Certificate revocation to cope with false accusations in mobile ad hoc networks

Kyul Park, Hiroki Nishiyama, Nirwan Ansari, Nei Kato

Research output: Chapter in Book/Report/Conference proceedingConference contribution

35 Scopus citations


In Mobile Ad hoc NETworks (MANETs), certification systems play an important role in maintaining network security because attackers can freely move and repeatedly launch attacks against different nodes. By adopting certification systems, it becomes possible to exclude identified attackers from the network permanently by revoking the certifications of the attackers. A simple way to identify attackers is to collect information on attackers from nodes in the network. However, in this approach, it is difficult to differentiate valid accusations made by legitimate nodes from false accusations made by malicious nodes. In addition, the amount of traffic in order to exchange information on attackers and the necessary time to gather the information increases as the network size becomes larger. In this paper, we propose a certificate revocation scheme which can revoke the certification of attackers in a short time with a small amount of operating traffic. By clustering nodes and introducing multi-level node reliability, the proposed scheme can mitigate the improper certificate revocation due to false accusations by malicious users.

Original languageEnglish (US)
Title of host publication2010 IEEE 71st Vehicular Technology
StatePublished - 2010
Event2010 IEEE 71st Vehicular Technology Conference, VTC 2010-Spring - Taipei, Taiwan, Province of China
Duration: May 16 2010May 19 2010

Publication series

NameIEEE Vehicular Technology Conference
ISSN (Print)1550-2252


Other2010 IEEE 71st Vehicular Technology Conference, VTC 2010-Spring
Country/TerritoryTaiwan, Province of China

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics


Dive into the research topics of 'Certificate revocation to cope with false accusations in mobile ad hoc networks'. Together they form a unique fingerprint.

Cite this