A Survey on Key Management and Certificate Exchange in Mobile Adhoc Network

A Survey on Key Management and Certificate Exchange in Mobile Adhoc Network

Saju P. John, Philip Samuel
Copyright: © 2014 |Volume: 10 |Issue: 2 |Pages: 17
ISSN: 1548-0631|EISSN: 1548-064X|EISBN13: 9781466652927|DOI: 10.4018/ijbdcn.2014040103
Cite Article Cite Article

MLA

John, Saju P., and Philip Samuel. "A Survey on Key Management and Certificate Exchange in Mobile Adhoc Network." IJBDCN vol.10, no.2 2014: pp.30-46. http://doi.org/10.4018/ijbdcn.2014040103

APA

John, S. P. & Samuel, P. (2014). A Survey on Key Management and Certificate Exchange in Mobile Adhoc Network. International Journal of Business Data Communications and Networking (IJBDCN), 10(2), 30-46. http://doi.org/10.4018/ijbdcn.2014040103

Chicago

John, Saju P., and Philip Samuel. "A Survey on Key Management and Certificate Exchange in Mobile Adhoc Network," International Journal of Business Data Communications and Networking (IJBDCN) 10, no.2: 30-46. http://doi.org/10.4018/ijbdcn.2014040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Owing to the wireless and dynamic nature, MANETs are susceptible to security attacks from malicious nodes. Key management, certificate exchange and certificate revocation mechanisms play a vital role in securing the network from attacks. When the certificate of a malicious node is revoked, it is denied from all activities and isolated from the network. This paper surveys various existing mechanisms in key management and certificate exchange. Key management methods are broadly classified into two types namely, contributory and distributive methods. Here, certificate distribution and exchange techniques are classified as trust-based and non-trust based methods. Certificate revocation techniques are classified as voting-based, cluster-based and trust-based schemes. The merits and demerits of each mechanism along with the performance are analyzed. Finally, a comparison table is designed to compare the existing mechanisms in an effective manner.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.