Enhanced Certificate Revocation Method in Mobile Adhoc Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015

Enhanced Certificate Revocation Method in Mobile Adhoc Networks

Jayendra Kumar, Prakash Ravirakula

The mobile Ad Hoc networks (MANETs) having wireless and self-motivated nature. MANETs are more vulnerable to security attacks rather than wired networks. So they are susceptible to security attacks from malicious node due to which it is important to detect malicious nodes to avoid attacks. In this paper certificate Authority (CA) affords its secret key to all nodes (normal).When node want to send data to other nodes Cluster Head (CH) broadcast R2mod N to all nodes and it gives challenge to that node whether it sending same data, if it sends RS mod N to CH with its secrete key which is given by CA, then CH evaluates its data with itself data. If it is same, then it considers it is as a normal node otherwise as malicious node. Here CA should be genuine. Finally if node is found as a malicious then revocation of certificate is done for that malicious node and other normal nodes are released due to which the number of normal nodes will increase in mobile network and it get secured from susceptible attacks.

Keywords: The mobile Ad Hoc networks MANETs having wireless and self-motivated nature MANETs are more vulnerable to security attacks rather than wired networks So they are susceptible to security attacks from malicious node due to which it is important to detect malicious nodes to avoid attacks In this paper certificate Authority CA affords its secret key to all nodes normalWhen node want to send data to other nodes Cluster Head CH broadcast R2mod N to all nodes and it gives challenge to that node whether it sending same data, if it sends RS mod N to CH with its secrete key which is given by CA, then CH evaluates its data with itself data If it is same, then it considers it is as a normal node otherwise as malicious node Here CA should be genuine Finally if node is found as a malicious then revocation of certificate is done for that malicious node and other normal nodes are released due to which the number of normal nodes will increase in mobile network and it get secured from susceptible attacks

Edition: Volume 4 Issue 2, February 2015

Pages: 1315 - 1318

Share this Article

How to Cite this Article?

Jayendra Kumar, Prakash Ravirakula, "Enhanced Certificate Revocation Method in Mobile Adhoc Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB151424, Volume 4 Issue 2, February 2015, 1315 - 1318

57 PDF Views | 45 PDF Downloads

Download Article PDF



Top