SlideShare a Scribd company logo
1 of 5
Download to read offline
89 International Journal for Modern Trends in Science and Technology
Survey on Certificate Revocation in MANET
Jayanthi.E1
| Dr. Mohammed Ali Hussain2
1Department of Computer science and Engineering, KL University, Guntur Dist., A.P., India
2Professor, Dept. of Electronics and Computer Engineering, KL University, Guntur Dist., A.P., India.
To Cite this Article
Jayanthi.E and Dr. Mohammed Ali Hussain, “Survey on Certificate Revocation in MANET”, International Journal for
Modern Trends in Science and Technology, Vol. 03, Issue 10, October 2017, pp: 89-93.
Mobile Adhoc Network (MANET) is a self- configuring and infrastructure-less network which consists of
mobile devices such as mobiles, laptops, PDA’s etc. Because of its lack of infrastructure, wireless mobile
communication, dynamic topology, MANET is vulnerable to various security attacks. This survey paper
presents an overview of developments of voting and non-voting based certificate revocation mechanisms in
past few years. Certificate revocation is an important method used to secure the MANET. Certificate
revocation isolates the attacker nodes from participating in network activities by revoking its certificate. Over
last few years different schemes are explored for certificate revocation. In concluding section we present the
limitations of the current cluster based certificate revocation scheme.
KEYWORDS: Mobile ad hoc networks (MANETs), PKI, certificate revocation, Trust, security, threshold, CCRCV
Copyright © 2017 International Journal for Modern Trends in Science and Technology
All rights reserved.
I. INTRODUCTION
Highlight a section that you want to designate
with a certain style, and then select the appropriate
name on the style menu. The style will adjust your
fonts and line spacing. Do not change the font
sizes or line spacing to squeeze more text into a
limited number of pages. Use italics for
emphasis; do not underline.
A mobile adhoc network (MANET) consists of
wireless mobile devices or “nodes”, such as
laptops, cell phones, and Personal Digital
Assistants (PDAs), which can move in the network
system openly. Fig 1 shows the structure of
MANET. In addition to mobility, mobile devices
cooperate to forward packets to one another to
extend the restricted transmission range of each
node. This is achieved by multi- hop relaying,
which is used in many applications, such as
disaster relief, military operation, and emergency
communication. Security is an important need for
these network services. Provisioning secure
communication between two nodes is main
concern. Because of its characteristics, such as
infrastructure-less, mobility and dynamic
topology, MANET is vulnerable to various types of
security attacks.
Among all security viewpoints in MANET,
certificate management is generally used
mechanism, which is utilized to secure
applications and network services. Certification is
a prerequisite to secure network
communication. Certificate is a data structure in
which public key is bound to the attributes by the
digital signature of the issuer, and can be used to
verify the identity of individual, and also to prevent
tampering and forging in mobile ad hoc networks.
Need for Certificate Revocation: Certificate
management is basically used to covey trust in
public key infrastructure to secure network
services and applications.
ABSTRACT
Available online at: http://www.ijmtst.com/vol3issue10.html
International Journal for Modern Trends in Science and Technology
ISSN: 2455-3778 :: Volume: 03, Issue No: 10, October 2017
90 International Journal for Modern Trends in Science and Technology
Jayanthi.E and Dr. Mohammed Ali Hussain : Survey on Certificate Revocation in MANET
Fig 1: Mobile Ad hoc Network
The general ad hoc network characteristics are:
Mobility: Rapid deployment in areas with no
infrastructure often implies that the users must
explore an area and perhaps form teams/swarms
that in turn coordinate among themselves to
create a taskforce or a mission. We can have
individual random mobility as our base mobility
pattern. The mobility can have major impact on the
selection of a routing scheme and can thus
influence performance.
Multi-hopping: a multiple hop network is a
network where the path from source to destination
traverses several othernodes. Ad hoc often exhibit
multiple hops for congestion control, spectrum
reuse, and energy conservation.
Self-organization: The ad hoc network must
autonomously determine its own configuration
parameters including: addressing, routing,
clustering, position identification, power control,
etc.
Energy conservation: most ad hoc nodes have
limited power supply and no capability to
generate their own power. Energy efficient
protocol design is critical for longevity of the
network.
Scalability: In some applications the ad hoc
network can grow to several thousand nodes.
Hierarchical construction, Mobile IP or local
handoff techniques do dilute the issue but still
large scale is one of the most critical challenges in
ad hoc design.
Security: The challenges of wireless security are
well known ability of the intruders to eavesdrop
and jam/spoof the channel. Ad hoc networks are
