Noureddine Chaib, N. Lagraa, M. Yagoubi, Abderrahmane Lakas
{"title":"移动自组织网络中的无阈值自适应撤销技术","authors":"Noureddine Chaib, N. Lagraa, M. Yagoubi, Abderrahmane Lakas","doi":"10.1145/2387218.2387233","DOIUrl":null,"url":null,"abstract":"Removing malicious nodes from any network is vital to its correct operation and enhances largely its security. This can be typically achieved by revoking or deactivating their credentials whenever a threshold of votes against them is reached. The problem of threshold based revocation schemes is that any colluding set of malicious nodes surpassing the threshold can revoke nodes in the networks at will. Lowering the threshold value, would make coalition attacks against the revocation protocol easier. Whereas increasing the threshold value would make the revocation of malicious nodes difficult. In this paper, we propose a new revocation scheme for mobile ad hoc networks which deals with the revocation problem adaptively, so that it allows the revocation of smaller sets of colluding malicious nodes easier, meanwhile it controls the number of erroneously revoked nodes caused by big sets of colluding attackers.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Unthresholded adaptive revocation technique in mobile ad hoc networks\",\"authors\":\"Noureddine Chaib, N. Lagraa, M. Yagoubi, Abderrahmane Lakas\",\"doi\":\"10.1145/2387218.2387233\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Removing malicious nodes from any network is vital to its correct operation and enhances largely its security. This can be typically achieved by revoking or deactivating their credentials whenever a threshold of votes against them is reached. The problem of threshold based revocation schemes is that any colluding set of malicious nodes surpassing the threshold can revoke nodes in the networks at will. Lowering the threshold value, would make coalition attacks against the revocation protocol easier. Whereas increasing the threshold value would make the revocation of malicious nodes difficult. In this paper, we propose a new revocation scheme for mobile ad hoc networks which deals with the revocation problem adaptively, so that it allows the revocation of smaller sets of colluding malicious nodes easier, meanwhile it controls the number of erroneously revoked nodes caused by big sets of colluding attackers.\",\"PeriodicalId\":369459,\"journal\":{\"name\":\"Q2S and Security for Wireless and Mobile Networks\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-10-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Q2S and Security for Wireless and Mobile Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2387218.2387233\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Q2S and Security for Wireless and Mobile Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2387218.2387233","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Unthresholded adaptive revocation technique in mobile ad hoc networks
Removing malicious nodes from any network is vital to its correct operation and enhances largely its security. This can be typically achieved by revoking or deactivating their credentials whenever a threshold of votes against them is reached. The problem of threshold based revocation schemes is that any colluding set of malicious nodes surpassing the threshold can revoke nodes in the networks at will. Lowering the threshold value, would make coalition attacks against the revocation protocol easier. Whereas increasing the threshold value would make the revocation of malicious nodes difficult. In this paper, we propose a new revocation scheme for mobile ad hoc networks which deals with the revocation problem adaptively, so that it allows the revocation of smaller sets of colluding malicious nodes easier, meanwhile it controls the number of erroneously revoked nodes caused by big sets of colluding attackers.