SlideShare a Scribd company logo
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

CLUSTER-BASED CERTIFICATE REVOCATION WITH VINDICATION
CAPABILITY FOR MOBILE AD HOC NETWORKS

ABSTRACT:

Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease
of deployment. However, the wireless and dynamic natures render them more vulnerable to
various types of security attacks than the wired networks. The major challenge is to guarantee
secure network services. To meet this challenge, certificate revocation is an important integral
component to secure network communications.

In this paper, we focus on the issue of certificate revocation to isolate attackers from further
participating in network activities. For quick and accurate certificate revocation, we propose the
Cluster-based Certificate Revocation with Vindication Capability (CCRVC) scheme. In
particular, to improve the reliability of the scheme, we recover the warned nodes to take part in
the certificate revocation process; to enhance the accuracy.

We propose the threshold-based mechanism to assess and vindicate warned nodes as legitimate
nodes or not, before recovering them. The performances of our scheme are evaluated by both
numerical and simulation analysis. Extensive results demonstrate that the proposed certificate
revocation scheme is effective and efficient to guarantee secure communications in mobile ad
hoc networks.

More Related Content

PPTX
What Happens At The Edge Of Your Network
PPTX
Research proposal on Computing Security and Reliability - Phdassistance.com
PDF
Cloud centric multi-level authentication as a service for secure public safet...
PDF
Block Armour: Zero Trust Cybersecurity
DOCX
Matrix Table
PPTX
Aniketos trust bus_sept_2012
PDF
Blind spots in the network.pdf
DOCX
Information flow control for secure cloud computing
What Happens At The Edge Of Your Network
Research proposal on Computing Security and Reliability - Phdassistance.com
Cloud centric multi-level authentication as a service for secure public safet...
Block Armour: Zero Trust Cybersecurity
Matrix Table
Aniketos trust bus_sept_2012
Blind spots in the network.pdf
Information flow control for secure cloud computing

What's hot (18)

PDF
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
PDF
Sb securing-industrial-control-systems-with-fortinet
PDF
Introduction to Cloud Security
ODP
Security Considerations on Hybrid Cloud
PDF
Protect your company from zero-day with ESET Dynamic Threat Defense
PDF
Iaona handbook for network security - draft rfc 0.4
PDF
International Journal of Computational Engineering Research(IJCER)
PPTX
Cisco 2015 Midyear Security Report Slide Deck
PDF
Beyond Security Article_Cyber Security_April_2015
PDF
Internet of Things Security - Trust in the supply chain
PDF
Whitepaper - Software Defined Networking for the Telco Industry
PPTX
Security and privacy issues of pervasive computing
DOCX
Instructional strategies for el ls pre-emergent instructiona
PDF
Cisco SAFE_Wireless LAN Security in Depth v2
PDF
Clues for Solving Cloud-Based App Performance
PDF
A Novel SDN Architecture for IoT Security
PDF
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
PDF
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
Sb securing-industrial-control-systems-with-fortinet
Introduction to Cloud Security
Security Considerations on Hybrid Cloud
Protect your company from zero-day with ESET Dynamic Threat Defense
Iaona handbook for network security - draft rfc 0.4
International Journal of Computational Engineering Research(IJCER)
Cisco 2015 Midyear Security Report Slide Deck
Beyond Security Article_Cyber Security_April_2015
Internet of Things Security - Trust in the supply chain
Whitepaper - Software Defined Networking for the Telco Industry
Security and privacy issues of pervasive computing
Instructional strategies for el ls pre-emergent instructiona
Cisco SAFE_Wireless LAN Security in Depth v2
Clues for Solving Cloud-Based App Performance
A Novel SDN Architecture for IoT Security
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Ad

Viewers also liked (18)

