The official PGP user's guide
A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
On Certificate Revocation and Validation
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Certificate Management in Ad Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Efficient Certificate Revocation
Efficient Certificate Revocation
Towards realistic mobility models for mobile ad hoc networks
Proceedings of the 9th annual international conference on Mobile computing and networking
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
A certificate revocation scheme for wireless ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Robust threshold DSS signatures
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
IEEE Network: The Magazine of Global Internetworking
PKIX Certificate Status in Hybrid MANETs
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Certificate status validation in mobile ad hoc networks
IEEE Wireless Communications
Revising centralized certificate validation standards for mobile and wireless communications
Computer Standards & Interfaces
Hi-index | 0.00 |
In PKI (Public Key Infrastructure), certificate revocation list (CRL) carries important information of the revoked certificates. Users need to check with this CRL frequently to make sure that the certificate in consideration is still valid and has not been revoked. In a wired network, this CRL is stored in a centralized Certificate Authority (CA) and can be accessed easily by users. However, in a mobile ad hoc network (MANET), which is characterized by its lack of infrastructure support, high node mobility, and the instability of communication links, we usually have to use multiple CAs. Users may not be able to connect to a particular CA, so distributing the latest version of CRL to all CAs becomes important. To solve this CRL distribution problem, a number of proposed solutions have been suggested. Most of these solutions are based on flooding. However, under what conditions flooding is a viable approach to distribute information in an ad hoc network has not been elaborated. In this paper, we take the first step to answer this question by simulation based on a realistic model. We identify some critical factors affecting the performance of flooding. And based on the simulation results, we provide useful insights on the minimum requirement for flooding to work smoothly in MANET.