DOI QR코드

DOI QR Code

An Intrusion Detection Technique Suitable for TICN

전술정보통신체계(TICN)에 적합한 침입탐지 기법

  • Received : 2011.05.17
  • Accepted : 2011.11.25
  • Published : 2011.12.05

Abstract

Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.

Keywords

References

  1. P. Michiardi, and R. Molva, "Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks", European Wireless Conference, 2002.
  2. Panagiotis Papadimitratos, and Zygmunt J. Hass, "Secure Routing for Mobile Ad Hoc Networks", in SCS Communication Networks and Distributed Systems Modeling and Simulation Conference(CNDS 2002), San Antonio, TX, Jan. 2002.
  3. Y. Hu, A. Perring, and D. Johnson, "Ariadne : A Secure On-Demand Routing Protocol for Ad Hoc Network", in Proceedings of ACM MobiCom '02, 2002.
  4. G. Zapata, "Secure Ad Hoc On-Demand Distance Vector(SAODV) Routing", in IETF Draft, http://www.ietf.org/internet-draft/draft-guerrero-manet-saodv-00.txt, 2001.
  5. K. Sanzgiri, B. Dahill, B. Levine, and E. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks", in Proceedings of IEEE ICNP '02, 2002.
  6. F. Kargl, and A. Geiss, "Secure Dynamic Source Routing", in Proceedings of HICSS 38, 2005.
  7. Jaydip Sen, "A Survey on Reputation and Trust-Based Systems for Wireless Communication Networks", CoRR, 2010.
  8. C. K. Toh, C. Lee, and N. A. Ramos, "Next-Generation Tactical Ad Hoc Mobile Wireless Networks", in Technology Review Journal Spring, pp. 103-113, 2002.
  9. J. Brand, and G. Hart Wig, "Management of Tactical Ad Hoc Networks with C2 Data Models", Military Communication Conference 2001 IEEE, pp. 915-922, Aug. 2002.
  10. Y. Zhang, and W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks," in Mobile Computing and Networking, pp. 275-283, 2000.
  11. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks", in Proceeding of the 6th International Conference on Mobile Computing and Networking, pp. 255-265, Aug. 2000.
  12. S. Buchegger, J-Y. L. Boudec, "Nodes Bearing Grudges : Towards Routing Security, Fairness and Robustness in Mobile Ad Hoc Networks", in Euromicro Workshop on Parallel, Distributed amd Network-based Processing, pp. 403-410, Jan. 2002.
  13. S. Buchegger, and J. L. Boudec, "Performance Analysis of the CONFIDANT Protocol," in Proceeding of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 226-236, 2002.
  14. Chin-Yang Tseng, Poornima Balasubra-manyam, Calvin Ko, and Karl Levitt, "A Specification-Based Intrusion Detection Model for OLSR", LNCS 3858, pp. 330-350, 2006.
  15. Aikaterini Mitrokotsa, Rosa Mavropodi, and Christos Douligeris, "Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks", International Conference on Intelligent Systems and Computing : Theory and Applications, July, 2006.
  16. Oscar F. Gonzalez, Godwin Ansa, Michael Howarth, and George Pavlou, "Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-hoc Networks", Journal of Internet Engineering, Vol. 2, No. 1, June, 2008.
  17. Jaydip Sen, and Kaustav Goswami, "An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks", in Proceedings of the International Symposium on Intelligent Information Systems and Applications, pp. 571-576, Oct., 2009.
  18. C. E. Perkins, E. M. Royer, and S. R. Das., "Ad Hoc On-Demand Distance Vector(AODV) Routing", IETF, MANET Working Group, Oct. 1999.