Identification and Avoidance of Malicious Nodes by using Certificate Revocation Method

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    There are a large number of applications of ad-hoc networks (i) military, (ii) Disaster rescue, (iii) Medical etc.  But the security of the data during transfer is a major concern. This paper proposes a technique for identifying and preventing the malicious nodes to be in a path from sender to receiver, known as certificate revocation method. Here certificate authority Scheme (CAS) is responsible for the issue of the certificates for these nodes. The CAS maintains two sets of lists – a warning list and a blocked list. The node is added to a warning list if any of the neighbor nodes raises a suspension about a node. Both the accuser and the accused are added to this list. The node is transferred to blocked list when the corruption in the node is confirmed. A node from the blocked list is never added to the network again. This process is termed as cluster-based certificate revocation scheme (CBCRS). The priority of this technique is not the detection of the corrupted node but the removal of the corrupted node from the network. Experimental results reveal that this protocol is free from vulnerabilities.



  • Keywords

    Certificate authority scheme (CAS); cluster-based certificate revocation scheme (CBCRS); fixed infrastructure; mobile Ad-hoc networks; malicious avoidance certificate revocation.

  • References

      [1] M. Rath, B.K. Pattanayak, B. Pati, “Energy efficient MANET protocol using cross layer design for military applications”, vol.66, no.2 , pp.146-150, 2016.

      [2] M.A. Abdelshafy, P.J.B. King, “Dynamic Source Routing under Attacks”, 7th International Workshop on Reliable Networks Design and Modeling (RNDM), 2015, DOI: 10.1109/RNDM.2015.7325226.

      [3] S.R. Das, C.E. Perkins and E.M. Royer, “Performance comparison of two on-demand routing protocols for ad hoc networks” , vol.8, no.1, pp.16-28, 2000.

      [4] M. Manjunath, D. H. Manjaiah, “Spatial DSDV (S-DSDV) routing algorithm for mobile ad hoc network”, 2014 International Conference on Contemporary Computing and Informatics (IC3I), DOI: 10.1109/IC3I.2014.7019587.

      [5] J. Biswas, S.K. Nandy, “Efficient Key Management and Distribution for MANET”, 2006 IEEE International Conference on Communications, DOI: 10.1109/ICC.2006.255106.

      [6] H. Yang, H. Luo, F. Ye, S. Lu, L. Zhang, “Security in Mobile Ad Hoc Networks: Challenges and Solutions”, vol.11, no.1, pp. 38-47, 2004.

      [7] G.V.S Raju, R. Akbani, “Authentication in wireless networks”, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), DOI: 10.1109/HICSS.2007.93.

      [8] Mamatha, G. Sharma, “A new secured approach for manets against network layer attacks”, In, Integrated Intelligent Computing (ICIIC), 2010 First International Conference, DOI: 10.1109/ICIIC.2010.14.

      [9] J.M. Chang, P.C. Tsou, H.C. Chao, Chen, J.L. chen,“ Cbds: a cooperative bait detection scheme to prevent malicious node for manet based on hybrid defense architecture”, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronics Systems Technology (Wireless VITAE), DOI: 10.1109/WIRELESSVITAE.2011.5940839.

      [10] E. Nii, T. kitanouma, N. Adachi, , Y. Takizawa, “Cooperative detection for falsification and isolation of malicious nodes for wireless sensor networks in open environment”, 2017, DOI: 10.1109/APMC.2017.8251496.

      [11] C. Perkins, E.B. Royer, and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet RFCs, vol. 285. pp. 1–38, 2003.




Article ID: 20533
DOI: 10.14419/ijet.v7i4.7.20533

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.