Open Access
Subscription Access
Open Access
Subscription Access
Certificate Revocation Scheme Based on Weighted Voting Game and Rational Secure Multiparty Computing
Subscribe/Renew Journal
The Mobile Adhoc Network consists of deployed mobile nodes which lead to the frequent changes in network topology. Due to topology changes, required infrastructure is unavailable for communication. Moreover, malicious nodes present in MANET make use of this modification and can easily launch highly vulnerable attacks on the routing path of the network. Hence, Security issue such as removing misbehaving nodes is the primary issue in MANET. Effective certificate revocation scheme was introduced to identify and eliminate the node with malicious activities in the network based on the weighted voting game (ECR-WVG) approach. In this approach, weights and quota were two factors, determined for an effective revocation of malicious nodes certificates. However, security during multiparty transmission was not taken into account in ECR-WVG. In Effective Certificate Revocation Scheme based on Weighted Voting Game and Rational Secure Multi-Party Computing (ECR-WVG-RSMPC) method, rational secret sharing scheme is introduced along with ECR-WVG approach for securing multiparty transmission. Performance evaluation can be done between ECR-WVG and ECR-WVG-RSMPC in terms of false revocation, malicious node revocation, normalized time for revocation and revocation accuracy ratio.
Keywords
Mobile Adhoc Network, Network Topology, Certificate Revocation Scheme, Weighted Voting Game, Multiparty Transmission.
Subscription
Login to verify subscription
User
Font Size
Information
- Sungwook Kim, “Effective Certificate Revocation Scheme based on Weighted Voting Game Approach”, IET Information Security, Vol. 10, No. 4, pp. 180-187, 2016.
- Yilei Wang, Tao Li, Hairong Qin, Jin Li, Wei Gao, Zhe Liu and Qiuliang Xu, “A Brief Survey on Secure Multi-Party Computing in the Presence of Rational Parties”, Journal of Ambient Intelligence and Humanized Computing, Vol. 6, No. 6, pp. 807-824, 2015.
- Genevieve Arboit, Claude Crepeau, Carlton R. Davis and Muthucumaru Maheswaran, “A Localized Certificate Revocation Scheme for Mobile Ad Hoc Networks”, Ad Hoc Networks, Vol. 6, No. 1, pp. 17-31, 2008.
- R. Ayyasamy and P. Subramani, “An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-Hoc Networks”, The International Arab Journal of Information Technology, Vol. 9, No. 3, pp. 291-298, 2012.
- W. Liu, H. Nishiyama, N. Ansari, J. Yang and N. Kato, “Cluster-based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks”, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 2, pp. 239-249, 2013.
- N. Steven Raj and Sneha Kathare, “Clustering of Certificate Revocation to Reinforce an Idea for Mobile Ad Hoc Networks”, International Journal of Engineering Research and Technology, Vol. 3, No. 7, pp. 682-685, 2014.
- Huaqiang Xu, Rui Wang and Zhiping Jia, “A Lightweight Certificate Revocation Scheme for Hybrid Mobile ad Hoc Networks”, International Journal of Security and Its Applications, Vol. 10, No. 1, pp. 287-302, 2016.
- Maxim Raya, Daniel Jungels, Panos Papadimitratos, Imad Aad and Jean-Pierre Hubaux, “Certificate Revocation in Vehicular Networks”, Available at: https://infoscience.epfl.ch/record/83626/files/CertRevVANET.pdf.
- T. Pank, “Review of Certificate Revocation in Mobile Ad Hoc Networks”, International Journal of Advances in Management Technology and Engineering Sciences, Vol. 2, No. 6, pp. 2249-7455, 2013.
- Jolyon Clulow and Tyler Moore, “Suicide for the Common Good: a New Strategy for Credential Revocation in Self-Organizing Systems”, ACM SIGOPS Operating Systems Review, Vol. 40, No. 3, pp. 18-21, 2006.
- M. Srividya, K. RadhikA and D. Jamuna, “Review on Certificate Revocation of Mobile Ad Hoc Networks”, International Journal of Engineering Research and Technology, Vol. 1, No. 7, pp. 1-4, 2012
- H. Luo, J. Kong, P. Zerfos, S. Lu and L. Zhang, “URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks”, IEEE/ACM Transactions on Networking, Vol. 12, No. 6, pp. 1049-1063, 2004.
Abstract Views: 338
PDF Views: 3