Académique Documents
Professionnel Documents
Culture Documents
M.Sivakumar2(Asist.Prof)
2
AbstractThe major challenge in the wireless network service is to provide the guaranteed service. To overcome
this challenge we are going to use an important integral component called certificate revocation. In this paper, we
concentrate on the issue of certificate revocation to separate attackers from further contributing in the network
activities. By proposing the Enhanced Cluster based Certificate Revocation with Vindication Capability (CCRVC)
scheme, we can quickly and accurately revoke the certificates of the malicious nodes. We can improve the reliability
of the scheme by maintaining the Vote List (VL) by the Certificate Authority (CA). To enhance the accuracy, we
propose the threshold based mechanism to assess and vindicate the warned node is the malicious node or not. By
both numerical and simulation analysis, we evaluate the performance of our scheme. The demonstration result that
the proposed certificate revocation scheme is efficient and effective to guarantee secure communications in
MANET.
Index termsMANET, Certificate Authority (CA), Cluster Based Certificate Revocation with Vindication
Capability (CCRVC), Fuzzy Relevance Degreeand Security.
INTRODUCTION
IJTET2015
91
2. RELATED WORKS
Researchers pay a much attention in ensures the
fundamental security of infrastructure less MANETs.
Due to the limited physical protection of nodes, the
dynamical topology changing, the vulnerability of
wireless link and the lack of infrastructure, it is difficult
to secure MANETs. In this section,
we
briefly
introduce the existing methods for certificate revocation.
IJTET2015
92
Level
M-hop
Balance
IJTET2015
93
IJTET2015
94
REFERENCES
[1] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang,
Security in Mobile Ad Hoc Networks: Challenges
and Solutions, IEEE Wireless Comm.,vol. 11, no.
1, pp. 38-47, Feb. 2004.
[2] INFOCOM 2004. Twenty-third AnnualJoint
Conference of the IEEE Computer and
Communications Societies (Volume: 1)
[3] L. Zhou, B. Cchneider, and R. Van Renesse,
COCA: A Secure Distributed Online Certification
Authority, ACM Trans. ComputerSystems, vol.
20, no. 4, pp. 329-368, Nov. 2002.
[4] P. Yi, Z. Dai, Y. Zhong, and S. Zhang, Resisting
Flooding Attacks in Ad Hoc Networks, Proc. Intl
Conf. Information Technology:Coding and
Computing, vol. 2, pp. 657-662, Apr. 2005
[5] B. Kannhavong, H. Nakayama, A. Jamalipour, Y.
Nemoto, and N Kato, A Survey of Routing
IJTET2015
Attacks
in
MANET,
IEEE
Wireless
Comm.Magazine, vol. 14, no. 5, pp. 85-91, Oct.
2007
[6] H. Nakayama, S. Kurosawa, A. Jamalipour, Y.
Nemoto, and N. Kato, A Dynamic Anomaly
Detection Scheme for Aodv-Based Mobile AdHoc
Networks, IEEE Trans. Vehicular Technology,
vol. 58, no. 5, pp. 2471-2481, June 2009.
[7] J. Newsome, E. Shi, D. Song, and A. Perrig, The
Sybil Attack in Sensor Network: Analysis &
Defenses, Proc. Third Intl Symp.Information
Processing in Sensor Networks, pp. 259-268, 2004.
[8] H. Luo, J. Kong, P. Zerfos, S. Lu, and L.
Zhang, URSA: Ubiquitous and Robust
Access Control for Mobile Ad HocNetworks,
IEEE/ACM Trans. Networking, vol. 12, no. 6,
pp. 1049-1063, Oct. 2004.
[9] G. Arboit, C. Crepeau, C.R. Davis, and M.
Maheswaran, A Localized Certificate
Revocation Scheme for Mobile Ad Hoc
Networks,Ad Hoc Network, vol. 6, no. 1, pp.
17-31, Jan. 2008
[10] J. Clulow and T. Moore, Suicide for the
Common Good: A New Strategy for
Credential Revocation in Self-organizing
Systems,ACMSIGOPS Operating Systems
Rev., vol. 40, no. 3, pp. 18-21, July 2006.
[11] K. Park, H. Nishiyama, N. Ansari, and N.
Kato, Certificate Revocation to Cope with
False
Accusations
in
Mobile
Ad
HocNetworks, Proc. IEEE 71st Vehicular
Technology Conf. (VTC 10), May 16-19,
2010.
[12] Wei Liu, Student Member, IEEE, Hiroki
Nishiyama, Member, IEEE, NirwanAnsari,
Fellow, IEEE, Jie Yang, and Nei Kato,
SeniorMember, IEEE , Cluster-Based
Certificate Revocation with Vindication
Capability for Mobile Ad Hoc Networks
[13] J. Lian, K. Naik, and G.B. Agnew, A
Framework for Evaluating the Performance of
Cluster Algorithms for Hierarchical Networks,IEEE/ACM Trans. Networking, vol.
15, no. 6, pp. 1478-1489, Dec. 2007.
[14] Dai Zhi-Feng,li Yuan-Xiang,HeGuo-Liang
Tong Ya-La Shen Xian-Jun,Uncertain Data
Management for Wireless Sensor Networks
UsingRough Set Theory,2006 IEEE.
[15] Ye
Tian,MinSheng,
Jiandong
Li,
YanZhang,Junliang Yao and Di Tang,Energy
aware Dynamic Topology Control Algorithm
for wireless AdHoc Networks,2008 IEEE
95