Skip to main content
Erschienen in: Wireless Personal Communications 2/2016

01.09.2016

A Reliant Certificate Revocation of Malicious Nodes in MANETs

verfasst von: Kathiroli Raja, Arivudainambi Deivasigamani, Vidhya Ravi

Erschienen in: Wireless Personal Communications | Ausgabe 2/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile ad hoc networks are in widespread use in the recent years due to their infrastructureless dynamic topology, ease of deployment and the ability of the nodes to be mobile, making them more defenceless to attacks. Provisioning secure communications between nodes in such a hostile environment is a major concern. Hence, nodes are issued certificates as a means of conveying trust that only nodes with valid certification can function in the network. In our work, we aim to revoke the certificates of malicious nodes from the network warranting a risk-less communication. To facilitate an accurate and an efficient certificate revocation, we propose a reliant model, wherein every node is associated with reliance, which is a measure of its goodness. The model, not only merits good behaviour, but also punishes any misbehaviour. When the node is perceived to be unreliable, by at least more than half of the neighbouring nodes, an accusation packet is forwarded to the Certificate Authority whereby the certificate of the accused node is cancelled thus enabling a reliable multihop transmission. The performance measures of the proposed model are compared with the previous revocation techniques. Results demonstrate that the proposed scheme is effective than the existing schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kannhavong, B., Nakayama, H., Nemoto, Y., & Kato, N. (2007). A survey of routing attacks in mobile ad-hoc networks. IEEE Wireless Communications, 14(5), 85–91.CrossRef Kannhavong, B., Nakayama, H., Nemoto, Y., & Kato, N. (2007). A survey of routing attacks in mobile ad-hoc networks. IEEE Wireless Communications, 14(5), 85–91.CrossRef
2.
Zurück zum Zitat Yu, M., Zhou, M., & Su, W. (2009). A secure routing protocol against byzantine attacks for MANETs in adversarial environments. IEEE Transactions on Vehicular Technology, 58(1), 449–460.CrossRef Yu, M., Zhou, M., & Su, W. (2009). A secure routing protocol against byzantine attacks for MANETs in adversarial environments. IEEE Transactions on Vehicular Technology, 58(1), 449–460.CrossRef
3.
Zurück zum Zitat El Defraw, K., & Tsudik, G. (2011). Privacy-preserving locationbased on-demand routing in MANETs. IEEE Journal on Selected Areas in Communications, 29(10), 1926–1934.CrossRef El Defraw, K., & Tsudik, G. (2011). Privacy-preserving locationbased on-demand routing in MANETs. IEEE Journal on Selected Areas in Communications, 29(10), 1926–1934.CrossRef
4.
Zurück zum Zitat Abbas, S., Merabti, M., Llewellyn-Jones, D., & Kifayat, K. (2013). Light weight Sybil attack detection in MANETs. IEEE Systems Journal, 7(2), 236–248.CrossRef Abbas, S., Merabti, M., Llewellyn-Jones, D., & Kifayat, K. (2013). Light weight Sybil attack detection in MANETs. IEEE Systems Journal, 7(2), 236–248.CrossRef
5.
Zurück zum Zitat Yoo, Y., & Agrawal, D. P. (2006). Why does it pay to be selfish in a MANET? IEEE Wireless Communications, 13(6), 87–97.CrossRef Yoo, Y., & Agrawal, D. P. (2006). Why does it pay to be selfish in a MANET? IEEE Wireless Communications, 13(6), 87–97.CrossRef
6.
Zurück zum Zitat Louta, M., Michalas, A., & Kraounakis, S. (2002). A survey on reputation-based cooperation enforcement schemes in wireless ad-hoc networks. IEEE/ACM symposium on mobile ad-hoc networking and computing, MobiHoc. Louta, M., Michalas, A., & Kraounakis, S. (2002). A survey on reputation-based cooperation enforcement schemes in wireless ad-hoc networks. IEEE/ACM symposium on mobile ad-hoc networking and computing, MobiHoc.
7.
Zurück zum Zitat Shi1, F., & Song, J. (2012). A cluster-based countermeasure against media aces control layer atacks in IEEE 802.11 ad hoc networks. KSII transactions on internet and information systems, Vol. 6, NO. 6, pp. 1565–1585, June, 2012. Shi1, F., & Song, J. (2012). A cluster-based countermeasure against media aces control layer atacks in IEEE 802.11 ad hoc networks. KSII transactions on internet and information systems, Vol. 6, NO. 6, pp. 1565–1585, June, 2012.
