Unthresholded adaptive revocation technique in mobile ad hoc networks

Noureddine Chaib, Nasreddine Lagraa, Mohamed Bachir Yagoubi, Abderrahmane Lakas

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)

    Abstract

    Removing malicious nodes from any network is vital to its correct operation and enhances largely its security. This can be typically achieved by revoking or deactivating their credentials whenever a threshold of votes against them is reached. The problem of threshold based revocation schemes is that any colluding set of malicious nodes surpassing the threshold can revoke nodes in the networks at will. Lowering the threshold value, would make coalition attacks against the revocation protocol easier. Whereas increasing the threshold value would make the revocation of malicious nodes difficult. In this paper, we propose a new revocation scheme for mobile ad hoc networks which deals with the revocation problem adaptively, so that it allows the revocation of smaller sets of colluding malicious nodes easier, meanwhile it controls the number of erroneously revoked nodes caused by big sets of colluding attackers.

    Original languageEnglish
    Title of host publicationQ2SWinet'12 - Proceedings of the 8th ACM Symposium on QoS and Security for Wireless and Mobile Networks
    Pages75-78
    Number of pages4
    DOIs
    Publication statusPublished - Dec 5 2012
    Event8th ACM Symposium on Quality of Service and Security for Wireless and Mobile Networks, Q2SWinet 2012 - Paphos, Cyprus
    Duration: Oct 24 2012Oct 25 2012

    Publication series

    NameQ2SWinet'12 - Proceedings of the 8th ACM Symposium on QoS and Security for Wireless and Mobile Networks

    Other

    Other8th ACM Symposium on Quality of Service and Security for Wireless and Mobile Networks, Q2SWinet 2012
    Country/TerritoryCyprus
    CityPaphos
    Period10/24/1210/25/12

    Keywords

    • Distributed revocation
    • MANET
    • Secure routing

    ASJC Scopus subject areas

    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'Unthresholded adaptive revocation technique in mobile ad hoc networks'. Together they form a unique fingerprint.

    Cite this