International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 109

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015


Enhanced Certificate Revocation Method in Mobile Adhoc Networks

Jayendra Kumar [2] | Prakash Ravirakula


Abstract: The mobile Ad Hoc networks (MANETs) having wireless and self-motivated nature. MANETs are more vulnerable to security attacks rather than wired networks. So they are susceptible to security attacks from malicious node due to which it is important to detect malicious nodes to avoid attacks. In this paper certificate Authority (CA) affords its secret key to all nodes (normal). When node want to send data to other nodes Cluster Head (CH) broadcast R2mod N to all nodes and it gives challenge to that node whether it sending same data, if it sends RS mod N to CH with its secrete key which is given by CA, then CH evaluates its data with itself data. If it is same, then it considers it is as a normal node otherwise as malicious node. Here CA should be genuine. Finally if node is found as a malicious then revocation of certificate is done for that malicious node and other normal nodes are released due to which the number of normal nodes will increase in mobile network and it get secured from susceptible attacks.


Keywords: The mobile Ad Hoc networks MANETs having wireless and self-motivated nature MANETs are more vulnerable to security attacks rather than wired networks So they are susceptible to security attacks from malicious node due to which it is important to detect malicious nodes to avoid attacks In this paper certificate Authority CA affords its secret key to all nodes normalWhen node want to send data to other nodes Cluster Head CH broadcast R2mod N to all nodes and it gives challenge to that node whether it sending same data, if it sends RS mod N to CH with its secrete key which is given by CA, then CH evaluates its data with itself data If it is same, then it considers it is as a normal node otherwise as malicious node Here CA should be genuine Finally if node is found as a malicious then revocation of certificate is done for that malicious node and other normal nodes are released due to which the number of normal nodes will increase in mobile network and it get secured from susceptible attacks


Edition: Volume 4 Issue 2, February 2015,


Pages: 1315 - 1318


How to Cite this Article?

Jayendra Kumar, Prakash Ravirakula, "Enhanced Certificate Revocation Method in Mobile Adhoc Networks", International Journal of Science and Research (IJSR), Volume 4 Issue 2, February 2015, pp. 1315-1318, https://www.ijsr.net/get_abstract.php?paper_id=SUB151424

How to Share this Article?






Similar Articles with Keyword 'The'

Downloads: 184 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu | T. S. Reddy

Share this Article

Downloads: 163 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker | Ashok Veda [2]

Share this Article


Top