8.
Zurück zum Zitat Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK-A secure intrusion detection system for MANET. IEEE Transactions on Industrial Electronics, 60(3), 1089–1098.CrossRef Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK-A secure intrusion detection system for MANET. IEEE Transactions on Industrial Electronics, 60(3), 1089–1098.CrossRef
9.
Zurück zum Zitat Mohammed, N. Otrok, H., Wang, L. Y., Debbabi, M., & Bhattacharya, P. (2011). Mechanism design-based secure leader election model for intrusion detection in MANETs. IEEE Transactions on Dependable and Secure Computing, 8(1), 89–103. Mohammed, N. Otrok, H., Wang, L. Y., Debbabi, M., & Bhattacharya, P. (2011). Mechanism design-based secure leader election model for intrusion detection in MANETs. IEEE Transactions on Dependable and Secure Computing, 8(1), 89–103.
10.
Zurück zum Zitat Anantvalee, T., & Wu, J. (2012). Reputation-based system for encouraging the cooperation of nodes in mobile ad-hoc networks. In Proceedings of computer science and information technology, Vol. 36, pp. 3383–3388, April, 2012. Anantvalee, T., & Wu, J. (2012). Reputation-based system for encouraging the cooperation of nodes in mobile ad-hoc networks. In Proceedings of computer science and information technology, Vol. 36, pp. 3383–3388, April, 2012.
11.
Zurück zum Zitat Chinni, S., Thomas, J., Ghinea, G., & Shen, Z. (2008). Trust model for certificate revocation in ad-hoc networks. Ad-hoc Networks, Elsevier Publications, 6(3), 441–457.CrossRef Chinni, S., Thomas, J., Ghinea, G., & Shen, Z. (2008). Trust model for certificate revocation in ad-hoc networks. Ad-hoc Networks, Elsevier Publications, 6(3), 441–457.CrossRef
12.
Zurück zum Zitat Sadamate, S. S., & Nandedkar, V. S. (2013). Review on calculation, distribution of trust and reputaion in MANETs. International Journal of Science and Modern Engineering (IJISME ), 1(6), 83–88. Sadamate, S. S., & Nandedkar, V. S. (2013). Review on calculation, distribution of trust and reputaion in MANETs. International Journal of Science and Modern Engineering (IJISME ), 1(6), 83–88.
13.
Zurück zum Zitat Li, Z., & Shen, H. (2011). Hierarchical account-aided reputation management system for large-scale MANETs. In Proceedings of IEEE INFOCOM, pp. 909–917, April 10–15, 2011. Li, Z., & Shen, H. (2011). Hierarchical account-aided reputation management system for large-scale MANETs. In Proceedings of IEEE INFOCOM, pp. 909–917, April 10–15, 2011.
14.
Zurück zum Zitat Dhurandher, S. K., Obaidat, M. S., Verma, K., Gupta, P., & Dhurandher, P. (2011). FACES: Friend-based ad-hoc routing using challenges to establish security in MANET systems. IEEE Systems Journal, 5(2), 176–188.CrossRef Dhurandher, S. K., Obaidat, M. S., Verma, K., Gupta, P., & Dhurandher, P. (2011). FACES: Friend-based ad-hoc routing using challenges to establish security in MANET systems. IEEE Systems Journal, 5(2), 176–188.CrossRef
15.
Zurück zum Zitat Park, K., Nishiyama, H., Ansari, N., & Kato, N. (2010). Certificate revocation to cope with false accusations in mobile ad-hoc networks. 71st IEEE Conference on vehicular Technology, VTC, pp. 1–5, May 16–19, 2010. Park, K., Nishiyama, H., Ansari, N., & Kato, N. (2010). Certificate revocation to cope with false accusations in mobile ad-hoc networks. 71st IEEE Conference on vehicular Technology, VTC, pp. 1–5, May 16–19, 2010.
16.
Zurück zum Zitat Panke, T. R. (2013). Clustering based certificate revocation scheme for malicious nodes in MANETs. International Journal of Scientific and Research Publications, 3(5), 1–5. Panke, T. R. (2013). Clustering based certificate revocation scheme for malicious nodes in MANETs. International Journal of Scientific and Research Publications, 3(5), 1–5.
17.
Zurück zum Zitat Gan, C., Mata-Daz, J., Muoz, J. L., Hernndez-Serrano, J., Esparza, O., & Alins, J. (2012). A modelling of certicate revocation and its application to synthesis of revocation trace. IEEE Transactions on Information Forensics and Security, 7(6), 1623–1686. Gan, C., Mata-Daz, J., Muoz, J. L., Hernndez-Serrano, J., Esparza, O., & Alins, J. (2012). A modelling of certicate revocation and its application to synthesis of revocation trace. IEEE Transactions on Information Forensics and Security, 7(6), 1623–1686.
18.
