The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc

  In  Mobile  Ad-hoc  Networks  (MANETs),  it  is  easy  to  l aunch  wormhole,  man-in-the-middle  and  Denial  of  Ser vice  (DoS)  attacks,  or  to  impersonate  another  node.  Our  previous  work  established  a  network  consisting  confidentiality  and  authentication  of  packets  in  both  routing  and  link  layers.  As  an  extension  to  our  previous  work,  in  th is  paper,  we  propose  to  develop  an  enhanced  distributed  certificate  authori ty  scheme  to  provide  data  integrity,  thus  making  the  network  more  secure  from  both  inside  and  outside  attacks.  The  proposed  scheme  makes  use  of  Shamir’s  secret  sharing  scheme  along  with  a  redundancy  technique  to  support  certificate  renewal   and  revocation.  The  malicious  nodes  are  detected  b y  the  trusting  mechanism  by  monitoring  the  behavior  hop  by  hop.  By   simulation  results,  we  show  that  the  proposed  scheme  achieves  more  packet delivery ratio while attaining less delay an d overhead, compared with the previous existing sch eme.   


[1] Akbani R., Korkmaz T., and Raju G., HEAP: A Packet Authentication Scheme for Mobile Ad- hoc Networks, Ad-hoc Networks , vol. 6, no. 7, pp. 1134-1150, 2008.

[2] Amitabh M., Security and Quality of Service in Ad-hoc Wireless Networks , Cambridge University Press, UK, 2008.

[3] Bing W., Jianmin C., Jie W., and Mihaela C., A Survey on Attacks and Countermeasures in Mobile Ad-hoc Networks, in Proceedings of Wireless Network Security, Signals and Communication Technology , pp. 103-135, 2007.

[4] Deepti J., Kamesh N., and Ravi P., Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad-hoc Networks: An Analysis, Journal on Wireless Communications and Network , vol. 2005, no. 4, pp. 579-589, 2005.

[5] Farooq A. and Petros M., Security for Wireless Ad-hoc Network , John Willy and Sons, 2007.

[6] Komninos N., Vergados D., and Douligeris C., Detecting Unauthorized and Compromised nodes in Mobile Ad-hoc Networks, Ad-hoc Networks , vol. 5, no. 3, pp. 289-298, 2007.

[7] Mark E., Timothy E., and Cynthia E., An Ontological Approach to Secure MANET Management, in Proceedings of the 3 rd International Conference on Availability, Reliability and Security , Barcelona, pp. 787-794, 2008.

[8] Mohammed A. and Zuriati A., Performance Comparisons of AODV, Secure AODV and Adaptive Secure AODV Routing Protocols in Free Attack Simulation Environment, European Journal of Scientific Research , vol. 32, no. 3, pp. 430-443, 2009.

[9] Nitesh S., Tsudik G., and Jeong H., Threshold Cryptography in P2P and MANETs: The Case of Access Control, Elsevier Computer Networks , vol. 51, no. 12, pp. 3632-3649, 2007.

[10] Prasant M. and Srikanth K., Ad-hoc Networks: Technologies and Protocols , Springer, 2005.

[11] Rajaram A. and Palaniswami S., A Trust-Based Cross-Layer Security Protocol for Mobile Ad- hoc Networks, International Journal of Computer Science and Information Security , vol. 6, no. 1, pp. 165-172, 2009.

[12] Shafiullah K., Kok-Keong L., and Zia D., Framework for Intrusion Detection in IEEE 802.11 Wireless Mesh Networks, The International Arab Journal of Information Technology , vol. 7, no. 4, pp. 435-440, 2010.

[13] Sreedhar C., Madhusudhana V., and Kasiviswanath N., A Survey on Security Issues in Wireless Ad-hoc Network Routing Protocols, International Journal on Computer Science and Engineering , vol. 2, no. 2, pp. 224-232, 2010.

[14] Stamatios V., Security of Information and Communication Networks , Wiley-IEEE Publications, USA, 2009.

[15] Vaidya B., Sang-Soo Y., and Dong-You C., Robust and Secure Routing Scheme for Wireless Multihop Network, in Proceedings of the Personal and Ubiquitous Computing , UK, vol. 13, pp. 457-469, 2009.

[16] Wenbo H., Ying H., Ravishankar S., Klara N., and Whay C., SMOCK: A Scalable Method of Cryptographic Key Management for Mission- Critical Wireless Ad-hoc Networks, IEEE Transactions on information forensic and security , vol. 4, no. 1, pp. 140-150, 2009.

[17] Wikipidia, Shamir's Secret Sharing, available at: http://en.wikipedia.org/wiki/Shamir s_Secret _Sharing, last visited 2011.

[18] Yan Z., Jun Z., and Honglin H., Security in Wireless Mesh Networks , Auerbach Publications, 2009. Rajaram Ayyasamy received the BE degree in electronics and communication engineering from the Govt., college of Technology, Coimbatore, Anna University, Chennai, India, in 2006, the ME degree in electronics and communication engineering (Applied Electronics) from the Govt., college of Technology, Anna University, Chennai, India, in 2008 and he received the Ph.D. degree in electronics and communication engineering from the Anna University of Technology, Coimbatore, India in March 2011. He is currently working as a Associate Professor, ECE Department in Karpagam College of Engineering, Coimbatore, India. His research interests include mobile adhoc network s, wireless communication networks (WiFi, WiMax HighSlot GSM), novel VLSI NOC Design approaches to address issues such as low-power, cross-talk, hardware acceleration, Design issues includes OFDM MIMO and noise Suppression in MAI Systems, ASIC design, Control systems, Fuzzy logic and Networks, AI, Sensor Networks. 298 The International Arab Journal of Infor mation Technology, Vol. 9, No. 3, May 2012 Palaniswami Subramani received the B.E. degree in electrical and electronics engineering from the Govt., college of Technology, Coimbatore, University of Madras, Madras, India, in 1981, the M.E. degree in electronics and communication engineering (Applied Electronics) from the Govt., college of Technology, Bharathiar University, Coimbatore, India, in 1986 and the Ph.D . degree in electrical engineering from the PSG Technology, Bharathiar University, Coimbatore, Indi a, in 2003. He is currently the principal of Thanthai Periyar Government Institute of Technology, Vellore , India. His research interests include Control syste ms, Communication and Networks, Fuzzy logic and Networks, AI, Sensor Networks. . He has about 25 years of teaching experience, since 1982. He has served as lecturer, Associate Professor, Professor, Registrar and the life Member of ISTE, India.