A Survey of Distributed Certificate Authorities in MANETs
Journal Title: Annals of Emerging Technologies in Computing - Year 2018, Vol 2, Issue 3
Abstract
A Certificate Authority (CA) provides the critical authentication and security services for Public Key Infrastructure (PKI) which are used for the Internet and wired networks. In MANETs (wireless and ad hoc) there is an inability to offer a centralized CA to provide these security services. Recent research has looked to facilitate the use of CAs within MANETs through the use of a Distributed Certificate Authority (DCA) for wireless and ad hoc networks. This paper presents a number of different types of DCA protocols and categorizes them into groups based on their factors and specifications. The paper concludes by proposing the best DCA security services in terms of performance and level of security.
Authors and Affiliations
Junaid Chaudhry, Kashif Saleem, Paul Haskell-Dowland, Mahdi Miraz
A Congestion Control System Based on VANET for Small Length Roads
As vehicle population has been increasing on a daily basis, this leads towards increased number of accidents. To overcome this issue, Vehicular Ad Hoc Network (VANET) has come up with lot of novel ideas such as vehicular...
Optimising Differentiated Services Strategies under IMS
The evolving standards of mobile communications, the wide variety of services they offer and the rapid growth of the Internet have made a merger of the two network technologies inevitable. One of the most prominent platf...
Hardening CISCO Devices based on Cryptography and Security Protocols - Part II: Implementation and Evaluation
This second part covers the implementation, testing, critical evaluation, conclusion and further study. It concentrates on the actual implementation details of hardening of network devices by referring to the hardware an...
IoT Energy Efficiency through Centrality Metrics
The Internet of Things is the current and next revolution in integrating various technologies and wireless communications. It has been shown to make an important contribution in various modes of communication, in homes,...
A Novel Approach for Network Attack Classification Based on Sequential Questions
With the development of incipient technologies, user devices becoming more exposed and ill-used by foes. In upcoming decades, traditional security measures will not be sufficient enough to handle this huge threat towards...