more vulnerable to attacks than the
infrastructure counterparts. Both passive and
active attacks are possible.
Purpose of the Study Review:
The main purpose of this literature survey is to
take review of the existing work in this area to
understand the depth of
certificate revocation in mobile ad hoc network.
Here
presents study of the existing work which
makes understand the adhoc networks, issues
related to mobile nodes issues related to certificate
revocation, application of ad hoc networks.
Vulnerabilities of MANET:
1. Unreliability of wireless links between nodes:
Because of the limited energy supply and the
mobility of the nodes, the wireless links between
mobile nodes in the ad hoc network are not
consistent for the communication participants.
2. Dynamic topologies:
Nodes are free to move randomly; thus, the
network topology which is typically multi-hop may
changes frequently at any time.
3. Lack of Secure Boundaries:
There is not such a clear secure boundary in the
mobile ad hoc network, which can be compared
with the clear line of defense in the traditional
wired network. This vulnerability originates from
the nature of the mobile ad hoc network, because
of this MANET is prone to various security
attacks.
4. Threats from Compromised nodes Inside the
Network: Because of the mobility of the ad
hoc network, compromised node can frequently
change its attack target. and perform malicious
behavior to different node in the network, thus it is
very difficult to track the malicious behavior
performed by a compromised node especially in a
large scale ad hoc network.
5. Lack of Centralized Management Facility:
Due to absence of centralized management facility
problems detection of attacks, path breakages,
transmission impairments and packet dropping,
breakage of the cooperative algorithm take place
because decision making process is decentralized.
6. Restricted Power Supply:
The problem that may be caused by the restricted
power supply is denial-of-service attacks.
7. Active and Passive attacks:
• Active Attack:
An active attack disrupts the normal functioning of
the network by modifying or destroying the
data being exchanged. It is internal and external.
Internal attack can be possible by compromised
node.
External attacks are conducted by the nodes which
are not belongs to the network.
• Passive Attack:
Passive attack does not affect the normal operation
91 International Journal for Modern Trends in Science and Technology
Jayanthi.E and Dr. Mohammed Ali Hussain : Survey on Certificate Revocation in MANET
of the network. The attacker observes the
data exchanged in the network without modifying
it.
II. . LITERATURE SURVEY
It is difficult to secure MANET, because of
the vulnerabilities of wireless links, the limited
protection of nodes, the dynamically changing
topology and the lack of infrastructure. Various
certificate revocation techniques have been
proposed in literature to improve the network
security. These revocation techniques are basically
categories in voting based and non-voting based
schemes.
Voting based mechanism: Voting based
mechanism is characterized as the method for
revoking a malicious attacker’s certificate through
votes from legitimate neighboring nodes.
A.Ubiquitious and Robust Access Control for MANET
The strategy proposed in [2] considers the issue
of access control for a mobile adhoc network. With
the help of this we give access to well carrying on
nodes and deny access from acting mischievously
nodes. A mischievously acting node can be either a
selfish nodes or malicious node. Proposed URSA
fully localized design paradigm to provide
ubiquitous and robust access control for MANET.
This arrangement takes ticket-based methodology.
Every well-behaving node uses a certified ticket
to take part in routing and packet forwarding.
Nodes without legitimate tickets are classified as
being misbehaving node. They will be denied from
any system access, despite the fact that they move
to different areas. In URSA, different nodes in
a local network neighborhood, typically one or
two-hop away, cooperate to monitor a node’s
behavior and determine whether it is well-
behaving or misbehaving by using certain
detection mechanism. The expiring ticket of a
well-behaving node will be renewed collectively
by these nearby observing neighbors, while a
misbehaving node will be revoked of its ticket. The
implementation is based on refined threshold
cryptography algorithms. When a number of
negative votes exceed a predetermined number, the
certificate of accused node will be revoked.
B. Localized Certificate revocation scheme
In [4] introduces localized certificate revocation
scheme. This scheme manages the issue of
certificate revocation in MANET, where online
access to (CA) Certificate Authority is a
challenging problem. This method is used in pure
ad hoc networks, where no access to central
authorities or certificate authority. This solution is
a decentralized certificate revocation scheme that
allows the nodes in MANET to revoke the certificate
of malicious entities. In this scheme each node
monitors the behavior of the other nodes. If node
found that given node is behaving suspiciously, it
is required to broadcast an accusation packet
