Paper Title : CERTIFICATE AUTHENTICATION BASED INFORMATION SHARING
ISSN : 2394-2231
Year of Publication : 2020
MLA Style: Mr. S. Sambasivam, M C A, M Phil, Mr. S. Kavinkumar, M C A " CERTIFICATE AUTHENTICATION BASED INFORMATION SHARING " Volume 7 - Issue 3 May-June ,2020 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
APA Style: Mr. S. Sambasivam, M C A, M Phil, Mr. S. Kavinkumar, M C A " CERTIFICATE AUTHENTICATION BASED INFORMATION SHARING " Volume 7 - Issue 3 May-June ,2020 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
Mobile advert hoc networks (MANETs) have attracted masses attention because of their mobility and ease of deployment. However, the wireless and dynamic natures render them more liable to various varieties of security assaults than the compelled networks. The major assignment is to assure normal community services. To meet this venture, certificates revocation is a crucial integral hassle to everyday network communications. In this paper, it recognition on the hassle of certificate revocation to isolate attackers from similarly taking detail in community activities. For short and accurate certificates revocation, the proposed Cluster-based absolutely certainly without a doubt truly Certificate Revocation with Vindication Capability (CCRVC). In particular, to beautify the reliability of the scheme, to get higher the warned nodes to take part in the certificate revocation process; to beautify the accuracy, proposed the threshold-based virtually mechanism to evaluate and vindicate warned nodes as legitimate nodes or not, before improving them. The performances of the scheme are evaluated thru each numerical and simulation analysis. Extensive consequences exhibit that the proposed certificate revocation scheme is strong and inexperienced to assure strong communications in cell ad hoc networks. The assignment is designed the usage of Microsoft Visual Studio-2005. The Front give up as C#. Net and MS-SQL Server 2000 is used as back surrender database.
. H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in Mobile Ad Hoc Networks: Challenges and Solutions,” IEEE Wireless Comm., vol. 11, no. 1, pp. 38-47, Feb. 2004. . P. Sakari ndr and N. Ansari , “Security Services in Group Communications Over Wireless Infrastructure, Mobile Ad Hoc, and Wireless Sensor Networks,” IEEE Wireless Comm., vol. 14, no. 5, pp. 8-20, Oct. 2007. .A.M. Hegland, E. Winjum, C. Rong, and P. Spilling, “A Survey of Key Management in Ad Hoc Networks,” IEEE Comm. Surveys and Tutorials, vol. 8, no. 3, pp. 48-66, Third Quarter 2006. . L. Zhou and Z.J. Haas, “Securing Ad Hoc Networks,” IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, Nov./Dec. 1999. . L. Zhou, B. Cchneider, and R. Van Renesse, “COCA: A Secure Distributed Online Certification Authority,” ACM Trans. Computer Systems, vol. 20, no. 4, pp. 329-368, Nov. 2002. . C. Gentry, “Certificate-Based Encryption and the Certificate Revocation Problem,” EUROC RYPT: Proc. 22nd Int ’l Conf. Theory and Applications of Cryptographic Techniques, pp. 272-293, 2003. . H. Yang, J. Shu, X. Meng, and S. Lu, “SCAN: Self-Organized Network-Layer Security in Mobile Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 261-273, Feb. 2006. . J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil Attack in Sensor Network: Analysis & Defenses,” Proc. Third Int’l Symp. Information Processing in Sensor Networks, pp. 259-268, 2004. . W. Liu, H. Nishiyama, N. Ansari, and N. Kato, “A Study on Certificate Revocation in Mobile Ad Hoc Network,” Proc. IEEE Int’l Conf. Comm. (ICC), June 2011. .P. Yi, Z. Dai, Y. Zhong, and S. Zhang, “Resisting Flooding Attacks in Ad Hoc Networks,” Proc. Int’l Conf. Information Technology: Coding and Computing, 2005.
MANETs, threshold, CCRVC, Networks.