Author(s): A.Rajaram and Dr.S.Palaniswami
Journal: International Journal of Computer and Network Security
ISSN 2076-2739
Volume: 2;
Issue: 7;
Start page: 106;
Date: 2010;
Original page
Keywords: Shamir’s Secret Sharing | denial of service (DoS) | Routing cum forwarding (RCF) | Certificate revocation | Certification revival.
ABSTRACT
In mobile ad hoc networks (MANETs), it is easy to launch wormhole, man-in-the-middle and denial of service (DoS) attacks, or to impersonate another node A network consisting confidentiality and authentication of packets in both routing and link layers., we propose to develop an enhanced distributed certificate authority scheme to provide data integrity, thus making the network more secure from both inside and outside attacks. The proposed scheme makes use of Shamir’s secret sharing scheme along with a redundancy technique to support certificate renewal and revocation. The malicious nodes are detected by the trusting mechanism by monitoring the behavior hop by hop. By simulation results, we show that the proposed scheme achieves more packet delivery ratio while attaining less delay and overhead, compared with the TCLS scheme.
Journal: International Journal of Computer and Network Security
ISSN 2076-2739
Volume: 2;
Issue: 7;
Start page: 106;
Date: 2010;
Original page
Keywords: Shamir’s Secret Sharing | denial of service (DoS) | Routing cum forwarding (RCF) | Certificate revocation | Certification revival.
ABSTRACT
In mobile ad hoc networks (MANETs), it is easy to launch wormhole, man-in-the-middle and denial of service (DoS) attacks, or to impersonate another node A network consisting confidentiality and authentication of packets in both routing and link layers., we propose to develop an enhanced distributed certificate authority scheme to provide data integrity, thus making the network more secure from both inside and outside attacks. The proposed scheme makes use of Shamir’s secret sharing scheme along with a redundancy technique to support certificate renewal and revocation. The malicious nodes are detected by the trusting mechanism by monitoring the behavior hop by hop. By simulation results, we show that the proposed scheme achieves more packet delivery ratio while attaining less delay and overhead, compared with the TCLS scheme.