A Study on Certificate Revocation in Mobile Ad Hoc Networks

In mobile ad hoc networks, one challenge in certificate revocation design is to revoke malicious nodes' certificates accurately. In this paper, we build up on our previously proposed scheme [1], which enables the recovery of falsely accused nodes' certificates. This scheme is a cluster-based certificate revocation scheme that divides the network into clusters of one cluster head and cluster members. Through extensive simulations, we prove that this scheme enables low communication overhead and the revocation of malicious nodes' certificates promptly, and can also decrease the probability of false revocation. We also propose an improvement that increases the reliability of our proposed scheme.

[1]  Nirwan Ansari,et al.  Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks , 2007, IEEE Wireless Communications.

[2]  Jolyon Clulow,et al.  Suicide for the common good: a new strategy for credential revocation in self-organizing systems , 2006, OPSR.

[3]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[4]  Nei Kato,et al.  Certificate Revocation to Cope with False Accusations in Mobile Ad Hoc Networks , 2010, 2010 IEEE 71st Vehicular Technology Conference.

[5]  Muthucumaru Maheswaran,et al.  A localized certificate revocation scheme for mobile ad hoc networks , 2008, Ad Hoc Networks.

[6]  Haiyun Luo,et al.  URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.

[7]  Fred B. Schneider,et al.  COCA: a secure distributed online certification authority , 2002 .

[8]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[9]  Shiyong Zhang,et al.  Resisting flooding attacks in ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[10]  S. Micali Eecient Certiicate Revocation , 1996 .

[11]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[12]  Tarik Taleb,et al.  Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.

[13]  Xiaoyan Hong,et al.  A secure ad-hoc routing approach using localized self-healing communities , 2005, MobiHoc '05.

[14]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[15]  Pål Spilling,et al.  A survey of key management in ad hoc networks , 2006, IEEE Communications Surveys & Tutorials.

[16]  R.A. Raja Mahmood,et al.  A survey on detecting black hole attack in AODV-based mobile ad hoc networks , 2007, 2007 International Symposium on High Capacity Optical Networks and Enabling Technologies.