Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


August Edition 2020

International Journal of Applied Information Systems solicits high quality original research papers for the August 2020 Edition of the journal. The last date of research paper submission is July 15, 2020.

Distributed Certificate Management in Mobile Ad Hoc Networks

Mohammad Masdari, Javad Pashaee Barbin Published in Wireless

International Journal of Applied Information Systems
Year of Publication 2012
© 2010 by IJAIS Journal
Download full text
  1. Mohammad Masdari and Javad Pashaee Barbin. Article: Distributed Certificate Management in Mobile Ad Hoc Networks. International Journal of Applied Information Systems 1(1):33-40, November 2012. BibTeX

    	author = "Mohammad Masdari and Javad Pashaee Barbin",
    	title = "Article: Distributed Certificate Management in Mobile Ad Hoc Networks",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 1,
    	number = 1,
    	pages = "33-40",
    	month = "November",
    	note = "Published by Foundation of Computer Science, New York, USA"


PKI or public key infrastructure is used many security solutions that are designed for mobile ad hoc networks. These networks have special features that distinguish them from other wired and conventional networks and centralized Certificate Authorities cannot be used for certificate management in these kinds of networks. Thus many efforts have been made to adapt Certificate Authority's (CA) tasks to the dynamic environments of MANETs and distribute the tasks of CA among MANET nodes. In this paper, we study various Certificate management solutions that are proposed in the literature and analyze their advantages and limitations. In addition, we emphasis on certificate revocation and validation issues and compare the overheads of these operations. Finally, we propose the characteristics of an ideal DCA system that can be used to verify the completeness of any DCA Scheme.


  1. L. Zhou, F. B. Schneider, R. V. Renesse, "Coca:a secure distributed online certification authority", Journal ACM Transactions on Computer Systems (TOCS), Volume 20 Issue 4, November 2002, PP. 329-368.
  2. Y. Dong, A. F. Sui, S. M. Yiu, V. O. K. Li, L. C. K. Hui, "Providing distributed certificate authority service in cluster-based mobile ad hoc networks", Computer Communications, 2007, pp. 2442–2452.
  3. D. Dhillon, T. S. Randhawa, M. Wang, L. Lamont, "Implementing a fully distributed certificate authority in an OLSR MANET ", IEEE Wireless Communications and Networking Conference, 2004, pp. 682-688.
  4. G. Chaddoud, K. Martin, "Distributed certificate authority in cluster-based ad hoc networks", 2006, Wireless Communications and Networking Conference, Vol. 2, pp. 682-688.
  5. W. Rao, S. H. Xie, "Merging clustering scheme in distributed certificate authority for ad hoc network", IET International Conference on Wireless, Mobile and Multimedia Networks, 2006, pp. 1-4.
  6. M. E. Elhdhili, L. B. Azzouz, F. Kamoun, "A totally distributed cluster based key management model for ad hoc networks".
  7. D. Y. Lee, H. C. Jeong, "An efficient certificate management for mobile ad-hoc network", Lecture Notes in Computer Science, 2006, Volume 4104, 355-364.
  8. C. Zouridaki, B. L. Mark, K. Gaj, R. K. Thomas, "Distributed ca-based PKI for mobile ad hoc networks using elliptic curve cryptography", First European PKI Workshop: Research and Applications, PP. 232-245.
  9. P. Xia, M. Wu, K. Wang,X. Chen, "Identity-based Fully Distributed Certificate Authority in an OLSR MANET", 2008, 4th International Conference on Wireless Communications, Networking and Mobile Computing, PP. 1-4.
  10. S. Yi, R. Kravets, "MOCA:Mobile Certificate Authority for Wireless Ad Hoc Networks", 2nd Annual PKI Research Workshop Program, 2004.
  11. J. Sen, M. G. Chandra, P. Balamuralidhar, Harihara S. G, H. Reddy, "A scheme of certificate authority for ad hoc networks", 2007, 18th International Workshop on Database and Expert Systems Applications, PP. 615-619.
  12. M. Ge, K. Lam, "Self-initialized distributed certificate authority for mobile ad hoc network", Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance, 2009, PP. 392–401.
  13. J. Kang, D. Nyang, A. Mohaisen, Y. G. Choi, "Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network", 2007, international conference on Computational science and its applications, PP. 886–899.
  14. F. C. Pereira, J. D. Silva fraga, R. F. Cust´odio, "Self-adaptable and intrusion tolerant certificate authority for mobile ad hoc networks", 2008, 22nd International Conference on Advanced Information Networking and Applications, PP. 705-712.
  15. D. Joshi, K. Namuduri, R. Pendse, "Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis", 2005, Journal EURASIP Journal on Wireless Communications and Networking, PP. 579–589.
  16. J. Luo, J. P. Hubaux, P. T. Eugster, "Dictate: distributed certification authority with probabilistic freshness for ad hoc networks", 2005, IEEE Transactions on Dependable and Secure Computing, PP. 311-323.
  17. H. Zhou, M. W. Mutka, L. M. Ni, "Multiple-key cryptography-based distributed certificate authority in mobile ad-hoc networks, 2005, Global Telecommunications Conference, PP 5.
  18. A. Rajaram, S. Palaniswami, "High Performance Certificate Authority Scheme in Manet", 2010, International Journal of Computer and Network Security, PP. 106.
  19. S. Raghani, D. Toshniwal, R. Joshi, "Dynamic Support for Distributed Certification Authority in Mobile Ad Hoc Networks", 2006,"International Conference on Hybrid Information Technology", PP. 424-432.
  20. W. E. Anderson, J. T. Michalski, B. P. V. Leeuwen, "Enhancements for Distributed Certificate Authority approaches for Mobile Wireless Ad Hoc Networks".
  21. M. Masdari , M. Maleknasab, M. Bidaki, A survey and taxonomy of name systems in mobile ad hoc networks, Journal of Network and Computer Applications, 2011.


Security, Distributed Certificate Authority, Threshold cryptography, Digital Signature