2006
DOI: 10.1007/11751588_80
|View full text |Cite
|
Sign up to set email alerts
|

Cluster-Based Certificate Chain for Mobile Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…In this section, the performance of existing and proposed security mechanisms are evaluated by using various performance measures that include control packet overhead, Packet Delivery Ratio (PDR), average end-to-end delay, False Acceptance Rate (FAR), and throughput. The existing techniques [28] considered in this analysis are Flooding Factor-based Trust Management (F3TM) [33], Cooperative Opportunistic Routing in MANET (CORMAN) [34], and Protocol for Routing in Interested-defined Mesh Enclaves (PRIME) [35]. Here simulation was carried out on NS2 2.29 network simulator, a broadly utilized simulator across the world with open source code.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, the performance of existing and proposed security mechanisms are evaluated by using various performance measures that include control packet overhead, Packet Delivery Ratio (PDR), average end-to-end delay, False Acceptance Rate (FAR), and throughput. The existing techniques [28] considered in this analysis are Flooding Factor-based Trust Management (F3TM) [33], Cooperative Opportunistic Routing in MANET (CORMAN) [34], and Protocol for Routing in Interested-defined Mesh Enclaves (PRIME) [35]. Here simulation was carried out on NS2 2.29 network simulator, a broadly utilized simulator across the world with open source code.…”
Section: Resultsmentioning
confidence: 99%
“…Nevertheless, this paper failed to improve the level of security by enabling efficient and reliable communication in the network. Kannan and Dinesh [28] used a Cluster-based Certificate Revocation with Vindication Capability (CCRVC) for identifying the attackers in MANET. Here, the cluster head identified the false accusation for revoking the certificate.…”
Section: Organizationmentioning
confidence: 99%
“…Once node A finds a certificate chain, it verifies the validity of each certificate to eventually verify the validity of the public key of node B. Hubaux et al [53] proposed two algorithms to find a certificate chain. To simplify the certificate chain discovery process, [70]- [72] proposed the use of a cluster-based hierarchy while [73]- [75] proposed the use of a (binary) tree-based hierarchy. In case multiple certificate chains are discovered, [64], [66], [70], [71], [76]- [79] proposed various methods of adding a continuous trust metric to links in order to select the most trustworthy certificate chain.…”
Section: ) System Detailsmentioning
confidence: 99%
“…This traditional approach has many problems that are detailed in [7]. Hahn et al have proposed a practical model distributed CA (DCA) approach of PKI relying on the cluster based routing protocol (CBRP) [11]. Cluster-heads functions as CA and issues certificates in a distributed fashion.…”
Section: Introductionmentioning
confidence: 99%
“…The certificates are chained effectively and the signed messages can be transferred over a certificate chain. This paper presents an enhancement of PKI based on DCA over CBRP routing protocol proposed by Hahn et al [11]. CBRP has been equipped with a predictive preemptive mechanism [12][13][14].…”
Section: Introductionmentioning
confidence: 99%