Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks

被引:34
|
作者
Liu, Wei [1 ]
Nishiyama, Hiroki [1 ]
Ansari, Nirwan [2 ]
Yang, Jie [3 ]
Kato, Nei [1 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi 9808579, Japan
[2] New Jersey Inst Technol, Dept Elect & Comp Engn, Adv Networking Lab, Newark, NJ 07102 USA
[3] Beijing Univ Posts & Telecommun, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
关键词
Mobile ad hoc networks (MANETs); certificate revocation; security; threshold; SECURITY;
D O I
10.1109/TPDS.2012.85
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless and dynamic natures render them more vulnerable to various types of security attacks than the wired networks. The major challenge is to guarantee secure network services. To meet this challenge, certificate revocation is an important integral component to secure network communications. In this paper, we focus on the issue of certificate revocation to isolate attackers from further participating in network activities. For quick and accurate certificate revocation, we propose the Cluster-based Certificate Revocation with Vindication Capability (CCRVC) scheme. In particular, to improve the reliability of the scheme, we recover the warned nodes to take part in the certificate revocation process; to enhance the accuracy, we propose the threshold-based mechanism to assess and vindicate warned nodes as legitimate nodes or not, before recovering them. The performances of our scheme are evaluated by both numerical and simulation analysis. Extensive results demonstrate that the proposed certificate revocation scheme is effective and efficient to guarantee secure communications in mobile ad hoc networks.
引用
收藏
页码:239 / 249
页数:11
相关论文
共 50 条
  • [31] Certificate Revocation in Vehicular Ad Hoc Networks: A Novel Approach
    Islam, Nazmul
    2016 INTERNATIONAL CONFERENCE ON NETWORKING SYSTEMS AND SECURITY (NSYSS), 2016, : 146 - 150
  • [32] Embedding a cluster-based overlay mesh in mobile ad hoc networks without cluster heads
    Banerjee, A
    King, CT
    Hsiao, HC
    2005 International Conference on Parallel Processsing, Proceedings, 2005, : 49 - 56
  • [33] Cluster-based certificate revocation in industrial IoT networks using Signaling game
    Boudagdigue, Chaimaa
    Benslimane, Abderrahim
    Kobbane, Abdellatif
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [34] Reliability for Cluster-based Ad-hoc Networks
    Cook, Jason L.
    Ramirez-Marquez, Jose Emmanuel
    ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 2008 PROCEEDINGS, 2008, : 246 - +
  • [35] A cluster-based security architecture for ad hoc networks
    Bechler, M
    Hof, HJ
    Kraft, D
    Pählke, F
    Wolf, L
    IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2393 - 2403
  • [36] Comprehensive Evaluation of the Localized Certificate Revocation in Mobile Ad Hoc Network
    Mohammad Masdari
    Moazam Bidaki
    Farah Naghiloo
    Wireless Personal Communications, 2017, 94 : 977 - 1001
  • [37] Comprehensive Evaluation of the Localized Certificate Revocation in Mobile Ad Hoc Network
    Masdari, Mohammad
    Bidaki, Moazam
    Naghiloo, Farah
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) : 977 - 1001
  • [38] An Administrative Cluster-based Cooperative Caching (ACCC) strategy for Mobile Ad Hoc Networks
    El Khawaga, Sally E.
    Saleh, Ahmed I.
    Ali, Hesham A.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 69 : 54 - 76
  • [39] Reliable Virtual Cluster-Based Opportunistic Routing Protocol for Mobile Ad hoc Networks
    Vigita, E. Sahaya Rose
    Julie, E. Golden
    Selvi, S. Tamil
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 2, 2015, 325 : 139 - 148
  • [40] Cluster-based replication for large-scale mobile ad-hoc networks
    Yu, H
    Martin, P
    Hassanein, H
    2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, COMMUNICATIONS AND MOBILE COMPUTING, VOLS 1 AND 2, 2005, : 552 - 557