Abstract

A Certificate Authority (CA) provides the critical authentication and security services for Public Key Infrastructure (PKI) which are used for the Internet and wired networks. In MANETs (wireless and ad hoc) there is an inability to offer a centralized CA to provide these security services. Recent research has looked to facilitate the use of CAs within MANETs through the use of a Distributed Certificate Authority (DCA) for wireless and ad hoc networks. This paper presents a number of different types of DCA protocols and categorizes them into groups based on their factors and specifications. The paper concludes by proposing the best DCA security services in terms of performance and level of security

Highlights

  • A Survey of Distributed Certificate Authorities in MANETsReceived: 5th May 2018; Accepted: 3rd June 2018; Published: 1st July 2018 Abstract: A Certificate Authority (CA) provides the critical authentication and security services for Public Key Infrastructure (PKI) which are used for the Internet and wired networks

  • MANETs consist of mobile devices that are connected together via wireless links

  • A node can be defined as a Certificate Authority (CA), there are some problems with this approach which are related to the node's existence

Read more

Summary

A Survey of Distributed Certificate Authorities in MANETs

Received: 5th May 2018; Accepted: 3rd June 2018; Published: 1st July 2018 Abstract: A Certificate Authority (CA) provides the critical authentication and security services for Public Key Infrastructure (PKI) which are used for the Internet and wired networks. In MANETs (wireless and ad hoc) there is an inability to offer a centralized CA to provide these security services. Recent research has looked to facilitate the use of CAs within MANETs through the use of a Distributed Certificate Authority (DCA) for wireless and ad hoc networks. This paper presents a number of different types of DCA protocols and categorizes them into groups based on their factors and specifications. The paper concludes by proposing the best DCA security services in terms of performance and level of security

Introduction
Distributed Certificate Authority
Secret Sharing
Secret Share Updating
Distributed Certificate Authority Categories
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call