Improving Cluster-Based Certificate Revocation and Integral Component CCRVC Scheme for Authentication in Mobile Adhoc Network
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2015, Vol 2, Issue 3
Abstract
Certificate revocation is a crucial integral element to secure network communications. During this paper, we tend to specialize in the problem of certificate revocation to isolate attackers from any collaborating in network activities. For fast and correct certificate revocation, we tend to propose the Cluster-based Certificate Revocation with Vindication Capability (CCRVC) theme. To overcome this drawback, the Cluster-based Certificate Revocation is projected with Vindication Capability (CCRVC) theme. Every cluster consists of a Cluster Head along side some Cluster Members (CMs) settled among the transmission vary of their cluster Head. Before nodes are a part of the network, they need to accumulate valid certificates from the Certification Authority (CA) that's to blame for distribution and management of certificates to any or all nodes. In this paper, a Cross Layer increased Secure Routing theme (CLSRS) is introduced for achieving fault tolerance level and authentication rate. Cross layer is deployed to boost the network lifespan and network performance. The number of nodes capable of occlusive malicious nodes ablated over time. It eventually cause case malicious nodes will now not be revoked in timely manner. To boost the accuracy, the thresholdbased mechanism is projected to judge and vindicate warned nodes as legitimate nodes or not, before ill them. Accumulate valid certificates from the Certification Authority (CA) that's to blame for distribution and management of certificates to any or all nodes. In this paper, a Cross Layer increased Secure Routing theme (CLSRS) is introduced for achieving fault tolerance level and authentication rate. Cross layer is deployed to boost the network lifespan and network performance. The number of nodes capable of occlusive malicious nodes ablated over time. It eventually cause case malicious nodes will now not be revoked in timely manner. To boost the accuracy, the threshold-based mechanism is projected to judge and vindicate warned nodes as legitimate nodes or not, before ill them.
Authors and Affiliations
V. S. Suresh Kumar
Fundamental Theorem of the Theory of Superiority Complex
This article discusses Axioms of the theory of superiority complex, which is developed in the area of war, law and social psychiatry. The aim is to unfold the manner in which individuals become attached t...
Live Communication Networking service developed exploiting GPS technology paradigms and Remote Location Update deployment over Cloud Network
This paper describes about development of a new Live Communication Service provided over a network to the end user.This paper aims towards describing the GPS technology usage for the service.The service described here co...
Understanding and Addressing Violence Against Women - Human Trafficking
Human trafficking has received increasing global attention over the past decade. Initially, trafficking of women and girls for forced sex work and, to a lesser extent, domestic servitude, were the sole focus of advocacy...
Effect of Multi-Walled Carbon Nanotubes on Automotive and Aerospace Applications- Case Study
Generally, MWCNTs are allotropes of carbon with a cylindrical nanostructure. Nano tubes have been constructed with length-to-diameter ratio of up to 132,000,000:1, significantly larger than for any other material. These...
Synergy of Benzimidazole Fungicides and Anilinopyrimidine with Calcium Chloride against Apple rot in Conservation
Anilinopyrimidine was more efficacious than calcium chloride at 4% in vitro on mycelious growing, conidial germination and sporulation of twelve species responsible of apple rot during conservation. Their association imp...