against that node. Accusations from any given
node are weighted based on trust of the accuser:
the higher the trust of a node, the greater the
weight of its accusations, and vice versa. A nodes
certificate is revoked if the estimation of the total of
accusation weights against the given node is
greater than a threshold. Since all the nodes are
required to participate in each voting,
communication overhead is very high.
Non-voting based mechanism: In this
mechanism any node with legitimate certificate
can choose given node as malicious attacker.
C. Suicide for the Common Good:Credential
revocation scheme for MANET
In [3] proposed scheme considered the problem
of credential revocation in self-organizing systems.
This is decentralized system, where certificate
revocation can be immediately finished by only one
accusation. However the certificates of the both
accuser and accused node have to be revoked
simultaneously. Therefore the accusing node has
to sacrifice itself to remove an attacker from the
network. This method reduces the revocation time
and communication overhead of certificate
revocation. The suicidal approach does not take
into account the false accusation from malicious
attacker. Trouble with this approach is that a
malicious node can falsely accuse legitimate nodes.
Therefore the accuracy of the system is degraded.
D. Certificate Revocation to cope with false
accusation
In [5] proposed certificate revocation to cope with
false accusation. It solves the problem of false
accusation, where malicious attacker node
accused the legitimate node. In this scheme, CA is
responsible to handle all control messages and
holding accuser and accused node in warning list
(WL) and black list (BL). It is cluster based solution,
Cluster head (CH) detect falsely accused node and
remove from black list. In the proposed scheme, a
genuine node can be recorded in the BL by a false
attack detection packet sent from a malicious
node. To adapt with this issue, CHs are permitted
92 International Journal for Modern Trends in Science and Technology
Jayanthi.E and Dr. Mohammed Ali Hussain : Survey on Certificate Revocation in MANET
to carry out the certificate recovery to correct the
mistakes in the BL. This scheme takes very short
time revoke certificate of malicious attacker.
Nirwan Ansari [1] proposed cluster based
revocation scheme CCRVC (Cluster-based
certificate revocation with vindication capability for
MANET). Here nodes are organized to form
clusters. In this scheme certificate authority CA
manages the warn list and black lists and issues
and remove the certificate of malicious nodes. If
any node behaves maliciously then its neighbor
node will accuse it to CA and that node placed in
black list. Then CA will send accusations to CH to
confirm that nodes in the black list are malicious
attacker or not. If CH found that attacker then its
certificate of malicious nodes are revoked.
Otherwise the nodes are recovered from warning
list. This scheme solves the problem of false
accusation and reduces the revocation time as
compared to voting based mechanism. The main
limitation of this approach is very high
communication overhead.
E.Certificate Revocation system based on Trust
mechanism:
The system proposed in [14] is divided into three
phases:
• Cluster Formation Phase
• Trust Calculation Phase
• Enhanced Certificate Revocation Phase
During cluster formation groups of mobile nodes
are formed using weighted clustering algorithm.
Next trust calculation phase, in which trust on
each node is computed. Trust in a network is used
to determine the relationship between nodes. Trust
is based on its previous behavior in forwarding and
dropping packets during transmission. Each and
every nodes observes their nearby nodes whether it
forward/drops the packets.The trust vector is
modified for each transaction. So, the Enhanced
Certificate Revocation algorithm is used to revoke
the certificate of malicious nodes. ECR achieves the
following:
• It examines the exact malicious node without
any fake accusation in the cluster with two levels of
accusation process.
• Proposed scheme requires AP (accusation
packet) transferred across the accuser, CH and CA,
which is sufficient to detect the improper nodes
and thus, it reduces communication complexity.
It minimizes the period of revocation
III. COMPARITIVE STUDY
Aim of this survey is to compare various
certificate revocation methods and to know their
limitations. Thispaper explains the fundamentals
of certificate revocation process. Then the concept
of voting based and non-voting based certificate
revocation has been discussed at length in this
paper. From this study it has been observed that
previous certificate revocation scheme has issues
like processing overhead and messaging overhead.
Table1. shows the comparative analysis of
certificate revocation schemes
TABLEI.COMPARITIVESTUDY
Certificate
Revocation
Scheme
Advantages Limitations
URSA-
Ubiquitous
andRobust
Access
Control
•Certificaterevo
ke
basedonvotesfr
om its neighbor.
•Whennegativ
e
votesexceedso
me
numbercertificat
e of
accusednod
eis revoked.
•Determining
thresholdis
challenging.
•Doesnotdeal with
falseaccusation.
Localized
Certificate
revocation
