Skip to main content

Table 5 Properties of routing based DCA schemes

From: A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

Ref #

Routing Protocols

Optimization

Security

Other capabilities

[5]

OLSR

Use TC and Hello messages

Encryption and digital signatures to protect TC & Hello messages

Choosing DCA server nodes based on hop counts

[12]

OLSR

Use TC and Hello messages

Identity-based encryption

Reduce communication overhead

[7]

Reactive routing protocols

MP or MOCA Certification protocol, B-unicast to replace flooding

Utilize route cache information, creating reverse path in CREQ forwarding

 

[13]

Reactive routing protocols

Piggybacking of CREQ & CREP on the routing packets

CRLs maintenance and deployment

Handle network partitioning