A trust based threshold revocation scheme for MANETs

Hisham Mohammed Korany Dahshan, Fatma F. Elsayed, Alaa Eidin A.E. Rohiem, Aly A. Elmoghazy, James M. J.M. Irvine

Research output: Contribution to conferenceProceedingpeer-review

7 Citations (Scopus)

Abstract

Security is very important for the reliable operation of mobile Ad Hoc networks (MANETs). One of the critical security issues in MANETs is the revocation of misbehaving nodes. In this paper, we propose a trust based threshold cryptography revocation scheme for MANETs. In our proposed scheme, the master private key is split into n pieces according to a random polynomial. Each node in the proposed scheme is configured with a share ski of the CA private key SK, the node's public key pki, and the CA public key PK before joining the network. Meanwhile, the master private key could be recovered by combining any threshold t pieces based on Lagrange interpolation. Consequently, the proposed scheme improves the safety levels in MANETs. The proposed hop-by-hop certificate revocation scheme is based on both threshold cryptography and transitive trust between mobile nodes. Because of the decentralized nature of our proposed scheme, it enables a group of legitimate nodes to perform fast revocation of a nearby misbehaving node. The proposed scheme is highly robust in the mobility environment of MANETs. The advantages of the proposed scheme are justified through extensive simulations.
Original languageEnglish
Pages1-5
Number of pages5
DOIs
Publication statusPublished - 2 Sept 2013
EventIEEE 78th Vehicular Technology Conference - Las Vegas, United States
Duration: 2 Sept 20135 Sept 2013

Conference

ConferenceIEEE 78th Vehicular Technology Conference
Country/TerritoryUnited States
CityLas Vegas
Period2/09/135/09/13

Keywords

  • security
  • mobile ad hoc networks
  • key management
  • lagrange interpolation
  • hop-by-hop certificate revocation scheme
  • MANET

Fingerprint

Dive into the research topics of 'A trust based threshold revocation scheme for MANETs'. Together they form a unique fingerprint.

Cite this