SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
The intent of this paper is to propose an enhanced certificate revocation scheme for Mobile Ad hoc Networks (MANETs). Our approach is built on mainly two previously proposed mechanisms. A combination of the schemes and optimization of certain steps with intelligent choices of parameters could signif...
| Main Authors: | Mall, Dieynaba, Konaté, Karim, Pathan, Al-Sakib Khan |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/37935/ http://irep.iium.edu.my/37935/1/ISBAST_22_published.pdf http://irep.iium.edu.my/37935/4/program_schedule.pdf http://irep.iium.edu.my/37935/7/37935_SECRET_Scopus.pdf |
Similar Items
On the key revocation schemes in wireless sensor networks
by: Mall, Dieynaba, et al.
Published: (2013)
by: Mall, Dieynaba, et al.
Published: (2013)
Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue
by: Mall, Dieynaba, et al.
Published: (2015)
by: Mall, Dieynaba, et al.
Published: (2015)
A secure and efficient revocation protocol for group signatures in vehicular ad hoc networks / Nur Fadhilah Mohd Shari
by: Nur Fadhilah , Mohd Shari
Published: (2018)
by: Nur Fadhilah , Mohd Shari
Published: (2018)
An efficient routing protocol for mobile ad hoc networks with Neighbor Awareness and Multicasting
by: Pathan, Al-Sakib Khan, et al.
Published: (2004)
by: Pathan, Al-Sakib Khan, et al.
Published: (2004)
Designing an efficient DMCIS with wireless sensor and ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Biologically Inspired Model for Securing Mobile Ad Hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Securing Mobile Ad hoc Domain by Immune-Inspired Mechanism
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Securing WSN with lightweight resource-efficient schemes
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Biologically inspired architecture for securing hybrid mobile ad hoc networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Routing in mobile Ad Hoc Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Critical applications in vehicular ad hoc/sensor networks
by: Kumar, Neeraj, et al.
Published: (2014)
by: Kumar, Neeraj, et al.
Published: (2014)
Incorporating revocation of certification into a PKI model
by: Azimzadeh, Fatemeh, et al.
Published: (2007)
by: Azimzadeh, Fatemeh, et al.
Published: (2007)
Mobile ad hoc network overview
by: Ismail, Ishak, et al.
Published: (2007)
by: Ismail, Ishak, et al.
Published: (2007)
A lightweight identity-based Rivest-Shamir-Adleman authentication scheme for mobile ad hoc networks
by: Eissa, Tameem
Published: (2011)
by: Eissa, Tameem
Published: (2011)
An alternative routing mechanisms for mobile ad-hoc networks
by: Ali, Awos Khazal
Published: (2008)
by: Ali, Awos Khazal
Published: (2008)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Novel Immune-based Framework for Securing Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Incorporation Of Certification Revocation And Time Concept Into A Trust Model For Information Security System
by: Azimzadeh, Fatemeh
Published: (2007)
by: Azimzadeh, Fatemeh
Published: (2007)
Integrating mobile ad hoc network into mobile IPv6 network
by: Ali, Adel, et al.
Published: (2004)
by: Ali, Adel, et al.
Published: (2004)
A friend mechanism for mobile ad hoc networks
by: Abd. Razak, Shukor, et al.
Published: (2008)
by: Abd. Razak, Shukor, et al.
Published: (2008)
Towards developing smart environment using wireless sensor and ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
by: Abdulkader, Zaid A.
Published: (2018)
by: Abdulkader, Zaid A.
Published: (2018)
Classifications of multicast routing In mobile ad hoc networks
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
An efficient scheme for secure data transmission in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity
by: Gurusamy, Gobi
Published: (2006)
by: Gurusamy, Gobi
Published: (2006)
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
by: Waheed, Bassam M.S.
Published: (2014)
by: Waheed, Bassam M.S.
Published: (2014)
A review current routing attacks in mobile ad-hoc networks
by: Khokhar, Rasheed Hafeez, et al.
Published: (2008)
by: Khokhar, Rasheed Hafeez, et al.
Published: (2008)
Simplified gateway selection scheme for multihop relay in vehicular ad hoc network
by: Alawi, Mahmoud, et al.
Published: (2014)
by: Alawi, Mahmoud, et al.
Published: (2014)
Maximum energy level ad hoc distance vector scheme for energy efficient ad hoc networks routing
by: Tai, Hieng Tie, et al.
Published: (2009)
by: Tai, Hieng Tie, et al.
Published: (2009)
Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks
by: Alahdal, Tariq A. A.
Published: (2008)
by: Alahdal, Tariq A. A.
Published: (2008)
Improving performance of mobile ad hoc networks using efficient Tactical On Demand Distance Vector (TAODV) routing algorithm
by: Uddin, Mueen, et al.
Published: (2012)
by: Uddin, Mueen, et al.
Published: (2012)
Heterogeneity-aware task allocation in mobile ad hoc cloud / Ibrar Yaqoob
by: Ibrar, Yaqoob
Published: (2017)
by: Ibrar, Yaqoob
Published: (2017)
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
by: Abdulsaheb, Ghaida Muttasher
Published: (2017)
by: Abdulsaheb, Ghaida Muttasher
Published: (2017)
Resource Aware Application for Mobile Device In An Ad Hoc Wireless Network Environment
by: Saaya, Zurina, et al.
Published: (2010)
by: Saaya, Zurina, et al.
Published: (2010)
A lightweight secure authentication for vehicular ad-hoc networks by message encapsulation and trusted authority dependency-less scheme / Tarak Nandy
by: Tarak , Nandy
Published: (2022)
by: Tarak , Nandy
Published: (2022)
Similar Items
-
On the key revocation schemes in wireless sensor networks
by: Mall, Dieynaba, et al.
Published: (2013) -
Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue
by: Mall, Dieynaba, et al.
Published: (2015) -
A secure and efficient revocation protocol for group signatures in vehicular ad hoc networks / Nur Fadhilah Mohd Shari
by: Nur Fadhilah , Mohd Shari
Published: (2018) -
An efficient routing protocol for mobile ad hoc networks with Neighbor Awareness and Multicasting
by: Pathan, Al-Sakib Khan, et al.
Published: (2004) -
Designing an efficient DMCIS with wireless sensor and ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)