Abstract
A Certificate Authority (CA) provides the critical authentication and security services for Public Key Infrastructure (PKI) which are used for the Internet and wired networks. In MANETs (wireless and ad hoc) there is an inability to offer a centralized CA to provide these security services. Recent research has looked to facilitate the use of CAs within MANETs through the use of a Distributed Certificate Authority (DCA) for wireless and ad hoc networks. This paper presents a number of different types of DCA protocols and categorizes them into groups based on their factors and specifications. The paper concludes by proposing the best DCA security services in terms of performance and level of security
Highlights
A Survey of Distributed Certificate Authorities in MANETsReceived: 5th May 2018; Accepted: 3rd June 2018; Published: 1st July 2018 Abstract: A Certificate Authority (CA) provides the critical authentication and security services for Public Key Infrastructure (PKI) which are used for the Internet and wired networks
MANETs consist of mobile devices that are connected together via wireless links
A node can be defined as a Certificate Authority (CA), there are some problems with this approach which are related to the node's existence
Summary
Received: 5th May 2018; Accepted: 3rd June 2018; Published: 1st July 2018 Abstract: A Certificate Authority (CA) provides the critical authentication and security services for Public Key Infrastructure (PKI) which are used for the Internet and wired networks. In MANETs (wireless and ad hoc) there is an inability to offer a centralized CA to provide these security services. Recent research has looked to facilitate the use of CAs within MANETs through the use of a Distributed Certificate Authority (DCA) for wireless and ad hoc networks. This paper presents a number of different types of DCA protocols and categorizes them into groups based on their factors and specifications. The paper concludes by proposing the best DCA security services in terms of performance and level of security
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have