{"title":"MANET中告警节点的可靠白名单管理技术","authors":"E. Jayanthi, M. Hussain","doi":"10.1504/ijvics.2019.10025630","DOIUrl":null,"url":null,"abstract":"Mobile adhoc networks are widely used in many applications. One of the challenges in MANET is the security. Providing authentication is one of the primary principles of network security. Digital certificates are distributed to the nodes in the networks. Certificates are revoked from misbehaving nodes. In the previous papers the nodes are inserted in black list and white list based on voting and non-voting based mechanism. The nodes in the white list are deprived of accusing the malicious nodes in the network. To enhance reliability, we remove the warned nodes from the white list and make them eligible to accuse other nodes using threshold value calculated by a certificate authority and trust-based mechanism. Increased number of normal nodes in the network has been achieved with whitelist management technique using network simulator-2.","PeriodicalId":39333,"journal":{"name":"International Journal of Vehicle Information and Communication Systems","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Reliable white list management technique for warned nodes in MANET\",\"authors\":\"E. Jayanthi, M. Hussain\",\"doi\":\"10.1504/ijvics.2019.10025630\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile adhoc networks are widely used in many applications. One of the challenges in MANET is the security. Providing authentication is one of the primary principles of network security. Digital certificates are distributed to the nodes in the networks. Certificates are revoked from misbehaving nodes. In the previous papers the nodes are inserted in black list and white list based on voting and non-voting based mechanism. The nodes in the white list are deprived of accusing the malicious nodes in the network. To enhance reliability, we remove the warned nodes from the white list and make them eligible to accuse other nodes using threshold value calculated by a certificate authority and trust-based mechanism. Increased number of normal nodes in the network has been achieved with whitelist management technique using network simulator-2.\",\"PeriodicalId\":39333,\"journal\":{\"name\":\"International Journal of Vehicle Information and Communication Systems\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Vehicle Information and Communication Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/ijvics.2019.10025630\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Vehicle Information and Communication Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijvics.2019.10025630","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Engineering","Score":null,"Total":0}
Reliable white list management technique for warned nodes in MANET
Mobile adhoc networks are widely used in many applications. One of the challenges in MANET is the security. Providing authentication is one of the primary principles of network security. Digital certificates are distributed to the nodes in the networks. Certificates are revoked from misbehaving nodes. In the previous papers the nodes are inserted in black list and white list based on voting and non-voting based mechanism. The nodes in the white list are deprived of accusing the malicious nodes in the network. To enhance reliability, we remove the warned nodes from the white list and make them eligible to accuse other nodes using threshold value calculated by a certificate authority and trust-based mechanism. Increased number of normal nodes in the network has been achieved with whitelist management technique using network simulator-2.