Open Access Open Access  Restricted Access Subscription or Fee Access

Cluster-Based License Revocation with Vindication Ability for Mobile Ad Hoc Networks

S. Jagadeesan


Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless and dynamic natures render them more vulnerable to various types of security attacks than the wired networks. The major challenge is to guarantee secure network services. To meet this challenge, certificate revocation is an important integral component to secure network communications. In this paper, we focus on the issue of certificate revocation to isolate attackers from further participating in network activities. For quick and accurate certificate revocation, we propose the Cluster-based Certificate Revocation with Vindication Capability (CCRVC) scheme. In particular, to improve the reliability of the scheme, we recover the warned nodes to take part in the certificate revocation process; to enhance the accuracy, we propose the threshold-based mechanism to assess and vindicate warned nodes as legitimate nodes or not, before recovering them. The performances of our scheme are evaluated by both numerical and simulation analysis. Extensive results demonstrate that the proposed certificate revocation scheme is effective and efficient to guarantee secure communications in mobile ad hoc networks.


Guarantee Secure Network Services, Certificate Revocation, Cluster-Based Certificate Revocation with Vindication Capability, Threshold-Based Mechanism, Numerical and Simulation Analysis.

Full Text:



H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in Mobile Ad Hoc Networks: Challenges and Solutions,” IEEE Wireless Comm., vol. 11, no. 1, pp. 38-47, Feb. 2004.

P.Sakarindr and N. Ansari, “Security Services in Group Communications Over Wireless Infrastructure, Mobile Ad Hoc, and Wireless Sensor Networks,” IEEE Wireless Comm., vol. 14 , no. 5, pp. 8-20, Oct. 2007.

A.M. Hegland, E. Winjum, C. Rong, and P. Spilling, “A Survey of Key Management in Ad Hoc Networks,” IEEE Comm. Surveys and Tutorials, vol. 8, no. 3, pp. 48-66, Third Quarter 2006.

L. Zhou and Z.J. Haas, “Securing Ad Hoc Networks,” IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, Nov./Dec. 1999.

L. Zhou, B. Cchneider, and R. Van Renesse, “COCA: A Secure Distributed Online Certification Authority,” ACM Trans. Computer Systems, vol. 20, no. 4, pp. 329-368, Nov. 2002.

H. Chan, V. Gligor, A. Perrig, and G. Muralidharan, “On the Distribution and Revocation of Cryptographic Keys in Sensor Networks,” IEEE Trans. Dependable and Secure Computing, vol. 2 , no. 3, pp. 233-247, July 2005.

P. Yi, Z. Dai, Y. Zhong, and S. Zhang, “Resisting Flooding Attacks in Ad Hoc Networks,” Proc. Int’l Conf. Information Technology: Coding and Computing, vol. 2, pp. 657-662, Apr.2005.

B. Kannhavong, H. Nakayama, A. Jamalipour, Y. Nemoto, and N. Kato, “A Survey of Routing Attacks in MANET,” IEEE Wireless Comm. Magazine, vol. 14, no. 5, pp. 85-91, Oct. 2007.

H. Nakayama, S. Kurosawa, A. Jamalipour, Y. Nemoto, and N. Kato, “A Dynamic Anomaly Detection Scheme for Aodv-Based Mobile Ad Hoc Networks,” IEEE Trans. Vehicular Technology, vol. 58, no. 5, pp. 2471-2481, June 2009.

J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil Attack in Sensor Network: Analysis & Defenses,” Proc. Third Int’l Symp. Information Processing in Sensor Networks, pp. 259-268, 2004.

S. Micali, “Efficient Certificate Revocation,” Massachusetts Inst. of Technology, Cambridge, MA, 1996.

C. Gentry, “Certificate-Based Encryption and the Certificate Revocation Problem,” EUROCRYPT: Proc. 22nd Int’l Conf. Theory and Applications of Cryptographic Techniques, pp. 272293, 2003.

C. Chiasserini and R. Rao, “Pulsed battery discharge in communication devices,” in Proc. 5th Int. Conf. Mobile Computer, 1999, pp. 88–95.

K.Akkayaand M.Younis,“A survey of routing protocols in wireless sensor networks,” Elsevier Ad Hoc Netw. J., vol. 3, no. 3, pp. 325–349, 2005.

J. Newsome and D. Song, “GEM: Graph EMbedding for Routing and Data-Centric Storage in Sensor Networks without Geographic Information,” Proc. Int’l Conf. Embedded Networked Sensor Systems (SenSys), pp. 76-88, 2003.

W. Jia, T. Wang, G. Wang, and M. Guo, “Hole Avoiding in Advance Routing in Wireless Sensor Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), 2007.

H. Frey and I. Stojmenovic, “On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Net-works,” Proc. MobiCom, pp. 390-401, 2006.

Z. Zhong and T. He, “Achieving Range-Free Localization beyond Connectivity,” Proc. ACM Conf. Embedded Networked Sensor Systems (SenSys), 2009.

T. He, C. Huang, B.M. Blum, J.A. Stankovic, and T. Abdelzaher, “Range-Free Localization Schemes for Large Scale Sensor Net-works,” Proc. MobiCom, pp. 81-95, 2003.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.