Claude et al 25 have proposed a certificate

Info icon This preview shows pages 24–26. Sign up to view the full content.

Claude et al. 25 have proposed a certificate revocation scheme for wire- less ad hoc networks. The authors propose that each node maintains a CRL Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 24

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

12 A. Naveed and S. Kanhere and the certificates are revoked by individual nodes. Each node maintains a profile table and a status table. When a node detects the misbehavior of a neighboring node, it launches an accusation against the misbehaving node by broadcasting the certificate identity of the misbehaving node. When a node receives the accusation message, it records the accusation in the pro- file table with the certificate identity of the accuser, the accused, the status of the certificate as broadcasted by the accuser and date and time of accu- sation. The message with duplicate accuser and accused certificate ID are ignored. The Status table is constructed from the profile table. It contains the following information: number of accusations against node i , number of accusations by node i , behavior index of node i , weight of i ’s accusation, revocation quotient and certificate status of node i . The behavior index of node i is inversely proportional to the number of accusations against it. The weight of its accusation is inversely proportional to its behavior index and the number of accusations it makes against other nodes. The revocation threshold is used to decide if the certificate of the node should be revoked. When a node revokes the certificate of another node in the network, it no longer considers this node as authentic. Its accusations about other nodes are ignored and no communication from this node is trusted. However, the decision of the accusing node does not impact the decision of the neighbor- ing nodes. The proposed method, while simplistic and efficient, involves excessive communication and storage overhead on the nodes. Yang et al. 2 have proposed a distributed certificate renewal and revo- cation technique based on the threshold secret-shared cryptographic tech- nique. The authors have utilized the routing behavior of the nodes to identify the misbehaving nodes. A novel token-based crediting scheme has been proposed. Each participant node is issued a token with a fixed token life when it joins the network. The token serves the purpose of a credential for node authentication. The token of the node expires after a fixed time duration. Just before token expiration, the node requests its neighboring nodes for token renewal. Note that the nodes maintain a credit index of each neighboring node within the network. k out of n neighbors collaborate using threshold secret-shared cryptography (discussed in previous section) to issue a new token to the requesting node. The token expiry time of this
Image of page 25
Image of page 26
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '12
  • Kushal Kanwar
  • Public key infrastructure, ........., Public-key cryptography, Pretty Good Privacy

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern