Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks

被引:11
作者
Misra, Sudip [1 ]
Goswami, Sumit [1 ]
Pathak, Gyan Prakash [1 ]
Shah, Nirav [1 ]
机构
[1] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
关键词
MANET; key revocation; public key infrastructure (PKI); certifying authority; CERTIFICATE REVOCATION; SCHEME;
D O I
10.1002/wcm.839
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key revocation involves secure and efficient managing of the information about compromised keys. Spreading the information of revoked keys to the receivers of the key is a challenging task in public key infrastructure (PKI). PKI is more suitable for wired Internet infrastructure and lacks any tailor-made protocols for extension over an ad hoc network. The paper presents a Mobile Ad hoc Key Revocation Server (MAKeRS) scheme which proposes to improve the performance and reliability of the system. Simulation shows that the concept presented in the paper is more reliable, faster, and scalable than the existing usage of PKI over ad hoc networks. It proposes auto-creation of zone of network availability (ZoNA) by each MAKeRS, which holds the revocation list and is the best service provider in its zone. A node automatically updates the identity of the key revocation server when it enters a new ZoNA. Each node maintains a list of identities of the key revocation servers sorted in order of their communication overhead. This list is regularly updated based on the broadcast from the servers and also gets modified based on the mobility of nodes and servers. The various scenarios of mobility of nodes and servers are considered and the scheme is designed to suit such scenarios in an optimum way. It reduces the time to gain information about the revocation list and ensures availability and, thus, improvement of the system as a whole. Hence, the proposed system results in scalable, reliable, and faster PKI infrastructure and will be attractive for the mobile ad hoc network (MANET) users who frequently connect to the Internet for secured transactions. We discuss the architecture as well as the performance of our scheme compared to the popular existing scheme. However, our scheme does not call for the entire change in PKI, but is compatible with the existing scheme. Our simulations show that the proposed scheme is better for key revocation. Copyright (C) 2009 John Wiley & Sons, Ltd.
引用
收藏
页码:146 / 162
页数:17
相关论文
共 42 条
[1]  
[Anonymous], PODC 2003
[2]   A localized certificate revocation scheme for mobile ad hoc networks [J].
Arboit, Genevieve ;
Crepeau, Claude ;
Davis, Carlton R. ;
Maheswaran, Muthucumaru .
AD HOC NETWORKS, 2008, 6 (01) :17-31
[3]   A framework for the revocation of unintended digital signatures initiated by malicious terminals [J].
Berta, IZ ;
Buttyán, L ;
Vajda, I .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (03) :268-272
[4]  
Boneh D, 2001, USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, P297
[5]  
CALLAS J, 2007, RFC 4880
[6]   Self-organized public-key management for mobile ad hoc networks [J].
Capkun, S ;
Buttyán, L ;
Hubaux, JP .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2003, 2 (01) :52-64
[7]  
Capkun Srdjan., 2003, MOBIHOC 03 P 4 ACM I, P46
[8]  
Cooper D. A., 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), P256, DOI 10.1109/CSAC.1999.816035
[9]   A more efficient use of delta-CRLs [J].
Cooper, DA .
2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, :190-202
[10]  
Davis C.R., 2004, International Conference on Networking, P671