Zurück zum Zitat Harn, L., & Ren, J. (2011). Generalized digital certificate for user authentication and key establishment for secure communications. IEEE Transactions On Wireless Communications, 10(7), 2372–2379.CrossRef Harn, L., & Ren, J. (2011). Generalized digital certificate for user authentication and key establishment for secure communications. IEEE Transactions On Wireless Communications, 10(7), 2372–2379.CrossRef
19.
Zurück zum Zitat Arboit, G., Cre‘peau, C., Davis, C. R. & Maheshwaran, M. (2008). A localized certificate revocation scheme for mobile ad hoc networks. Ad hoc networks (Vol. 6, Issue. 1). New York: Elsevier Publications. Arboit, G., Cre‘peau, C., Davis, C. R. & Maheshwaran, M. (2008). A localized certificate revocation scheme for mobile ad hoc networks. Ad hoc networks (Vol. 6, Issue. 1). New York: Elsevier Publications.
20.
Zurück zum Zitat Luo, J., Hubaux, J., & Eugster, P. (2005). Dictate: Distributed certification authority with probabilistic freshness for ad-hoc networks. IEEE Transactions on Dependable and Secure Computing, 2(4), 311–323.CrossRef Luo, J., Hubaux, J., & Eugster, P. (2005). Dictate: Distributed certification authority with probabilistic freshness for ad-hoc networks. IEEE Transactions on Dependable and Secure Computing, 2(4), 311–323.CrossRef
21.
Zurück zum Zitat Srividya, M., Radhika, K., & Jamuna, D. (2012). Review on certificate revocation of mobile ad-hoc networks. International Journal of Engineering Research and Technology (IJERT), 1(7), 1–4. Srividya, M., Radhika, K., & Jamuna, D. (2012). Review on certificate revocation of mobile ad-hoc networks. International Journal of Engineering Research and Technology (IJERT), 1(7), 1–4.
22.
Zurück zum Zitat Eichler, S., & Muller-Rathgeber, B. (2005). Performance analysis of scalable certificate revocation schemes for ad-hoc networks. In Proceedings of 30 th anniversary, IEEE conference on local computer networks, pp. 340–391, November 17, 2005. Eichler, S., & Muller-Rathgeber, B. (2005). Performance analysis of scalable certificate revocation schemes for ad-hoc networks. In Proceedings of 30 th anniversary, IEEE conference on local computer networks, pp. 340–391, November 17, 2005.
23.
Zurück zum Zitat Iliadisa, J., Gritzalisa, S., Spinellisb, D., De Cockc, D., Preneelc, B., & Gritzalis, D. (2003). Towards a framework for evaluating certificate status information mechanisms. Computer Communications, Elsevier Publications, 26(16), 1839–1850.CrossRef Iliadisa, J., Gritzalisa, S., Spinellisb, D., De Cockc, D., Preneelc, B., & Gritzalis, D. (2003). Towards a framework for evaluating certificate status information mechanisms. Computer Communications, Elsevier Publications, 26(16), 1839–1850.CrossRef
24.
Zurück zum Zitat Luo, H., Kong, J., Songwu, L., Petros, Z., & Zhang, L. (2004). URSA: Ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Transactions on Networking, 12(6), 1049–1063.CrossRef Luo, H., Kong, J., Songwu, L., Petros, Z., & Zhang, L. (2004). URSA: Ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Transactions on Networking, 12(6), 1049–1063.CrossRef
25.
Zurück zum Zitat Clulow, J., & Moore, T. (2006). Suicide for the common good: A new strategy for credential revocation in self-organizing systems. ACM SIGOPS Operating Systems Review, 40(3), 18–21.CrossRef Clulow, J., & Moore, T. (2006). Suicide for the common good: A new strategy for credential revocation in self-organizing systems. ACM SIGOPS Operating Systems Review, 40(3), 18–21.CrossRef
26.
Zurück zum Zitat Liu, W., Nishiyama, H., Yang, N. A. J., & Kato, N. (2013). Cluster-based certificate revocation with vindication capability for mobile ad-hoc networks. IEEE Transactions on Parallel and Distributed Systems, 24(2), 239–249.CrossRef Liu, W., Nishiyama, H., Yang, N. A. J., & Kato, N. (2013). Cluster-based certificate revocation with vindication capability for mobile ad-hoc networks. IEEE Transactions on Parallel and Distributed Systems, 24(2), 239–249.CrossRef
Metadaten
Titel
A Reliant Certificate Revocation of Malicious Nodes in MANETs
verfasst von
Kathiroli Raja
Arivudainambi Deivasigamani
Vidhya Ravi
Publikationsdatum
01.09.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-3016-8

Weitere Artikel der Ausgabe 2/2016

Wireless Personal Communications 2/2016 Zur Ausgabe

Neuer Inhalt