Skip to main content

Security Enhancement for Authentication of Nodes in MANET by Checking the CRL Status of Servers

  • Conference paper
Security-Enriched Urban Computing and Smart Grid (SUComS 2010)

Abstract

MANET security is becoming a challenge for researchers with the time. The lack of infrastructure gives rise to authentication problems in these networks. Most of the TTP and non-TTP based schemes seem to be impractical for being adopted in MANETs. A hybrid key-management scheme addressed these issues effectively by pre-assigned logins on offline basis and issuing certificates on its basis using 4G services. However, the scheme did not taken into account the CRL status of servers; if it is embedded the nodes need to check frequently the server’s CRL status for authenticating any node and place external messages outside MANET which leads to overheads. We have tried to reduce them by introducing an online MANET Authority responsible for issuing certificates by considering the CRL status of servers, renewing them and key verification within MANET that has greatly reduced the external messages.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tseng, Y.M.: A heterogeneous-network aided public-key management scheme for MANETS. Int. J. Net. Mgmt. 17, 3–15 (2006)

    Article  Google Scholar 

  2. Capkun, S., Buttyan, L., Hubaux, J.P.: Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing 2(1), 52–64 (2003)

    Article  Google Scholar 

  3. Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Net. J. 13(6), 24–30 (1999)

    Article  Google Scholar 

  4. Brandt, I., rd, D., Landrock, P., Pedersen, T.: Zero-Knowledge Authentication Scheme with Secret Key Exchange. Journal of Cryptology (1998)

    Google Scholar 

  5. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad hoc networks. In: IEEE (ICNP 2001), pp. 251–260 (November 2001)

    Google Scholar 

  6. Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, p. 204. Springer, Heidelberg (2000)

    Google Scholar 

  7. Pirzada, A., Mc Donald, C.: Kerberos Assisted Authentication in Mobile Ad-hoc Networks. In: The 27th Australasian Computer Science Conference (2004)

    Google Scholar 

  8. Weimerskirch, A., Thonet, G.: A Distributed Light-Weight Authentication Model for Ad-hoc Networks. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 6–7. Springer, Heidelberg (2001)

    Google Scholar 

  9. Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing pair wise keys for secure communication in ad hoc networks: a probabilistic approach. In: The 11th IEEE International Conference on Network Protocols (2003)

    Google Scholar 

  10. Schulzrinne, H., Wu, X., Sidiroglou, S.: Ubiquitous Computing in Home Networks. IEEE Commun. Mag., 128–135 (November 2003)

    Google Scholar 

  11. Hui, S.Y., Yeung, K.H.: Challenges in the Migration to 4G Mobile Systems. IEEE Commun. Mag., 54–59 (December 2003)

    Google Scholar 

  12. Varadharajan, V., Shankaran, R., Hitchens, M.: Security for cluster based ad hoc networks. Computer Communications 27(5), 488–501 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Irshad, A., Noshairwan, W., Shafiq, M., Khurram, S., Irshad, E., Usman, M. (2010). Security Enhancement for Authentication of Nodes in MANET by Checking the CRL Status of Servers. In: Kim, Th., Stoica, A., Chang, RS. (eds) Security-Enriched Urban Computing and Smart Grid. SUComS 2010. Communications in Computer and Information Science, vol 78. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16444-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16444-6_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16443-9

  • Online ISBN: 978-3-642-16444-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics