A Study for Detection Accuracy Improvement of Malicious Nodes on MANET

MANET에서의 의심노드 탐지 정확도 향상을 위한 기법 연구

  • 양환석 (중부대학교 정보보호학과)
  • Received : 2013.11.08
  • Accepted : 2013.11.20
  • Published : 2013.12.30

Abstract

MANET has an advantage that can build a network quickly and easily in difficult environment to build network. In particular, routing protocol that uses in existing mobile environment cannot be applied literally because it consists of only mobile node. Thus, routing protocol considering this characteristic is necessary. Malicious nodes do extensive damage to the whole network because each mobile node has to act as a router. In this paper, we propose technique that can detect accurately the suspected node which causes severely damage to the performance of the network. The proposed technique divides the whole network to zone of constant size and is performed simultaneously detection technique based zone and detection technique by collaboration between nodes. Detection based zone translates the information when member node finishes packet reception or transmission to master node managing zone and detects using this. The collaborative detection technique uses the information of zone table managing in master node which manages each zone. The proposed technique can reduce errors by performing detection which is a reflection of whole traffic of network.

Keywords

References

  1. A. Urpi, M. Bonuccelli, and S. Giordano, "Modelling cooperation in mobile ad hoc networks: a formal description of selfishness," in WiOpt''03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, March 2003, INRIA Sophia-Antipolis, France, 2003.
  2. G. F. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas, "Cooperation enforcement schemes for MANETs: a survey," Wireless Communications and Mobile Computing, Vol. 6, No. 3, 2006, pp. 319-332. https://doi.org/10.1002/wcm.398
  3. 왕종수, 서두옥, "극단적인 네트워크 환경을 위한 효율적인 라우팅 알고리즘," 디지털산업정보학회지, 제8권, 제1호, 2012, pp. 47-53.
  4. I. Khalil, "Liteworp: A lightweight countermeasure for the wormhole attack in multihop wireless networks," in DSN ''05: Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN''05), 2005, pp . 612-621.
  5. 양환석, 양정모, "MANET에서 효율적 역추적을 위한 경로관리에 관한 연구," 디지털산업정보학회지, 제7권, 제4호, 2011, pp. 31-37.
  6. J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis & defenses," Proceedings of the third international symposium on Information processing in sensor networks. New York, NY, USA: ACM Press, 2004, pp. 259-268.
  7. I. M. Atakli, H. Hu, Y. Chen, W. -S. Ku and Z. Su, "Mali-cious Node Detection in Wireless Sensor Networks Using Weighted Trust Evaluation," Proceedings of Spring Simulation Multiconference, Ottawa, 14-17 April 2008, pp. 836-843.
  8. C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attack and Countermeasures," Journal of Ad Hoc Networks, Vol. 1, No. 2, 2003, pp. 293-315. https://doi.org/10.1016/S1570-8705(03)00008-8
  9. L. Ju, H. Li, Y. Liu, W. Xue, K. Li and Z. Chi, "An Improved Intrusion Detection Scheme Based on Weighted Trust Evaluation for Wireless Sensor Networks," Proceedings of the 5th International Conference on Ubiquitous Information Technology and Applications (CUTE), Sanya, 16-18 December 2010, pp. 1-6.