From: A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks
Ref # | Node type | Authentication | Certificate storage | Security | Other capabilities |
---|---|---|---|---|---|
[6] | Â | Assume users have been authenticated | Â | Sequential share update | CA node discovery by CHs |
[2] | Cluster members & CHs | Â | Â | Evicting a CH, refreshing CH shares | Support for joining a new CH |
[8] | Clients, repositories, server nodes | By fixed RA | Clusters repository nodes | Certificate revocation by CRLs | Â |
[9] | Administrative nodes, CH nodes, regular nodes | Inter cluster authentication | Directories in administrators & CHs | Secure inter cluster communication | Self-initialization |
[10] | Â | Participating nodes authenticate each other | Â | Â | Nodes requesting certificate perform the whole process |
[11] | Individual nodes, certificate repositories, DCA servers | Used in Inter-cluster communication | One or more certificate repositories | Elliptic curve, CRLs, secure communication between clusters | Â |