Identification and Avoidance of Malicious Nodes by using Certificate Revocation Method
-
2018-09-27 https://doi.org/10.14419/ijet.v7i4.7.20533 -
Certificate authority scheme (CAS), cluster-based certificate revocation scheme (CBCRS), fixed infrastructure, mobile Ad-hoc networks, malicious avoidance certificate revocation. -
Abstract
There are a large number of applications of ad-hoc networks (i) military, (ii) Disaster rescue, (iii) Medical etc. But the security of the data during transfer is a major concern. This paper proposes a technique for identifying and preventing the malicious nodes to be in a path from sender to receiver, known as certificate revocation method. Here certificate authority Scheme (CAS) is responsible for the issue of the certificates for these nodes. The CAS maintains two sets of lists – a warning list and a blocked list. The node is added to a warning list if any of the neighbor nodes raises a suspension about a node. Both the accuser and the accused are added to this list. The node is transferred to blocked list when the corruption in the node is confirmed. A node from the blocked list is never added to the network again. This process is termed as cluster-based certificate revocation scheme (CBCRS). The priority of this technique is not the detection of the corrupted node but the removal of the corrupted node from the network. Experimental results reveal that this protocol is free from vulnerabilities.
Â
 -
References
[1] M. Rath, B.K. Pattanayak, B. Pati, “Energy efficient MANET protocol using cross layer design for military applicationsâ€, vol.66, no.2 , pp.146-150, 2016.
[2] M.A. Abdelshafy, P.J.B. King, “Dynamic Source Routing under Attacksâ€, 7th International Workshop on Reliable Networks Design and Modeling (RNDM), 2015, DOI: 10.1109/RNDM.2015.7325226.
[3] S.R. Das, C.E. Perkins and E.M. Royer, “Performance comparison of two on-demand routing protocols for ad hoc networks†, vol.8, no.1, pp.16-28, 2000.
[4] M. Manjunath, D. H. Manjaiah, “Spatial DSDV (S-DSDV) routing algorithm for mobile ad hoc networkâ€, 2014 International Conference on Contemporary Computing and Informatics (IC3I), DOI: 10.1109/IC3I.2014.7019587.
[5] J. Biswas, S.K. Nandy, “Efficient Key Management and Distribution for MANETâ€, 2006 IEEE International Conference on Communications, DOI: 10.1109/ICC.2006.255106.
[6] H. Yang, H. Luo, F. Ye, S. Lu, L. Zhang, “Security in Mobile Ad Hoc Networks: Challenges and Solutionsâ€, vol.11, no.1, pp. 38-47, 2004.
[7] G.V.S Raju, R. Akbani, “Authentication in wireless networksâ€, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), DOI: 10.1109/HICSS.2007.93.
[8] Mamatha, G. Sharma, “A new secured approach for manets against network layer attacksâ€, In, Integrated Intelligent Computing (ICIIC), 2010 First International Conference, DOI: 10.1109/ICIIC.2010.14.
[9] J.M. Chang, P.C. Tsou, H.C. Chao, Chen, J.L. chen,“ Cbds: a cooperative bait detection scheme to prevent malicious node for manet based on hybrid defense architectureâ€, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronics Systems Technology (Wireless VITAE), DOI: 10.1109/WIRELESSVITAE.2011.5940839.
[10] E. Nii, T. kitanouma, N. Adachi, , Y. Takizawa, “Cooperative detection for falsification and isolation of malicious nodes for wireless sensor networks in open environmentâ€, 2017, DOI: 10.1109/APMC.2017.8251496.
[11] C. Perkins, E.B. Royer, and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,†Internet RFCs, vol. 285. pp. 1–38, 2003.
-
Downloads
-
How to Cite
Vamshi krishna, H., & Swain, G. (2018). Identification and Avoidance of Malicious Nodes by using Certificate Revocation Method. International Journal of Engineering & Technology, 7(4.7), 152-156. https://doi.org/10.14419/ijet.v7i4.7.20533Received date: 2018-09-29
Accepted date: 2018-09-29
Published date: 2018-09-27