scheme[4].
•AswithURSA,no
CAexists.
•Revocationis
basedonweigh
ted
accusation.
•Certificaterevo
ked
whenweightedsu
m
fromvotesexcee
ds
predefinethresh
old.
•Sinceallnodes
Participatein
voting,
highcommunication
overhead.
•Increasesrevocation
time.
Suicidefor
Common
Good:New
strategyfor
credential
revocation
[3].
•Revocationquick
ly
Completedby
only
oneaccusation
.
•Accusingnodeh
as to
sacrificeitself.
•Fastremoval.
•Lowoverhead.
• Fully
decentrali
zed.
•Doesn’tdeal with
Falseaccusednode.
•Accuracydegraded.
CCRVC
(Cluster
based
Certificate
Revocation
with
Vindication
Capability
for
MANET)[1].
•Clusterbased
Scheme.
•CAmanagesWLa
nd dBL.
•Certificateof
maliciousnodec
an be revokedby
single neighbor.
•Dealswithfal
se accusation.
•High
Communicatin
overhead.
93 International Journal for Modern Trends in Science and Technology
Jayanthi.E and Dr. Mohammed Ali Hussain : Survey on Certificate Revocation in MANET
The above studied systems are voting based and
non-voting based certificate revocation in the
literature survey are giving good results but they
are carrying few disadvantages with them like for
voting based scheme processing and
communication overhead during revocation. It is
also challenging task to calculating threshold in
voting based scheme. From previous solutions it
has been seen that, accurate revocation, quick
revocation, also small network overhead remain
the challenging issues to be addressed in a
certificate system, particularly in MANET. The
Enhanced Certificate Revocation system is
designed to provide efficient certificate
revocation that overcomes the drawbacks of
previous schemes.
IV. CONCLUSION
The aim of this survey is to compare various
certificate revocation methods and to know their
limitations. This paper explains the fundamentals
of certificate revocation process.Then the concept
of voting based and non-voting basedcertificate
revocation has been discussed at length in this
paper. From this study it has been observed that
previous certificate revocation scheme has issues
like processing overhead and messaging overhead.
From previous solutions it has been seen that,
accurate revocation, quick revocation, and small
network overhead remain the challenging issues to
be addressed in a certificate system, particularly in
MANET
REFERENCES
[1] W. Liu, H. Nishiyama, N. Ansari, and N. Kato,
”Cluster-Based Certificate Revocation with
Vindication Capability for Mobile Ad Hoc Networks”,
IEEE Trans. On parallel and distributed systems,
vol. 24, no2, February 2013.
[2] H. Luo , J. Kong, P. Zerfos, S. Lu, and L. Zhang,
“URSA: Ubiquitous and Robust Access Control for
Mobile Ad Hoc Networks,” IEEE/ACM Trans.
Networking, vol. 12, no. 6, pp.1049-1063, Oct. 2004.
[3] J. Clulow and T. Moore, “Suicide for the Common
Good: A New Strategy for Credential Revocation in
Self-organizing Systems,” ACMSIGOPS Operating
Systems Rev., vol. 40, no. 3, pp. 18-21, July 2006.
[4] G. Arboit, C. Crepeau, C.R. Davis, and M.
Maheswaran, “A Localized Certificate Revocation
Scheme for Mobile Ad Hoc Networks,” Ad Hoc
Network, vol. 6, no. 1, pp. 17-31, Jan. 2008.
[5] K. Park, H. Nishiyama, N. Ansari, and N. Kato,
“Certificate Revocation to Cope with False
Accusations in Mobile Ad HocNetworks,” Proc. IEEE
71st Vehicular Technology Conf. (VTC’10), May
16-19, 2010.
[6] W. Liu, H. Nishiyama, N. Ansari, and N. Kato, “A
Study onCertificate Revocation in Mobile Ad Hoc
Network,” Proc. IEEE Int’l Conf. Comm. (ICC), June
2011.
[7] Zaiba Ishrat, “Security issues, challenges &
solution inMANET”, IJCST Vol. 2, Issue 4, Oct . -
Dec. 2011.[8] H. Yang, H. Luo, F. Ye, S. Lu, and L.
Zhang, “Security in Mobile Ad Hoc Networks:
Challenges and Solutions,” IEEE Wireless Comm.,
vol. 11, no. 1, pp. 38-47, Feb. 2004.
[8] L. Zhou and Z.J. Haas, “Securing Ad Hoc Networks,”
IEEE Network Magazine, vol. 13, no. 6, pp. 24-30,
Nov./Dec.1999.
[9] B. Kannhavong, H. Nakayama, A. Jamalipour, Y.
Nemoto, and N. Kato, “A Survey of Routing Attacks
in MANET,” IEEE Wireless Comm. Magazine, vol. 14,
no. 5, pp. 85-91, Oct. 2007.
[10]Dipti S. Sawant, E. Jayanthi, “Cluster-based
Certificate Revocation in mobile Ad hoc network
using Fuzzy Logic”, IJCEA, 2321-3469 , Volume 9,
Issue 7, July 2015.
[11]H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security
in Mobile Ad Hoc Networks: Challenges and
Solutions,” IEEE Wireless Comm., vol. 11, no. 1, pp.
38-47, Feb. 2004.
[12] L. Zhou and Z.J. Haas, “Securing Ad Hoc Networks,”
IEEE Network Magazine, vol. 13, no. 6, pp. 24-30,
Nov./Dec.1999.
[13]SJ. Indhu Lekha, R. Kathiroli, “Trust Based
Certificate Revocation of Malicious N odes in
MANET.”,(ICACCCT), IEEE International
Conference on Advanced Communication Control
and Computing Technologies,2014.
[14]A.Rajaram, Dr. S. Palaniswami, “Detecting Malicious
Node in MANET Using Trust Based Cross-Layer
Security Protocol. ”,(IJCSIT) International Journal of
Computer Science and Information Technologies,
Vol. 1 (2),130-137,2010.
[15]Kannan Govindan, Prasant Mohapatra, “Trust
Computations and Trust Dynamics in Mobile Adhoc
Networks: A Survey. ”,International Journal of
Innovative Research in Computer and
Communication Engineering, Communications
Surveys Tutorials, IEEE (Volume:14 , Issue: 2 )-
2012.

