Abstract
MANET security is becoming a challenge for researchers with the time. The lack of infrastructure gives rise to authentication problems in these networks. Most of the TTP and non-TTP based schemes seem to be impractical for being adopted in MANETs. A hybrid key-management scheme addressed these issues effectively by pre-assigned logins on offline basis and issuing certificates on its basis using 4G services. However, the scheme did not taken into account the CRL status of servers; if it is embedded the nodes need to check frequently the server’s CRL status for authenticating any node and place external messages outside MANET which leads to overheads. We have tried to reduce them by introducing an online MANET Authority responsible for issuing certificates by considering the CRL status of servers, renewing them and key verification within MANET that has greatly reduced the external messages.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Tseng, Y.M.: A heterogeneous-network aided public-key management scheme for MANETS. Int. J. Net. Mgmt. 17, 3–15 (2006)
Capkun, S., Buttyan, L., Hubaux, J.P.: Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing 2(1), 52–64 (2003)
Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Net. J. 13(6), 24–30 (1999)
Brandt, I., rd, D., Landrock, P., Pedersen, T.: Zero-Knowledge Authentication Scheme with Secret Key Exchange. Journal of Cryptology (1998)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad hoc networks. In: IEEE (ICNP 2001), pp. 251–260 (November 2001)
Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, p. 204. Springer, Heidelberg (2000)
Pirzada, A., Mc Donald, C.: Kerberos Assisted Authentication in Mobile Ad-hoc Networks. In: The 27th Australasian Computer Science Conference (2004)
Weimerskirch, A., Thonet, G.: A Distributed Light-Weight Authentication Model for Ad-hoc Networks. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 6–7. Springer, Heidelberg (2001)
Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing pair wise keys for secure communication in ad hoc networks: a probabilistic approach. In: The 11th IEEE International Conference on Network Protocols (2003)
Schulzrinne, H., Wu, X., Sidiroglou, S.: Ubiquitous Computing in Home Networks. IEEE Commun. Mag., 128–135 (November 2003)
Hui, S.Y., Yeung, K.H.: Challenges in the Migration to 4G Mobile Systems. IEEE Commun. Mag., 54–59 (December 2003)
Varadharajan, V., Shankaran, R., Hitchens, M.: Security for cluster based ad hoc networks. Computer Communications 27(5), 488–501 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Irshad, A., Noshairwan, W., Shafiq, M., Khurram, S., Irshad, E., Usman, M. (2010). Security Enhancement for Authentication of Nodes in MANET by Checking the CRL Status of Servers. In: Kim, Th., Stoica, A., Chang, RS. (eds) Security-Enriched Urban Computing and Smart Grid. SUComS 2010. Communications in Computer and Information Science, vol 78. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16444-6_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-16444-6_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16443-9
Online ISBN: 978-3-642-16444-6
eBook Packages: Computer ScienceComputer Science (R0)