Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Identification and Avoidance of Malicious Nodes by using Certificate Revocation Method

View through CrossRef
There are a large number of applications of ad-hoc networks (i) military, (ii) Disaster rescue, (iii) Medical etc.  But the security of the data during transfer is a major concern. This paper proposes a technique for identifying and preventing the malicious nodes to be in a path from sender to receiver, known as certificate revocation method. Here certificate authority Scheme (CAS) is responsible for the issue of the certificates for these nodes. The CAS maintains two sets of lists – a warning list and a blocked list. The node is added to a warning list if any of the neighbor nodes raises a suspension about a node. Both the accuser and the accused are added to this list. The node is transferred to blocked list when the corruption in the node is confirmed. A node from the blocked list is never added to the network again. This process is termed as cluster-based certificate revocation scheme (CBCRS). The priority of this technique is not the detection of the corrupted node but the removal of the corrupted node from the network. Experimental results reveal that this protocol is free from vulnerabilities.  
Title: Identification and Avoidance of Malicious Nodes by using Certificate Revocation Method
Description:
There are a large number of applications of ad-hoc networks (i) military, (ii) Disaster rescue, (iii) Medical etc.
  But the security of the data during transfer is a major concern.
This paper proposes a technique for identifying and preventing the malicious nodes to be in a path from sender to receiver, known as certificate revocation method.
Here certificate authority Scheme (CAS) is responsible for the issue of the certificates for these nodes.
The CAS maintains two sets of lists – a warning list and a blocked list.
The node is added to a warning list if any of the neighbor nodes raises a suspension about a node.
Both the accuser and the accused are added to this list.
The node is transferred to blocked list when the corruption in the node is confirmed.
A node from the blocked list is never added to the network again.
This process is termed as cluster-based certificate revocation scheme (CBCRS).
The priority of this technique is not the detection of the corrupted node but the removal of the corrupted node from the network.
Experimental results reveal that this protocol is free from vulnerabilities.
  .

Related Results

Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...
Définition et conception d'un système optimal de la révocation de certificats
Définition et conception d'un système optimal de la révocation de certificats
La Public Key Infrastructure(PKI) est une infrastructure à clés publique dont l’objectif est de répondre à des besoins tel que : l’authentification de clés publiques, le contrôle d...
How Does Psilocybin Therapy Work? an Exploration of Experiential Avoidance as a Putative Mechanism of Change
How Does Psilocybin Therapy Work? an Exploration of Experiential Avoidance as a Putative Mechanism of Change
Although psilocybin therapy is currently receiving attention as a novel intervention for a wide range of mental health concerns, limited research has examined the underlying psycho...
Certificate revocation release policies
Certificate revocation release policies
Public key infrastructure provides a promising foundation for verifying the authenticity of communicating parties and transferring trust over the Internet. The key issue in public ...
The effect of miRNAs and MALAT1 related with the prognosis of Her-2 positive breast cancer patients with lymph node metastasis
The effect of miRNAs and MALAT1 related with the prognosis of Her-2 positive breast cancer patients with lymph node metastasis
Abstract Background: To analyze and screen the miRNAs associated with lymph node metastasis of breast cancer (BC), and to explore the roles of these miRNAs in the prolifera...
Efficient Revocation of Malicious Vehicles in VANETs
Efficient Revocation of Malicious Vehicles in VANETs
Intelligent Transport Systems (ITS) leverage cutting edge technology to enhance the reliability, protection and effectiveness of transportation. Dedicated Short Range Communication...
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
<p>Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services to deliver targeted ads and explicit impr...

Back to Top