More Related Content

What's hot

An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26Er_Loveleen
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5sophiabelthome
 
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A SurveySecure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Surveyijceronline
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueIDES Editor
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor networkDeepaDasarathan
 
Byzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio NetworkByzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio NetworkChandra Sharma
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd Iaetsd
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...ijtsrd
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...IJCSIS Research Publications
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Iqra khalil
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
 

What's hot (19)

An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
 
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A SurveySecure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
 
Fault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias TechniqueFault Diagonosis Approach for WSN using Normal Bias Technique
Fault Diagonosis Approach for WSN using Normal Bias Technique
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 
9345.pdf
9345.pdf9345.pdf
9345.pdf
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Byzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio NetworkByzantine Attack & Defense in Cognitive Radio Network
Byzantine Attack & Defense in Cognitive Radio Network
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion in
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
Indoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor NetworksIndoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor Networks
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
 
Br33421423
Br33421423Br33421423
Br33421423
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
 

Similar to Survey on Certificate Revocation in MANET

Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNAM Publications
 
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...IJNSA Journal
 
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networkseSAT Journals
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol ineSAT Publishing House
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETJasmine Culbreth
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
 
An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...IJCNCJournal
 
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...IJCNCJournal
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...IRJET Journal
 
Selfish Node Detection in Replica Allocation over MANETs
Selfish Node Detection in Replica Allocation over MANETsSelfish Node Detection in Replica Allocation over MANETs
Selfish Node Detection in Replica Allocation over MANETsIOSR Journals
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
V3 i301
V3 i301V3 i301
V3 i301IJCERT
 
Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesSecurity in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesIAEME Publication
 
A Review Security Issues In Mobile Ad Hoc Network
A Review  Security Issues In Mobile Ad Hoc NetworkA Review  Security Issues In Mobile Ad Hoc Network
A Review Security Issues In Mobile Ad Hoc NetworkCourtney Esco
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
 

Similar to Survey on Certificate Revocation in MANET (20)

Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-...
 
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networksA simulation and analysis of secured aodv protocol in mobile ad hoc networks
A simulation and analysis of secured aodv protocol in mobile ad hoc networks
 
A simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol inA simulation and analysis of secured aodv protocol in
A simulation and analysis of secured aodv protocol in
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANET
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
 
An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...An intrusion detection mechanism for manets based on deep learning artificial...
An intrusion detection mechanism for manets based on deep learning artificial...
 
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL...
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
 
Selfish Node Detection in Replica Allocation over MANETs
Selfish Node Detection in Replica Allocation over MANETsSelfish Node Detection in Replica Allocation over MANETs
Selfish Node Detection in Replica Allocation over MANETs
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
 
V3 i301
V3 i301V3 i301
V3 i301
 
wormhole attacks in wireless networks
wormhole attacks in wireless networkswormhole attacks in wireless networks
wormhole attacks in wireless networks
 
Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesSecurity in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniques
 
A Review Security Issues In Mobile Ad Hoc Network
A Review  Security Issues In Mobile Ad Hoc NetworkA Review  Security Issues In Mobile Ad Hoc Network
A Review Security Issues In Mobile Ad Hoc Network
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
 

