Research Workshop, PKI 2003, Gaithersburg (2003)
Capkun, S., Buttyan, L., Hubaux, J.P.: Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing 2(1), 52–64 (2003)
C-Gil, P., H-Goya, C.: Efficient Public Key Certificate Management for Mobile Ad Hoc Networks. EURASIP Journal on Wireless Communications and Networking 2011
Eunjin, J., Elmallah, E.S., Gouda, M.G.: Optimal Dispersal of Certificate Chains. IEEE Transactions on Parallel and Distributed Systems 18(4), 474–484 (2007)
Satizábal, C., Hernańdez-Serrano, J., Forne, J., Pegueroles, J.: Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks. Computer Communications 30(7), 1498–1512 (2007)
Hahn, G., Kwon, T., Kim, S., Song, J.: Cluster-Based Certificate Chain for Mobile Ad Hoc Networks. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3981, pp. 769–778. Springer, Heidelberg (2006)
Kambourakis, G., Konstantinou, E., Douma, A., Anagnostopoulos, M., Fotiadis, G.: Efficient Certification Path Discovery for MANET. EURASIP Journal on Wireless Communications and Networking 2010, Article No. 20 (April 2010)
Li, R., Li, J., Liu, P., Chen, H.: On-demand public-key management for mobile ad hoc networks. Wireless Communications and Mobile Computing 6(3), 295–306 (2006)
Kitada, Y., Watanabe, A., Sasase, I., Takemori, K.: On demand distributed public key management for wireless ad hoc networks. In: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, PACRIM, Canada, pp. 454–457 (August 2005)
Dahshan, H., Irvinem, J.: On Demand Self-Organized Public Key Management for Mobile Ad Hoc Networks. In: IEEE 69th Vehicular Technology Conference, VTC Spring, pp. 1–5 (2009)
Kitada, Y., Takemori, K., Watanabe, A., Sasase, I.: On Demand Distributed Public Key Management without Considering Routing Tables for Wireless Ad Hoc Networks. In: 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT, Myanmar, pp. 375–380 (2005)
Mohri, H., Yasuda, I., Takata, Y., Seki, H.: Certificate Chain Discovery in Web of Trust for Ad Hoc Networks. In: 21st International Conference on Advanced Information Networking and Applications Workshops, AINAW, Canada, pp. 479–485 (2007)
Omar, M., Challal, Y., Bouabdallah, A.: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy. Journal of Network and Computer Applications 35(1), 268–286 (2012)
Perkins, C.E., Royer, E.M.: Ad Hoc On-Demand Distance Vector Routing. In: Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100 (February 1999)
Akbani, R., Korkmaz, T., Raju, G.V.: EMLTrust: An enhanced Machine Learning based Reputation System for MANETs. Ad Hoc Networks 10(3), 435–457 (2012)
Maity, S., Hansdah, R.C.: Membership Models and the Design of Authentication Protocols for MANETs. In: 26th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012, Fukuoka, Japan, March 26-29, pp. 544–551 (2012)
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems, TOCS 8(1), 18–36 (1990)
QualNet 5.0: Scalable Network Technologies, Inc., 6100 Center Drive, Suite 1250, Los Angeles, CA 90045, http://www.scalable-networks.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Maity, S., Hansdah, R.C. (2012). Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs. In: Venkatakrishnan, V., Goswami, D. (eds) Information Systems Security. ICISS 2012. Lecture Notes in Computer Science, vol 7671. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35130-3_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-35130-3_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35129-7
Online ISBN: 978-3-642-35130-3
eBook Packages: Computer ScienceComputer Science (R0)