You are on page 1of 11

Clustering based Certificate Revocation using MANET

Review-I

Name : Kannan & Raj kannan Reg.No : 22010104014,22010104029 Class : CSE Date :17.02.14

MOBILE COMPUTING
A simple definition could be: Mobile Computing is using a computer (of one kind or another) while on the move Another definition could be: Mobile Computing is when a (work) process is moved from a normal fixed position to a more dynamic position. A third definition could be: Mobile Computing is when a work process is carried out somewhere where it was not previously possible. COMPARISON TO WIRED NETWORKS Wired Networks -high bandwidth -low bandwidth variability -can listen on wire -high power machines -high resource machines -need physical access(security) -low delay -connected operation Mobile Networks -low bandwidth -high bandwidth variability -hidden terminal problem -low power machines -low resource machines -need proximity -higher delay -disconnected operation

Why Go Mobile?
-Enable anywhere/anytime connectivity -Enable mobility -Enable new applications

MANET
-A Mobile Ad-hoc network is a wireless ad-hoc network which is used to exchange information.

-Each node is willing to forward data to other nodes -Does not rely on fixed infrastructure.

FEATURES
Autonomous terminal: A node may function as both host and a router. Distributed Operations: since there is no fixed network the control and management operations are distributed among the terminals. Multi-hop routing: packets should be delivered via one or more nodes Dynamic network topology: As the network change rapidly, the mobile nodes dynamically establish routing among themselves i.e. they form their own network Fluctuating link capacity: One end-to-end path can be shared by several sessions. Light-weight terminal: The MANET nodes are mobile devices with less CPU processing capability, small memory size, and low power storage.

PROBLEMS IN MANET:
-Routing -Security and Reliability -Quality of Service -Internetworking -Power Consumption

ABSTRACT
AIM
The main aim of this project is to revoke the malicious node from the network by certificate revocation. The main challenge for certificate revocation is to revoke the certificates of malicious nodes promptly and accurately.

SYNOPSIS
A mobile ad hoc network is vulnerable to many kinds of malicious attacks, and it is thus difficult to ensure secure communications. Malicious nodes directly threaten the robustness of the network as well as the availability of nodes. Protecting legitimate nodes from malicious attacks must be considered in MANETs. This is achievable through the use of a key management scheme which serves as a means of conveying trust in a public key infrastructure. These certificates are signed by the Certificate Authority (CA) of the network, which is a trusted third party that is responsible for issuing and revoking certificates. The mechanism performed by the CA plays an important role in enhancing network security. It digitally signs a valid certificate for each node to ensure that nodes can communicate with each other in the network.

In such networks, a certificate revocation scheme which invalidates attackers certificates is essential in keeping the network secured. An attackers certificate can be successfully revoked by the CA if there are enough accusations showing that it is an attacker. However, it is difficult for the CA to determine if an accusation is trustable because malicious nodes can potentially make false accusations. A malicious node will try to remove legitimate nodes from the network by falsely accusing them as attackers.

Therefore, the issue of false accusation must be taken into account in designing certificate revocation mechanisms.
Our previous scheme, which is based on a clustering approach, outperforms other techniques in terms of being able to quickly revoke certificates of accused nodes and also to explicitly distinguish false accusations. However, it has a shortcoming in that its performance degrades as the number of detected attacker increases

Existing System
URSA uses certified tickets which are locally managed in the network to evict nodes. URSA does not use a third-party trust system such as a CA. The tickets of the newly joining nodes are issued by their neighbors. Since there is no centralized authority, the ticket of a malicious node is revoked by the vote of its neighbors. In URSA, each node performs one-hop monitoring, and exchanges monitoring information with its neighbors which allow for malicious nodes to be identified. When the number of votes exceeds a certain threshold, the ticket of the accused node will be successfully revoked. Since nodes cannot communicate with other nodes without valid tickets, revoking a nodes ticket implies the isolation of that node.

Proposed System
Nodes cooperate to form clusters and each cluster consists of a Cluster Head (CH) Along with several Cluster Members (CMs) that are located within the communication range of their CH. Each CM belongs to two different clusters in order to provide robustness against changes in topology due to mobility. It should be noted that because the clusters overlap, a node within the communication range of a CH is not necessary part of its cluster. Clustering information is never used for routing; it is only used for managing certificates in the certification system. This provides a clear advantage as it enables the scheme to be used along with any type of routing technology.

Architeture Diagram: Intimation about suspected malicious node to authority:


Trusted authority

Intimation to ta(a,f)

intimation to chs (f)


e

d h Region 1 b a c

f
g

fi

contents of table after forwarding to all chs:


Black list Warning listBlack list a a f

Contents of table after concluding the malicious node:


WL BL F

Intimation about malicious node to all nodes (except to malicious):


Trusted authority

a b

c g h i

SPECIFICATION
Software Specification
Windows operating system XP and above JDK 1.6 JavaFX 1.3

Hardware Specification
Hard Disk RAM Processor : : : 40GB and Above 512MB and Above Pentium IV and Above

You might also like