Article(electronic)April 1, 2014

A Survey on Key Management and Certificate Exchange in Mobile Adhoc Network

In: International journal of business data communications and networking: IJBDCN ; an official publication of the Information Resources Management Association, Volume 10, Issue 2, p. 30-46

Checking availability at your location

Abstract

Owing to the wireless and dynamic nature, MANETs are susceptible to security attacks from malicious nodes. Key management, certificate exchange and certificate revocation mechanisms play a vital role in securing the network from attacks. When the certificate of a malicious node is revoked, it is denied from all activities and isolated from the network. This paper surveys various existing mechanisms in key management and certificate exchange. Key management methods are broadly classified into two types namely, contributory and distributive methods. Here, certificate distribution and exchange techniques are classified as trust-based and non-trust based methods. Certificate revocation techniques are classified as voting-based, cluster-based and trust-based schemes. The merits and demerits of each mechanism along with the performance are analyzed. Finally, a comparison table is designed to compare the existing mechanisms in an effective manner.

Publisher

IGI Global

ISSN: 1548-064X

DOI

10.4018/ijbdcn.2014040103

Report Issue

If you have problems with the access to a found title, you can use this form to contact us. You can also use this form to write to us if you have noticed any errors in the title display.