PDF
Come operare con successo nelle opzioni binarie
PDF
Комплектации Renault Captur
DOC
david mackinnon.cv
PDF
Dotnet channel assignment for throughput optimization in multichannel multir...
DOCX
Resume (4)
PDF
Система кроя Золотая Выкройка
PDF
Dinamon's beacon
PDF
Los animales domésticos y salvajes para niños
PPS
L A M I E R D A
PPT
Dialogue14
PPTX
Logos ,concepto o razon
PPTX
Alterspanish
PDF
Pão de banana
PDF
Programa Jornadas Verduras de invierno
PPT
Ambientes que propicien
ODT
ODP
Presentació classe de 5è B
DOCX
Decoupagem
Come operare con successo nelle opzioni binarie
Комплектации Renault Captur
david mackinnon.cv
Dotnet channel assignment for throughput optimization in multichannel multir...
Resume (4)
Система кроя Золотая Выкройка
Dinamon's beacon
Los animales domésticos y salvajes para niños
L A M I E R D A
Dialogue14
Logos ,concepto o razon
Alterspanish
Pão de banana
Programa Jornadas Verduras de invierno
Ambientes que propicien
Presentació classe de 5è B
Decoupagem
Ad

Similar to Dotnet cluster-based certificate revocation with vindication capability for mobile ad hoc networks (8)

PDF
Cluster based certificate revocation with vindication capability for mobile a...
PDF
Java cluster-based certificate revocation with vindication capability for mo...
PDF
Cluster based certificate revocation with vindication capability for mobile a...
PDF
Elevating security in mobile adhoc network using
PDF
Power Aware Cluster to Minimize Load In Mobile Ad Hoc Networks
PDF
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
PDF
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
PDF
Survey on Certificate Revocation in MANET
Cluster based certificate revocation with vindication capability for mobile a...
Java cluster-based certificate revocation with vindication capability for mo...
Cluster based certificate revocation with vindication capability for mobile a...
Elevating security in mobile adhoc network using
Power Aware Cluster to Minimize Load In Mobile Ad Hoc Networks
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Survey on Certificate Revocation in MANET

More from Ecwayt (20)

PDF
Covering points of interest with mobile sensors
PDF
Coloring based inter-wban scheduling for mobile wireless body area networks
DOC
Code modulation based encryption & decryption technique for secure communicat...
PDF
Clustering sentence level text using a novel fuzzy relational clustering algo...
PDF
Clustering large probabilistic graphs
PDF
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
PDF
Cloudsim ranking on data manifold with sink points
PDF
Cloudsim quality-differentiated video multicast in multirate wireless networks
PDF
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
PDF
Cloudsim distributed web systems performance forecasting using turning bands...
PDF
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
DOCX
Civil 2013 titles
DOC
Chopper based dc motor speed control
PDF
Channel assignment for throughput optimization in multichannel multiradio wir...
PDF
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
PDF
Casual stereoscopic photo authoring
DOCX
Casual stereoscopic photo authoring
PDF
Capacity of hybrid wireless mesh networks with random a ps
DOC
Bomb detection robot with wireless camera
DOC
Bed side patients monitoring system with emergency alert
Covering points of interest with mobile sensors
Coloring based inter-wban scheduling for mobile wireless body area networks
Code modulation based encryption & decryption technique for secure communicat...
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering large probabilistic graphs
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim ranking on data manifold with sink points
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Civil 2013 titles
Chopper based dc motor speed control
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Casual stereoscopic photo authoring
Casual stereoscopic photo authoring
Capacity of hybrid wireless mesh networks with random a ps
Bomb detection robot with wireless camera
Bed side patients monitoring system with emergency alert

Dotnet cluster-based certificate revocation with vindication capability for mobile ad hoc networks

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com CLUSTER-BASED CERTIFICATE REVOCATION WITH VINDICATION CAPABILITY FOR MOBILE AD HOC NETWORKS ABSTRACT: Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless and dynamic natures render them more vulnerable to various types of security attacks than the wired networks. The major challenge is to guarantee secure network services. To meet this challenge, certificate revocation is an important integral component to secure network communications. In this paper, we focus on the issue of certificate revocation to isolate attackers from further participating in network activities. For quick and accurate certificate revocation, we propose the Cluster-based Certificate Revocation with Vindication Capability (CCRVC) scheme. In particular, to improve the reliability of the scheme, we recover the warned nodes to take part in the certificate revocation process; to enhance the accuracy. We propose the threshold-based mechanism to assess and vindicate warned nodes as legitimate nodes or not, before recovering them. The performances of our scheme are evaluated by both numerical and simulation analysis. Extensive results demonstrate that the proposed certificate revocation scheme is effective and efficient to guarantee secure communications in mobile ad hoc networks.