Predictive preemptive certificate transfer in Cluster-Based Certificate Chain

Mobile ad hoc networks are a set of nodes that cooperate and communicate wirelessly. This kind of networks in easy to deploy because there is no need of any pre-existing infrastructure. Security in Manets is a very important issue and it is hard to use conventional security techniques. Many approaches have been proposed to secure communication in Manets; most of them are based of public-key certifications which create a multitude of trust communication model. In this paper, we propose an amelioration of a distributed certificate chain that relies on the cluster based routing protocol. In our scheme, after forming clusters, the cluster-head node issue certificates for other nodes within its cluster. When a member node want migrates to an adjacent cluster, the cluster-head sends the node’s certificate to surrounding cluster-heads via gateway nodes. The protocol was doted by a preemptive predictive module to predict migration intention of member nodes. This approach has been evaluated by detailed simulation study. Simulation results show that this approach is scalable and generate lower certification overhead.

[1]  Fred B. Schneider,et al.  COCA: a secure distributed online certification authority , 2002 .

[2]  Robin Kravets,et al.  MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .

[3]  Wang Heng-jun Routing in AD HOC Networks of Mobile Hosts , 2002 .

[4]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[5]  Rahmat Budiarto,et al.  A Secure Mobile Ad hoc Network Based on Distributed Certificate Authority , 2011 .

[6]  M. Jiang,et al.  Cluster based routing protocol (CBRP) , 1999 .

[7]  David B. Johnson,et al.  Routing in Ad Hoc Networks of Mobile Hosts , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.

[8]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[9]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[10]  Bo Peng,et al.  Surveying Position Based Routing Protocols for Wireless Sensor and Ad-hoc Networks , 2012, Int. J. Commun. Networks Inf. Secur..

[11]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[12]  Ahmed Meddahi,et al.  Predictive Preemptive Ad Hoc On-Demand Distance Vector Routing , 2006 .

[13]  Robert H. Deng,et al.  Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.

[14]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[15]  Christine Meierhöfer Pretty good privacy , 1996, SIGGRAPH '96.

[16]  Haiyun Luo,et al.  Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .

[17]  Bernard P. Zajac,et al.  Pretty good privacy , 1994 .

[18]  Kamel Mohamed Faraoun,et al.  Link Quality and MAC-Overhead Aware Predictive Preemptive Multipath Routing Protocol for Mobile Ad Hoc Networks , 2013, Int. J. Commun. Networks Inf. Secur..

[19]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[20]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[21]  Mario Gerla,et al.  Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..

[22]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[23]  Souheila Bouam,et al.  Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks , 2013, Int. J. Commun. Networks Inf. Secur..

[24]  Kamesh Namuduri,et al.  Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis , 2005, EURASIP J. Wirel. Commun. Netw..

[25]  Charles E. Perkins,et al.  Evolution and future directions of the ad hoc on-demand distance-vector routing protocol , 2003, Ad Hoc Networks.

[26]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[27]  Mario Gerla,et al.  A distributed architecture for multimedia in dynamic wireless networks , 1995, Proceedings of GLOBECOM '95.

[28]  Simson L. Garfinkel,et al.  PGP: Pretty Good Privacy , 1994 .

[29]  Sugata Sanyal,et al.  Security Architecture for Cluster based Ad Hoc Networks , 2012, ArXiv.

[30]  Robbert van Renesse,et al.  COCA: a secure distributed online certification authority , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[31]  Charles E. Perkins,et al.  An implementation study of the AODV routing protocol , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[32]  Taekyoung Kwon,et al.  Cluster-Based Certificate Chain for Mobile Ad Hoc Networks , 2006, ICCSA.