Certificate Revocation to Cope with False Accusations in Mobile Ad Hoc Networks

作者: Kyul Park , Hiroki Nishiyama , Nirwan Ansari , Nei Kato

DOI: 10.1109/VETECS.2010.5494213

关键词:

摘要: In Mobile Ad hoc NETworks (MANETs), certification systems play an important role in maintaining network security because attackers can freely move and repeatedly launch attacks against different nodes. By adopting systems, it becomes possible to exclude identified from the permanently by revoking certifications of attackers. A simple way identify is collect information on nodes network. However, this approach, difficult differentiate valid accusations made legitimate false malicious addition, amount traffic order exchange necessary time gather increases as size larger. paper, we propose a certificate revocation scheme which revoke short with small operating traffic. clustering introducing multi-level node reliability, proposed mitigate improper due users.

参考文章(9)
Ping Yi, Zhoulin Dai, Yiping Zhong, Shiyong Zhang, Resisting flooding attacks in ad hoc networks international conference on information technology coding and computing. ,vol. 2, pp. 657- 662 ,(2005) , 10.1109/ITCC.2005.248
Geneviève Arboit, Claude Crépeau, Carlton R. Davis, Muthucumaru Maheswaran, A localized certificate revocation scheme for mobile ad hoc networks ad hoc networks. ,vol. 6, pp. 17- 31 ,(2008) , 10.1016/J.ADHOC.2006.07.003
Claude Crépeau, Carlton R. Davis, A certificate revocation scheme for wireless ad hoc networks Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks - SASN '03. pp. 54- 61 ,(2003) , 10.1145/986858.986866
Jolyon Clulow, Tyler Moore, Suicide for the common good: a new strategy for credential revocation in self-organizing systems Operating Systems Review. ,vol. 40, pp. 18- 21 ,(2006) , 10.1145/1151374.1151381
Jun Luo, J.-P. Hubaux, P.T. Eugster, DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for ad hoc networks IEEE Transactions on Dependable and Secure Computing. ,vol. 2, pp. 311- 323 ,(2005) , 10.1109/TDSC.2005.49
Farid Nait-Abdesselam, Brahim Bensaou, Tarik Taleb, Detecting and avoiding wormhole attacks in wireless ad hoc networks IEEE Communications Magazine. ,vol. 46, pp. 127- 133 ,(2008) , 10.1109/MCOM.2008.4481351
Haowen Chan, V.D. Gligor, A. Perrig, G. Muralidharan, On the distribution and revocation of cryptographic keys in sensor networks IEEE Transactions on Dependable and Secure Computing. ,vol. 2, pp. 233- 247 ,(2005) , 10.1109/TDSC.2005.37
H. Luo, J. Kong, P. Zerfos, S. Lu, L. Zhang, URSA: ubiquitous and robust access control for mobile ad hoc networks IEEE ACM Transactions on Networking. ,vol. 12, pp. 1049- 1063 ,(2004) , 10.1109/TNET.2004.838598
R.A. Raja Mahmood, A.I. Khan, A survey on detecting black hole attack in AODV-based mobile ad hoc networks international symposium on high-capacity optical networks and enabling technologies. pp. 1- 6 ,(2007) , 10.1109/HONET.2007.4600258