Recently uploaded

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 

Survey on Certificate Revocation in MANET

  • 1. 89 International Journal for Modern Trends in Science and Technology Survey on Certificate Revocation in MANET Jayanthi.E1 | Dr. Mohammed Ali Hussain2 1Department of Computer science and Engineering, KL University, Guntur Dist., A.P., India 2Professor, Dept. of Electronics and Computer Engineering, KL University, Guntur Dist., A.P., India. To Cite this Article Jayanthi.E and Dr. Mohammed Ali Hussain, “Survey on Certificate Revocation in MANET”, International Journal for Modern Trends in Science and Technology, Vol. 03, Issue 10, October 2017, pp: 89-93. Mobile Adhoc Network (MANET) is a self- configuring and infrastructure-less network which consists of mobile devices such as mobiles, laptops, PDA’s etc. Because of its lack of infrastructure, wireless mobile communication, dynamic topology, MANET is vulnerable to various security attacks. This survey paper presents an overview of developments of voting and non-voting based certificate revocation mechanisms in past few years. Certificate revocation is an important method used to secure the MANET. Certificate revocation isolates the attacker nodes from participating in network activities by revoking its certificate. Over last few years different schemes are explored for certificate revocation. In concluding section we present the limitations of the current cluster based certificate revocation scheme. KEYWORDS: Mobile ad hoc networks (MANETs), PKI, certificate revocation, Trust, security, threshold, CCRCV Copyright © 2017 International Journal for Modern Trends in Science and Technology All rights reserved. I. INTRODUCTION Highlight a section that you want to designate with a certain style, and then select the appropriate name on the style menu. The style will adjust your fonts and line spacing. Do not change the font sizes or line spacing to squeeze more text into a limited number of pages. Use italics for emphasis; do not underline. A mobile adhoc network (MANET) consists of wireless mobile devices or “nodes”, such as laptops, cell phones, and Personal Digital Assistants (PDAs), which can move in the network system openly. Fig 1 shows the structure of MANET. In addition to mobility, mobile devices cooperate to forward packets to one another to extend the restricted transmission range of each node. This is achieved by multi- hop relaying, which is used in many applications, such as disaster relief, military operation, and emergency communication. Security is an important need for these network services. Provisioning secure communication between two nodes is main concern. Because of its characteristics, such as infrastructure-less, mobility and dynamic topology, MANET is vulnerable to various types of security attacks. Among all security viewpoints in MANET, certificate management is generally used mechanism, which is utilized to secure applications and network services. Certification is a prerequisite to secure network communication. Certificate is a data structure in which public key is bound to the attributes by the digital signature of the issuer, and can be used to verify the identity of individual, and also to prevent tampering and forging in mobile ad hoc networks. Need for Certificate Revocation: Certificate management is basically used to covey trust in public key infrastructure to secure network services and applications. ABSTRACT Available online at: http://www.ijmtst.com/vol3issue10.html International Journal for Modern Trends in Science and Technology ISSN: 2455-3778 :: Volume: 03, Issue No: 10, October 2017
  • 2. 90 International Journal for Modern Trends in Science and Technology Jayanthi.E and Dr. Mohammed Ali Hussain : Survey on Certificate Revocation in MANET Fig 1: Mobile Ad hoc Network The general ad hoc network characteristics are: Mobility: Rapid deployment in areas with no infrastructure often implies that the users must explore an area and perhaps form teams/swarms that in turn coordinate among themselves to create a taskforce or a mission. We can have individual random mobility as our base mobility pattern. The mobility can have major impact on the selection of a routing scheme and can thus influence performance. Multi-hopping: a multiple hop network is a network where the path from source to destination traverses several othernodes. Ad hoc often exhibit multiple hops for congestion control, spectrum reuse, and energy conservation. Self-organization: The ad hoc network must autonomously determine its own configuration parameters including: addressing, routing, clustering, position identification, power control, etc. Energy conservation: most ad hoc nodes have limited power supply and no capability to generate their own power. Energy efficient protocol design is critical for longevity of the network. Scalability: In some applications the ad hoc network can grow to several thousand nodes. Hierarchical construction, Mobile IP or local handoff techniques do dilute the issue but still large scale is one of the most critical challenges in ad hoc design. Security: The challenges of wireless security are well known ability of the intruders to eavesdrop and jam/spoof the channel. Ad hoc networks are more vulnerable to attacks than the infrastructure counterparts. Both passive and active attacks are possible. Purpose of the Study Review: The main purpose of this literature survey is to take review of the existing work in this area to understand the depth of certificate revocation in mobile ad hoc network. Here presents study of the existing work which makes understand the adhoc networks, issues related to mobile nodes issues related to certificate revocation, application of ad hoc networks. Vulnerabilities of MANET: 1. Unreliability of wireless links between nodes: Because of the limited energy supply and the mobility of the nodes, the wireless links between mobile nodes in the ad hoc network are not consistent for the communication participants. 2. Dynamic topologies: Nodes are free to move randomly; thus, the network topology which is typically multi-hop may changes frequently at any time. 3. Lack of Secure Boundaries: There is not such a clear secure boundary in the mobile ad hoc network, which can be compared with the clear line of defense in the traditional wired network. This vulnerability originates from the nature of the mobile ad hoc network, because of this MANET is prone to various security attacks. 4. Threats from Compromised nodes Inside the Network: Because of the mobility of the ad hoc network, compromised node can frequently change its attack target. and perform malicious behavior to different node in the network, thus it is very difficult to track the malicious behavior performed by a compromised node especially in a large scale ad hoc network. 5. Lack of Centralized Management Facility: Due to absence of centralized management facility problems detection of attacks, path breakages, transmission impairments and packet dropping, breakage of the cooperative algorithm take place because decision making process is decentralized. 6. Restricted Power Supply: The problem that may be caused by the restricted power supply is denial-of-service attacks. 7. Active and Passive attacks: • Active Attack: An active attack disrupts the normal functioning of the network by modifying or destroying the data being exchanged. It is internal and external. Internal attack can be possible by compromised node. External attacks are conducted by the nodes which are not belongs to the network. • Passive Attack: Passive attack does not affect the normal operation
