..............................
..............................
..............................
An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc
In Mobile Ad-hoc Networks (MANETs), it is easy to l aunch wormhole, man-in-the-middle and Denial of Ser vice
(DoS) attacks, or to impersonate another node. Our previous work established a network consisting confidentiality and
authentication of packets in both routing and link layers. As an extension to our previous work, in th is paper, we propose to
develop an enhanced distributed certificate authori ty scheme to provide data integrity, thus making the network more secure
from both inside and outside attacks. The proposed scheme makes use of Shamir’s secret sharing scheme along with a
redundancy technique to support certificate renewal and revocation. The malicious nodes are detected b y the trusting
mechanism by monitoring the behavior hop by hop. By simulation results, we show that the proposed scheme achieves more
packet delivery ratio while attaining less delay an d overhead, compared with the previous existing sch eme.
[1] Akbani R., Korkmaz T., and Raju G., HEAP: A Packet Authentication Scheme for Mobile Ad- hoc Networks, Ad-hoc Networks , vol. 6, no. 7, pp. 1134-1150, 2008.
[2] Amitabh M., Security and Quality of Service in Ad-hoc Wireless Networks , Cambridge University Press, UK, 2008.
[3] Bing W., Jianmin C., Jie W., and Mihaela C., A Survey on Attacks and Countermeasures in Mobile Ad-hoc Networks, in Proceedings of Wireless Network Security, Signals and Communication Technology , pp. 103-135, 2007.
[4] Deepti J., Kamesh N., and Ravi P., Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad-hoc Networks: An Analysis, Journal on Wireless Communications and Network , vol. 2005, no. 4, pp. 579-589, 2005.
[5] Farooq A. and Petros M., Security for Wireless Ad-hoc Network , John Willy and Sons, 2007.
[6] Komninos N., Vergados D., and Douligeris C., Detecting Unauthorized and Compromised nodes in Mobile Ad-hoc Networks, Ad-hoc Networks , vol. 5, no. 3, pp. 289-298, 2007.
[7] Mark E., Timothy E., and Cynthia E., An Ontological Approach to Secure MANET Management, in Proceedings of the 3 rd International Conference on Availability, Reliability and Security , Barcelona, pp. 787-794, 2008.
[8] Mohammed A. and Zuriati A., Performance Comparisons of AODV, Secure AODV and Adaptive Secure AODV Routing Protocols in Free Attack Simulation Environment, European Journal of Scientific Research , vol. 32, no. 3, pp. 430-443, 2009.
[9] Nitesh S., Tsudik G., and Jeong H., Threshold Cryptography in P2P and MANETs: The Case of Access Control, Elsevier Computer Networks , vol. 51, no. 12, pp. 3632-3649, 2007.
[10] Prasant M. and Srikanth K., Ad-hoc Networks: Technologies and Protocols , Springer, 2005.
[11] Rajaram A. and Palaniswami S., A Trust-Based Cross-Layer Security Protocol for Mobile Ad- hoc Networks, International Journal of Computer Science and Information Security , vol. 6, no. 1, pp. 165-172, 2009.
[12] Shafiullah K., Kok-Keong L., and Zia D., Framework for Intrusion Detection in IEEE 802.11 Wireless Mesh Networks, The International Arab Journal of Information Technology , vol. 7, no. 4, pp. 435-440, 2010.
[13] Sreedhar C., Madhusudhana V., and Kasiviswanath N., A Survey on Security Issues in Wireless Ad-hoc Network Routing Protocols, International Journal on Computer Science and Engineering , vol. 2, no. 2, pp. 224-232, 2010.
[14] Stamatios V., Security of Information and Communication Networks , Wiley-IEEE Publications, USA, 2009.
[15] Vaidya B., Sang-Soo Y., and Dong-You C., Robust and Secure Routing Scheme for Wireless Multihop Network, in Proceedings of the Personal and Ubiquitous Computing , UK, vol. 13, pp. 457-469, 2009.
[16] Wenbo H., Ying H., Ravishankar S., Klara N., and Whay C., SMOCK: A Scalable Method of Cryptographic Key Management for Mission- Critical Wireless Ad-hoc Networks, IEEE Transactions on information forensic and security , vol. 4, no. 1, pp. 140-150, 2009.
[17] Wikipidia, Shamir's Secret Sharing, available at: http://en.wikipedia.org/wiki/Shamir s_Secret _Sharing, last visited 2011.
[18] Yan Z., Jun Z., and Honglin H., Security in Wireless Mesh Networks , Auerbach Publications, 2009. Rajaram Ayyasamy received the BE degree in electronics and communication engineering from the Govt., college of Technology, Coimbatore, Anna University, Chennai, India, in 2006, the ME degree in electronics and communication engineering (Applied Electronics) from the Govt., college of Technology, Anna University, Chennai, India, in 2008 and he received the Ph.D. degree in electronics and communication engineering from the Anna University of Technology, Coimbatore, India in March 2011. He is currently working as a Associate Professor, ECE Department in Karpagam College of Engineering, Coimbatore, India. His research interests include mobile adhoc network s, wireless communication networks (WiFi, WiMax HighSlot GSM), novel VLSI NOC Design approaches to address issues such as low-power, cross-talk, hardware acceleration, Design issues includes OFDM MIMO and noise Suppression in MAI Systems, ASIC design, Control systems, Fuzzy logic and Networks, AI, Sensor Networks. 298 The International Arab Journal of Infor mation Technology, Vol. 9, No. 3, May 2012 Palaniswami Subramani received the B.E. degree in electrical and electronics engineering from the Govt., college of Technology, Coimbatore, University of Madras, Madras, India, in 1981, the M.E. degree in electronics and communication engineering (Applied Electronics) from the Govt., college of Technology, Bharathiar University, Coimbatore, India, in 1986 and the Ph.D . degree in electrical engineering from the PSG Technology, Bharathiar University, Coimbatore, Indi a, in 2003. He is currently the principal of Thanthai Periyar Government Institute of Technology, Vellore , India. His research interests include Control syste ms, Communication and Networks, Fuzzy logic and Networks, AI, Sensor Networks. . He has about 25 years of teaching experience, since 1982. He has served as lecturer, Associate Professor, Professor, Registrar and the life Member of ISTE, India.