DOI QR코드

DOI QR Code

A Secure and Efficient Method for Detecting Malicious Nodes in MANET

MANET에서 악의적인 노드의 안전하고 효율적인 검출 방안

  • 이강석 (연세대학교 컴퓨터과학과) ;
  • 최종오 (연세대학교 컴퓨터과학과) ;
  • 지종복 (연세대학교 컴퓨터과학과) ;
  • 송주석 (연세대학교 컴퓨터과학과)
  • Published : 2005.10.01

Abstract

Lately, the MANET research has focused on providing routing services with security and previous schemes have been proposed for detecting malicious nodes in a MANET. However, they still include some problems which malicious nodes cannot be found when they falsely report other nodes as malicious. Accordingly, we propose a novel and efficient scheme for detecting malicious nodes using report messages and a report table which is consisted of node ID both for suspecting and reporting when the malicious nodes behave normally during the route discovery, but the other hand they drop and modify packets, or falsely report other nodes as malicious during the data transmission. Our proposed scheme is applicable to not only DSR but aiso AODV. And we provide some simulation results of our proposed scheme by comparing general AODV with our proposed scheme. Simulation results show that our Proposed scheme outperforms general AODV in terms of average packet loss ratio and packet delivery ratio.

최근 MANET에서의 연구는 보안을 고려한 라우팅 서비스에 주목되어 왔으나 기존에 제시되었던 MANET에서의 악의적인 노드를 식별하는 방안들은 거짓 신고하는 악의적인 노드가 있을 때에는 이를 적절히 식별하고 제거하지 못하는 문제점이 있었다. 따라서 본 논문에서는 신고자와 혐의자 목록으로 구성되는 신고 메시지와 신고 테이블을 이용하여 경로 설정단계에서는 정상적으로 동작하지만 데이터 전달 과정에서는 데이터를 버리거나 내용을 변경시키는 행위, 또는 다른 노드를 거짓으로 신고하는 등의 악의적인 노드를 식별하는 효율적인 방안을 제안한다. 제안하는 방안은 DSR 과 AODV에 모두 적용 가능하다. 또한 성능분석을 위해 AODV와 제안된 알고리즘과 비교 분석하여 제안된 알고리즘이 평균 분실률 및 전송량 측면에서 현격한 성능차이를 있음을 보였다.

Keywords

References

  1. Hao. Yang, Haiyun. Luo, Fan. Ye, Songwu. Lu and Lixia. Zhang, 'Security in mobile Ad Hoc Networks: Challenge and Solution,' IEEE Wireless Communications, Feb. 2004 https://doi.org/10.1109/MWC.2004.1269716
  2. S. Marti et al., 'Mitigating Routing Misbehavior in Mobile Ad Hoc Networks', ACM MOBICOM, 2000 https://doi.org/10.1145/345910.345955
  3. gajin Na et al, 'Secure Mechanism to manage selfish nodes in Ad hoc Network', JCCI, 2004
  4. J.Broch, D.Johnson & D.Maltz, 'The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks', http://ietf.org/internet-drafts/draft-ietf-manet-dsr-09.txt, IETF Internet draft, 15 April, 2003, Work in progress
  5. S.R.Das & C.E.Perkins, 'Ad hoc On-Demand Distance Vector(AODV) Routing for Mobile Ad Hoc networks', http://www.ietf.org/rfc/rfc356l.txt, July, 2003
  6. Y. Hu, A. Perring, and D. Johnson, 'Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks', ACM MOBICOM, 2002
  7. M. Zapata, and N. Asokan, 'Securing Ad Hoc Routing Protocols', ACM WiSe, 2002 https://doi.org/10.1145/570681.570682
  8. Y. Hu, D. Johnson, and A. Perring, 'Sead: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks', IEEE WMCSA, 2002 https://doi.org/10.1109/MCSA.2002.1017480
  9. H. Yang, X. Meng, and S. Lu, 'Self-Organized Network Layer Security in Mobile Ad Hoc Networks', ACM WiSe, 2002 https://doi.org/10.1145/570681.570683
  10. L. Zhou, and Z. Haas, 'Securing Ad Hoc Networks', IEEE Network Magazine, Vol.13, No.6, 1999 https://doi.org/10.1109/65.806983

Cited by

  1. Detection of Malicious Node using Timestamp in USN Adapted Diffie-Hellman Algorithm vol.9, pp.1, 2009, https://doi.org/10.5392/JKCA.2009.9.1.115
  2. Research of Quality Improvement by Factors Analysis Data Quality Problem:Focus on National R&D Information Linking Structure vol.9, pp.1, 2009, https://doi.org/10.5392/JKCA.2009.9.1.001