  • 3. 91 International Journal for Modern Trends in Science and Technology Jayanthi.E and Dr. Mohammed Ali Hussain : Survey on Certificate Revocation in MANET of the network. The attacker observes the data exchanged in the network without modifying it. II. . LITERATURE SURVEY It is difficult to secure MANET, because of the vulnerabilities of wireless links, the limited protection of nodes, the dynamically changing topology and the lack of infrastructure. Various certificate revocation techniques have been proposed in literature to improve the network security. These revocation techniques are basically categories in voting based and non-voting based schemes. Voting based mechanism: Voting based mechanism is characterized as the method for revoking a malicious attacker’s certificate through votes from legitimate neighboring nodes. A.Ubiquitious and Robust Access Control for MANET The strategy proposed in [2] considers the issue of access control for a mobile adhoc network. With the help of this we give access to well carrying on nodes and deny access from acting mischievously nodes. A mischievously acting node can be either a selfish nodes or malicious node. Proposed URSA fully localized design paradigm to provide ubiquitous and robust access control for MANET. This arrangement takes ticket-based methodology. Every well-behaving node uses a certified ticket to take part in routing and packet forwarding. Nodes without legitimate tickets are classified as being misbehaving node. They will be denied from any system access, despite the fact that they move to different areas. In URSA, different nodes in a local network neighborhood, typically one or two-hop away, cooperate to monitor a node’s behavior and determine whether it is well- behaving or misbehaving by using certain detection mechanism. The expiring ticket of a well-behaving node will be renewed collectively by these nearby observing neighbors, while a misbehaving node will be revoked of its ticket. The implementation is based on refined threshold cryptography algorithms. When a number of negative votes exceed a predetermined number, the certificate of accused node will be revoked. B. Localized Certificate revocation scheme In [4] introduces localized certificate revocation scheme. This scheme manages the issue of certificate revocation in MANET, where online access to (CA) Certificate Authority is a challenging problem. This method is used in pure ad hoc networks, where no access to central authorities or certificate authority. This solution is a decentralized certificate revocation scheme that allows the nodes in MANET to revoke the certificate of malicious entities. In this scheme each node monitors the behavior of the other nodes. If node found that given node is behaving suspiciously, it is required to broadcast an accusation packet against that node. Accusations from any given node are weighted based on trust of the accuser: the higher the trust of a node, the greater the weight of its accusations, and vice versa. A nodes certificate is revoked if the estimation of the total of accusation weights against the given node is greater than a threshold. Since all the nodes are required to participate in each voting, communication overhead is very high. Non-voting based mechanism: In this mechanism any node with legitimate certificate can choose given node as malicious attacker. C. Suicide for the Common Good:Credential revocation scheme for MANET In [3] proposed scheme considered the problem of credential revocation in self-organizing systems. This is decentralized system, where certificate revocation can be immediately finished by only one accusation. However the certificates of the both accuser and accused node have to be revoked simultaneously. Therefore the accusing node has to sacrifice itself to remove an attacker from the network. This method reduces the revocation time and communication overhead of certificate revocation. The suicidal approach does not take into account the false accusation from malicious attacker. Trouble with this approach is that a malicious node can falsely accuse legitimate nodes. Therefore the accuracy of the system is degraded. D. Certificate Revocation to cope with false accusation In [5] proposed certificate revocation to cope with false accusation. It solves the problem of false accusation, where malicious attacker node accused the legitimate node. In this scheme, CA is responsible to handle all control messages and holding accuser and accused node in warning list (WL) and black list (BL). It is cluster based solution, Cluster head (CH) detect falsely accused node and remove from black list. In the proposed scheme, a genuine node can be recorded in the BL by a false attack detection packet sent from a malicious node. To adapt with this issue, CHs are permitted
  • 4. 92 International Journal for Modern Trends in Science and Technology Jayanthi.E and Dr. Mohammed Ali Hussain : Survey on Certificate Revocation in MANET to carry out the certificate recovery to correct the mistakes in the BL. This scheme takes very short time revoke certificate of malicious attacker. Nirwan Ansari [1] proposed cluster based revocation scheme CCRVC (Cluster-based certificate revocation with vindication capability for MANET). Here nodes are organized to form clusters. In this scheme certificate authority CA manages the warn list and black lists and issues and remove the certificate of malicious nodes. If any node behaves maliciously then its neighbor node will accuse it to CA and that node placed in black list. Then CA will send accusations to CH to confirm that nodes in the black list are malicious attacker or not. If CH found that attacker then its certificate of malicious nodes are revoked. Otherwise the nodes are recovered from warning list. This scheme solves the problem of false accusation and reduces the revocation time as compared to voting based mechanism. The main limitation of this approach is very high communication overhead. E.Certificate Revocation system based on Trust mechanism: The system proposed in [14] is divided into three phases: • Cluster Formation Phase • Trust Calculation Phase • Enhanced Certificate Revocation