Unthresholded adaptive revocation technique in mobile ad hoc networks

Noureddine Chaib, Nasreddine Lagraa, Mohamed Bachir Yagoubi, Abderrahmane Lakas

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Removing malicious nodes from any network is vital to its correct operation and enhances largely its security. This can be typically achieved by revoking or deactivating their credentials whenever a threshold of votes against them is reached. The problem of threshold based revocation schemes is that any colluding set of malicious nodes surpassing the threshold can revoke nodes in the networks at will. Lowering the threshold value, would make coalition attacks against the revocation protocol easier. Whereas increasing the threshold value would make the revocation of malicious nodes difficult. In this paper, we propose a new revocation scheme for mobile ad hoc networks which deals with the revocation problem adaptively, so that it allows the revocation of smaller sets of colluding malicious nodes easier, meanwhile it controls the number of erroneously revoked nodes caused by big sets of colluding attackers.

Original languageEnglish
Title of host publicationQ2SWinet'12 - Proceedings of the 8th ACM Symposium on QoS and Security for Wireless and Mobile Networks
Pages75-78
Number of pages4
DOIs
Publication statusPublished - 2012
Event8th ACM Symposium on Quality of Service and Security for Wireless and Mobile Networks, Q2SWinet 2012 - Paphos, Cyprus
Duration: Oct 24 2012Oct 25 2012

Publication series

NameQ2SWinet'12 - Proceedings of the 8th ACM Symposium on QoS and Security for Wireless and Mobile Networks

Other

Other8th ACM Symposium on Quality of Service and Security for Wireless and Mobile Networks, Q2SWinet 2012
Country/TerritoryCyprus
CityPaphos
Period10/24/1210/25/12

Keywords

  • Distributed revocation
  • MANET
  • Secure routing

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Unthresholded adaptive revocation technique in mobile ad hoc networks'. Together they form a unique fingerprint.

Cite this