Security Enhancement in MANET Authentication by checking the CRL status of Servers

نویسندگان

  • Azeem Irshad
  • Wajahat Noshairwan
  • Muhammad Shafiq
  • Shahzada Khurram
  • Ehtsham Irshad
  • Muhammad Usman
چکیده

MANET security is becoming a challenge for researchers with the time. The lack of infrastructure gives rise to authentication problems in these networks. Most of the TTP and non-TTP based schemes seem to be impractical for being adopted in MANETs. A hybrid key-management scheme addressed these issues effectively by pre-assigned logins on offline basis and issuing certificates on its basis using 4G services. However, the scheme did not taken into account the CRL status of servers; if it is embedded the nodes need to check frequently the server’s CRL status for authenticating any node and place external messages outside MANET which leads to overheads. We have tried to reduce them by introducing an online MANET Authority responsible for issuing certificates by considering the CRL status of servers, renewing them and key verification within MANET that has greatly reduced the external messages.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Enhancement for Authentication of nodes in MANET by checking the CRL status of Servers

MANET security is becoming a challenge for researchers with the time. The lack of infrastructure gives rise to authentication problems in these networks. Most of the TTP and nonTTP based schemes seem to be impractical for being adopted in MANETs. A hybrid keymanagement scheme addressed these issues effectively by pre-assigned logins on offline basis and issuing certificates on its basis using 4...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Intrusion prevention and Message Authentication Protocol (IMAP) using Region Based Certificate Revocation List Method in Vehicular Ad hoc Networks

Vehicular Ad-hoc network uses some advanced Public Key Infrastructure and digital signature method for security. But, intrusion detection and avoidance is an inevitable challenge in networks. Authentication is performed in any PKI (Public Key Infrastructure) system by checking if the certificate of the sender is included in the CRL (Certificate Revocation List) and verifying the authenticity an...

متن کامل

Enhanced Management of Certificate Caching and Revocation Lists in VANET

Vehicular network security is an important field and it is agreed that digital signature certificates are becoming the main authentication technique in this environment. The high number of vehicles and their continuous location change bring some difficulties in the exchange of these certificates and in their revocation. This paper covers these two cases and proposes an enhancement to the certif...

متن کامل

Enhanced Management of Certificate Caching and Revocation Lists in VANET

Vehicular network security is an important field and it is agreed that digital signature certificates are becoming the main authentication technique in this environment. The high number of vehicles and their continuous location change bring some difficulties in the exchange of these certificates and in their revocation. This paper covers these two cases and proposes an enhancement to the certif...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008