Phase During cluster formation groups of mobile nodes are formed using weighted clustering algorithm. Next trust calculation phase, in which trust on each node is computed. Trust in a network is used to determine the relationship between nodes. Trust is based on its previous behavior in forwarding and dropping packets during transmission. Each and every nodes observes their nearby nodes whether it forward/drops the packets.The trust vector is modified for each transaction. So, the Enhanced Certificate Revocation algorithm is used to revoke the certificate of malicious nodes. ECR achieves the following: • It examines the exact malicious node without any fake accusation in the cluster with two levels of accusation process. • Proposed scheme requires AP (accusation packet) transferred across the accuser, CH and CA, which is sufficient to detect the improper nodes and thus, it reduces communication complexity. It minimizes the period of revocation III. COMPARITIVE STUDY Aim of this survey is to compare various certificate revocation methods and to know their limitations. Thispaper explains the fundamentals of certificate revocation process. Then the concept of voting based and non-voting based certificate revocation has been discussed at length in this paper. From this study it has been observed that previous certificate revocation scheme has issues like processing overhead and messaging overhead. Table1. shows the comparative analysis of certificate revocation schemes TABLEI.COMPARITIVESTUDY Certificate Revocation Scheme Advantages Limitations URSA- Ubiquitous andRobust Access Control •Certificaterevo ke basedonvotesfr om its neighbor. •Whennegativ e votesexceedso me numbercertificat e of accusednod eis revoked. •Determining thresholdis challenging. •Doesnotdeal with falseaccusation. Localized Certificate revocation scheme[4]. •AswithURSA,no CAexists. •Revocationis basedonweigh ted accusation. •Certificaterevo ked whenweightedsu m fromvotesexcee ds predefinethresh old. •Sinceallnodes Participatein voting, highcommunication overhead. •Increasesrevocation time. Suicidefor Common Good:New strategyfor credential revocation [3]. •Revocationquick ly Completedby only oneaccusation . •Accusingnodeh as to sacrificeitself. •Fastremoval. •Lowoverhead. • Fully decentrali zed. •Doesn’tdeal with Falseaccusednode. •Accuracydegraded. CCRVC (Cluster based Certificate Revocation with Vindication Capability for MANET)[1]. •Clusterbased Scheme. •CAmanagesWLa nd dBL. •Certificateof maliciousnodec an be revokedby single neighbor. •Dealswithfal se accusation. •High Communicatin overhead.
  • 5. 93 International Journal for Modern Trends in Science and Technology Jayanthi.E and Dr. Mohammed Ali Hussain : Survey on Certificate Revocation in MANET The above studied systems are voting based and non-voting based certificate revocation in the literature survey are giving good results but they are carrying few disadvantages with them like for voting based scheme processing and communication overhead during revocation. It is also challenging task to calculating threshold in voting based scheme. From previous solutions it has been seen that, accurate revocation, quick revocation, also small network overhead remain the challenging issues to be addressed in a certificate system, particularly in MANET. The Enhanced Certificate Revocation system is designed to provide efficient certificate revocation that overcomes the drawbacks of previous schemes. IV. CONCLUSION The aim of this survey is to compare various certificate revocation methods and to know their limitations. This paper explains the fundamentals of certificate revocation process.Then the concept of voting based and non-voting basedcertificate revocation has been discussed at length in this paper. From this study it has been observed that previous certificate revocation scheme has issues like processing overhead and messaging overhead. From previous solutions it has been seen that, accurate revocation, quick revocation, and small network overhead remain the challenging issues to be addressed in a certificate system, particularly in MANET REFERENCES [1] W. Liu, H. Nishiyama, N. Ansari, and N. Kato, ”Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks”, IEEE Trans. On parallel and distributed systems, vol. 24, no2, February 2013. [2] H. Luo , J. Kong, P. Zerfos, S. Lu, and L. Zhang, “URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks,” IEEE/ACM Trans. Networking, vol. 12, no. 6, pp.1049-1063, Oct. 2004. [3] J. Clulow and T. Moore, “Suicide for the Common Good: A New Strategy for Credential Revocation in Self-organizing Systems,” ACMSIGOPS Operating Systems Rev., vol. 40, no. 3, pp. 18-21, July 2006. [4] G. Arboit, C. Crepeau, C.R. Davis, and M. Maheswaran, “A Localized Certificate Revocation Scheme for Mobile Ad Hoc Networks,” Ad Hoc Network, vol. 6, no. 1, pp. 17-31, Jan. 2008. [5] K. Park, H. Nishiyama, N. Ansari, and N. Kato, “Certificate Revocation to Cope with False Accusations in Mobile Ad HocNetworks,” Proc. IEEE 71st Vehicular Technology Conf. (VTC’10), May 16-19, 2010. [6] W. Liu, H. Nishiyama, N. Ansari, and N. Kato, “A Study onCertificate Revocation in Mobile Ad Hoc Network,” Proc. IEEE Int’l Conf. Comm. (ICC), June 2011. [7] Zaiba Ishrat, “Security issues, challenges & solution inMANET”, IJCST Vol. 2, Issue 4, Oct . - Dec. 2011.[8] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in Mobile Ad Hoc Networks: Challenges and Solutions,” IEEE Wireless Comm., vol. 11, no. 1, pp. 38-47, Feb. 2004. [8] L. Zhou and Z.J. Haas, “Securing Ad Hoc Networks,” IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, Nov./Dec.1999. [9] B. Kannhavong, H. Nakayama, A. Jamalipour, Y. Nemoto, and N. Kato, “A Survey of Routing Attacks in MANET,” IEEE Wireless Comm. Magazine, vol. 14, no. 5, pp. 85-91, Oct. 2007. [10]Dipti S. Sawant, E. Jayanthi, “Cluster-based Certificate Revocation in mobile Ad hoc network using Fuzzy Logic”, IJCEA, 2321-3469 , Volume 9, Issue 7, July 2015. [11]H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in Mobile Ad Hoc Networks: Challenges and Solutions,” IEEE Wireless Comm., vol. 11, no. 1, pp. 38-47, Feb. 2004. [12] L. Zhou and Z.J. Haas, “Securing Ad Hoc Networks,” IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, Nov./Dec.1999. [13]SJ. Indhu Lekha, R. Kathiroli, “Trust Based Certificate Revocation of Malicious N odes in MANET.”,(ICACCCT), IEEE International Conference on Advanced Communication Control and Computing Technologies,2014. [14]A.Rajaram, Dr. S. Palaniswami, “Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol. ”,(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 1 (2),130-137,2010. [15]Kannan Govindan, Prasant Mohapatra, “Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey. ”,International Journal of Innovative Research in Computer and Communication Engineering, Communications Surveys Tutorials, IEEE (Volume:14 , Issue: 2 )- 2012.