2011
DOI: 10.1002/wcm.839
|View full text |Cite
|
Sign up to set email alerts
|

Efficient detection of public key infrastructure‐based revoked keys in mobile ad hoc networks

Abstract: Key revocation involves secure and efficient managing of the information about compromised keys. Spreading the information of revoked keys to the receivers of the key is a challenging task in public key infrastructure (PKI). PKI is more suitable for wired Internet infrastructure and lacks any tailor‐made protocols for extension over an ad hoc network. The paper presents a Mobile Ad hoc Key Revocation Server (MAKeRS) scheme which proposes to improve the performance and reliability of the system. Simulation show… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
7

Relationship

3
4

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 39 publications
0
7
0
Order By: Relevance
“…Public key algorithms are preferred in WANETs due to their effectiveness in terms of key management, confidentiality, and authentication, as shown in [17,[26][27][28][29]. For example, random predistribution of keys (RPK) [30] would not perform well in our target scenario due to the following reasons: (i) First, the random key predistribution schemes that use symmetric cryptography are found susceptible to the replication attack. In a replication attack, the attacker can add more compromised nodes in the network after acquiring some confidential information from the captured nodes.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Public key algorithms are preferred in WANETs due to their effectiveness in terms of key management, confidentiality, and authentication, as shown in [17,[26][27][28][29]. For example, random predistribution of keys (RPK) [30] would not perform well in our target scenario due to the following reasons: (i) First, the random key predistribution schemes that use symmetric cryptography are found susceptible to the replication attack. In a replication attack, the attacker can add more compromised nodes in the network after acquiring some confidential information from the captured nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Public key infrastructure (PKI) is used for the distribution and authentication of a public key for the public key encryption algorithm [30]. However, there are various approaches to implementing PKI in WANETs by addressing different concerns.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…PKI is the most widely used keying infrastructure and in its traditional form, it is not considered a suitable candidate for 6LoWPAN security as the architecture has not been streamlined to suit the needs of 6LoWPAN networks. Its use is also discouraged as it creates a communication and processing overhead which rapidly depletes the resources of wireless sensor node [16]. Additionally, attacks on certification authorities have necessitated the need for efficient methods for certificate revocation and authorization, collectively referred to as certificate legislation [17].…”
Section: A Motivationmentioning
confidence: 99%
“…Introducing security mechanisms generally involves introducing cryptographic methods, which require high memory usage and power consumption in processing and communication. Many researchers have already proposed many security measures and most of them involve cryptographic methods and techniques [1,[3][4][5][6][7][8][9][10][11][12][35][36][37][38].…”
Section: Introductionmentioning
confidence: 99%