Detection and Management of Misbehaving Node in Tactical Ad-Hoc Networks

전술 Ad-hoc 네트워크에서의 비정상행위 노드 탐지 및 관리

  • Published : 2009.06.05

Abstract

Tactical Information Communication Network(TICN) is a concept-type integrated Military Communication system that enables precise command control and decision making by unifying the diversified military communication network and conveying diverse range of battle field information on real-time, at right place at right time. TICN is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network is consist of mobile nodes and nodes in the network depends on the cooperation of other nodes for forwarding of packets. In this context, some non-cooperating nodes may delay forwarding of packets or drop the packets. This may hamper the network as a whole and disrupt communication between the cooperating nodes. To solve this problem, we present a solution with a Node Weight Management Server(NWMS), which manages each node's weight according to its behavior in local area. When the NWMS detects misbehaving node, it increases the node's weight. If the node's weight exceeds a predefined threshold then the NWMS broadcasts the node's information into network to isolate the misbehaving node from the network. These mechanisms show that they are highly effective and can reliably detect a multitude of misbehaving node.

Keywords

References

  1. 합참, 군 전술종합정보통신체계 운영 개념서, 2006
  2. Hao Yang, Haijun Luo, Fan Ye, Songwu Lu and Lixia Zhang, 'Security in Mobile Ad-Hoc Networks : Challenges and Solutions', IEEE Wireless Communications, 2004 https://doi.org/10.1109/MWC.2004.1269716
  3. D. Nguyan, L. Zhao, P. Uiswang and J. Plat, 'Security Routing Analysis for Mobile Ad-hoc Networks' Interdisciplinary Telecommunications Program of Colorado Univ, Spring 2000
  4. Sergio Marti and T. J. Giuli and Kevin Lai and Mary Baker, 'Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks', Mobile Computing and Networking, 2000
  5. Sonja Buchegger and Jean-Yves Le Boudec, 'Performance Analysis of the CONFIDANT Protocol : Cooperation of Nodes - Fairness in Distributed Ad-hoc NeTworks', In Proceedings of IEEE/ACM Workshop on Mobile Ad-Hoc Networking and Computing(MobiHOC), Lausanne, CH, June 2002