SecurityEnhancementforAuthentication ofnodesinMANETbychecking theCRLstatusofServers

MANET security is becoming a challenge for researchers with the time. The lack of infrastructure gives rise to authentication problems in these networks. Most of the TTP and non- TTP based schemes seem to be impractical for being adopted in MANETs. A hybrid key- management scheme addressed these issues effectively by pre-assigned logins on offline basis and issuing certificates on its basis using 4G services. However, the scheme did not taken into account the CRL status of servers; if it is embedded the nodes need to check frequently the server's CRL status for authenticating any node and place external messages outside MANET which leads to overheads. We have tried to reduce them by introducing an online MANET Authority responsible for issuing certificates by considering the CRL status of servers, renewing them and key verification within MANET that has greatly reduced the external messages.

[1]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[2]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[3]  Alan Kai-Hau Yeung,et al.  Challenges in the migration to 4G mobile systems , 2003, IEEE Commun. Mag..

[4]  Henning Schulzrinne,et al.  Ubiquitous computing in home networks , 2003, IEEE Commun. Mag..

[5]  Shouhuai Xu,et al.  Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[6]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[7]  Ivan Damgård,et al.  Zero-Knowledge Authentication Scheme with Secret Key Exchange , 1988, Journal of Cryptology.

[8]  André Weimerskirch,et al.  A Distributed Light-Weight Authentication Model for Ad-hoc Networks , 2001, ICISC.

[9]  Vijay Varadharajan,et al.  Security for cluster based ad hoc networks , 2004, Comput. Commun..

[10]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..