Game Theoretic Analysis of Distributed Certification Authority in Mobile Ad Hoc Networks
نویسندگان
چکیده
Certification authority (CA) in mobile ad hoc networks is implemented in a distributed fashion using threshold cryptography. There are two kinds of distributed certification authority according to the variableness of CA nodes. In this paper, we analyze whether the distributed certification schemes operate solidly when the nodes in ad hoc networks are selfish. We model the schemes using various games and find Nash equilibria. Our findings are that the CA nodes should be changed continually and a proper reputation system is needed for the stable certification service.
منابع مشابه
Comprehensive Survey on Game Theory Based Intrusion Detection System for Mobile Adhoc Networks
Mobile Adhoc Networks (MANET's) are autonomous distributed systems that comprise a number of mobile nodes connected by wireless links, forming arbitrary time varying wireless network topologies. Security in mobile ad-hoc networks are particularly difficult to achieve, notably because of the limited physical protection to each of the nodes, the sporadic nature of connectivity, the absence of a c...
متن کاملDistributed Certification Authority for Mobile Ad Hoc Networks - A Dynamic Approach
A Mobile Ad Hoc Network (MANET) is an infrastructureless network of wireless mobile nodes that cooperate among each other to maintain connectivity of the network. In comparison to wired networks, securing a MANET is more difficult and challenging. One of the effective ways of providing security in MANETs is by using Public Key Cryptography and Certificates. Certificates are issued by a trusted ...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملAuthentication Schemes for Open Distributed Network: A Classification
An authentication protocol is a sequence of message exchanges between entities that either distributes secrets to some of those principals or allows the use of some secret to be recognized .Distributed Network, such as sensor and mobile ad hoc networks, must conquer a numerous of security challenges to realize their potential in both civil and military applications. Usually, a Distributed Netwo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007