SLGP Header

Safe and Distributed Data Sharing in Wireless Sensor Network by Using Revocation Process

IJCSEC Front Page

Abstract
Distributed data discovery and dissemination protocol for wireless sensor networks is responsible for allows the network owners to authorize multiple network users with different privileges to simultaneously and directly disseminate data items to the sensor nodes. In existing protocols suffer from two major drawbacks present in wireless network. First they are based only security in network not safety in sensor nodes. Second those protocols are not designed with security in mind and thus adversaries will simply launch attacks to damage the data packets. This paper proposes proving the authentication and enhancing the validation system by using revocation process. The proposed scheme also solves the improper certificate revocation which can occur due to false accusations made by malicious node also the problem of window of opportunity where revoked certificates get assigned as a valid to new nodes.
Keywords:certificate Authority, certificate revocation, Dissemination, efficiency, security.

References:

  1. Wei Liu, Hiroki Nishiyama, N. Ansari, N.Kato, “A study on Certificate Revocation in Mobile Ad Hoc Networks”, IEEE 2011.
  2. Claude Crêpeau and Carlton R. Davis,” A Certificate Revocation Scheme for Wireless Ad Hoc Networks “School of Computer Science, McGill University, Montreal, QC, Canada H3A 2A7.
  3. T.Dang,N. Bulusu,W. Feng, and S. Park, “DHV:Acode consistency maintenance protocol for multi-hop wireless sensor networks,” in Proc. 6th Eur. Conf.Wireless Sensor Netw., 2009, pp. 327–342.
  4. G. Tolle and D. Culler, “Design of an application-cooperative management system for wireless sensor networks,” in Proc. Eur. Conf. Wireless Sensor Netw., 2005, pp. 121–132.
  5. K. Lin and P. Levis, “Data discovery and dissemination with DIP,” in Proc. ACM/IEEE Int. Conf. Inf. Process. Sensor Netw., 2008, pp. 433–444.
  6. K. Park, H. Nishiyama, N. Ansari, and N. Kato, “Certificate revocation to cope with false accusations in mobile ad hoc networks,” Proc. 2010 IEEE 71st Vehicular Technology Conference: VTC2010-Spring, Taipei, Taiwan, May 16-19, 2010
  7. G. Arboit, C. Crepeau, C. R. Davis, and M. Maheswaran, “A Localized Certificate Revocation Scheme for Mobile Ad Hoc Networks,” Ad Ho Network, vol. 6, no. 1, pp. 17-31, Jan. 2008.
  8. R. Housley, W. Polk, W. Ford, D. Solo, Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, Internet Request for Comments (RFC 3280), April 2002.
  9. M. Myers, R. Ankney, A. Malpani, S. Galperin, C. Adams, X.509 internet public key infrastructure online certificate status protocol – OCSP, Internet Request for Comments (RFC 2560), June 1999.
  10. J. Luo, J. P. Hubaux and P. T. Eugster, “DICTATE: DIstributed CerTification Authority with probabilistic frEshness for ad hoc networks,” IEEE Trans. Dependable and Secure Computing, vol. 2, no. 4,pp.311-323,Oct.-Dec.2005