International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 196

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 2, February 2015


Enhanced Certificate Revocation Method in Mobile Adhoc Networks

Jayendra Kumar [2] | Prakash Ravirakula


Abstract: The mobile Ad Hoc networks (MANETs) having wireless and self-motivated nature. MANETs are more vulnerable to security attacks rather than wired networks. So they are susceptible to security attacks from malicious node due to which it is important to detect malicious nodes to avoid attacks. In this paper certificate Authority (CA) affords its secret key to all nodes (normal). When node want to send data to other nodes Cluster Head (CH) broadcast R2mod N to all nodes and it gives challenge to that node whether it sending same data, if it sends RS mod N to CH with its secrete key which is given by CA, then CH evaluates its data with itself data. If it is same, then it considers it is as a normal node otherwise as malicious node. Here CA should be genuine. Finally if node is found as a malicious then revocation of certificate is done for that malicious node and other normal nodes are released due to which the number of normal nodes will increase in mobile network and it get secured from susceptible attacks.


Keywords: The mobile Ad Hoc networks MANETs having wireless and self-motivated nature MANETs are more vulnerable to security attacks rather than wired networks So they are susceptible to security attacks from malicious node due to which it is important to detect malicious nodes to avoid attacks In this paper certificate Authority CA affords its secret key to all nodes normalWhen node want to send data to other nodes Cluster Head CH broadcast R2mod N to all nodes and it gives challenge to that node whether it sending same data, if it sends RS mod N to CH with its secrete key which is given by CA, then CH evaluates its data with itself data If it is same, then it considers it is as a normal node otherwise as malicious node Here CA should be genuine Finally if node is found as a malicious then revocation of certificate is done for that malicious node and other normal nodes are released due to which the number of normal nodes will increase in mobile network and it get secured from susceptible attacks


Edition: Volume 4 Issue 2, February 2015,


Pages: 1315 - 1318


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top