Proposed Threshold Based Certificate Revocation in Mobile Ad Hoc Networks

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 243)

Abstract

Certification system plays an important role in mobile ad hoc networks (MANETs) to achieve network security. Handling the issue of certificate revocation in wired network is somewhat easy to compare the MANETs. In wired network, when the certificate of a malicious node get revoked, the certificate authorities add the information about the revoked node into certificate revocation lists (CRLs) or broadcast the CRL to each and every node present in the network or either store them on accessible repositories. Whereas the certificate revocation is a challenging task in MANETs and also this conventional method of certificate revocation is not useful for MANETs due to the absence of centralized repositories and trusted authorities. In this paper, we propose a threshold-based certificate revocation scheme for MANETs, which will revoke the certificate of malicious nodes as soon as it detects the first misbehavior of nodes. The proposed scheme also solves the improper certificate revocation, which can occur due to false accusations made by malicious node and also the problem of window of opportunity where revoked certificates are get assigned as a valid to new nodes.

Keywords

MANET Certificate authority (CA) Certificate revocation Digital certificate (DC) 

References

  1. 1.
    Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Netw. Mag. 13(6), 24–30 (1999)CrossRefGoogle Scholar
  2. 2.
    Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11(1), 38–47 (2004)CrossRefGoogle Scholar
  3. 3.
    Liu, W., Nishiyama, H., Ansari, N., Kato, N.: A study on certificate revocation in mobile ad hoc networks. IEEE (2011)Google Scholar
  4. 4.
    Park, K., Nishiyama, H., Ansari, N., Kato, N.: Certificate revocation to cope with false accusations in mobile ad hoc networks. In: Proceedings of 2010 IEEE 71st Vehicular Technology Conference: VTC2010-Spring, Taipei, Taiwan, 16–19 May 2010Google Scholar
  5. 5.
    Housleym, R., Polk, W., Ford, W., Solo, D.: Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, Internet Request for Comments (RFC 3280), April 2002Google Scholar
  6. 6.
    Crêpeau, C., Davis, C.R.: A certificate revocation scheme for wireless ad hoc networks. School of Computer Science, McGill University, Montreal, QC, Canada H3A 2A7 (2003)Google Scholar
  7. 7.
    Luo, J., Hubaux, J.P., Eugster, P.T.: DICTATE: Distributed certification authority with probabilistic freshness for ad hoc networks. IEEE Trans. Dependable and Secure Comput. 2(4), 311–323 (2005)Google Scholar
  8. 8.
    Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L.: URSA: ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Trans. Netw. 12(6), 1049–1063 (2004)CrossRefGoogle Scholar
  9. 9.
    Clulow, J., Moore, T.: Suicide for the common good: A new strategy for credential revocation in self-organizing systems. ACMSIGOPS Oper. Syst. Rev. 40(3), 18–21 (2006)CrossRefGoogle Scholar
  10. 10.
    Conklin, A., White, G., Cothren, C., Williams, D., Davis, R.L.: Principles of computer security. (2004)Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  1. 1.Department of Computer EngineeringSTES’s Smt. Kashibai Navle College of EngineeringPuneIndia

Personalised recommendations