Skip to main content

Table 4 Properties of cluster based DCA schemes

From: A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

Ref #

Node type

Authentication

Certificate storage

Security

Other capabilities

[6]

 

Assume users have been authenticated

 

Sequential share update

CA node discovery by CHs

[2]

Cluster members & CHs

  

Evicting a CH, refreshing CH shares

Support for joining a new CH

[8]

Clients, repositories, server nodes

By fixed RA

Clusters repository nodes

Certificate revocation by CRLs

 

[9]

Administrative nodes, CH nodes, regular nodes

Inter cluster authentication

Directories in administrators & CHs

Secure inter cluster communication

Self-initialization

[10]

 

Participating nodes authenticate each other

  

Nodes requesting certificate perform the whole process

[11]

Individual nodes, certificate repositories, DCA servers

Used in Inter-cluster communication

One or more certificate repositories

Elliptic curve, CRLs, secure communication between clusters

Â