DOI QR코드

DOI QR Code

A Study on Response Technique of Routing Attack under Wireless Ad Hoc Network. Environment

Wireless Ad Hoc Network환경에서의 라우팅 공격 대응 기법에 관한 연구

  • 양환석 (중부대학교 정보보호학과)
  • Received : 2014.02.11
  • Accepted : 2014.03.04
  • Published : 2014.03.30

Abstract

The utilization of Wireless Ad Hoc Network which can build easily network using wireless device in difficult situation to build network is very good. However, it has security threat element because it transfers data by only forwarding of wireless devices. The measures against this should be prepared because damage by especially routing attack can affect the entire network. It is hard to distinguish malicious node and normal node among nodes composing network and it is not easy also to detect routing attack and respond to this. In this paper, we propose new method which detect routing attack and can respond to this. The amount of traffic in all nodes is measured periodically to judge the presence or absence of attack node on the path set. The technique that hides inspection packet to suspected node and transmits is used in order to detect accurately attack node in the path occurred attack. The experiment is performed by comparing SRAODA and SEAODV technique to evaluate performance of the proposed technique and the excellent performance can be confirmed.

Keywords

References

  1. V. Balakrishnan, V. Varadharajan, U. K. Tupakula, "Fellowship: Defense Against Flooding And Packet Drop Attacks In MANET," Network Operations and Management Symposium, NOMS 2006, 2006, pp. 1-4.
  2. P. Yi, Z. Dai, S. Zhang, Y. Zhong., "A New Routing Attack In Mobile Ad Hoc Networks," International Journal of Information Technology, vol. 11, no. 2, 2005, pp. 83-94.
  3. 이종욱, 박찬길, "네트워크 보안을 위한 강력한 문자열 매칭 알고리즘," 디지털산업정보학회지, 제9권, 제4호, 2013, pp. 135-141.
  4. Y. C. Hu, D. B. Johnson and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks," Proceedings of 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, June 2002, pp. 3-13.
  5. Y. Sun, Z. Han and K. J. R. Liu, "Defense of trust management vulnerabilities in distributed networks," IEEE Communications Magazine, vol. 46, issue 2, February 2008, pp. 112-119.
  6. 왕종수, 서두옥, "극단적인 네트워크 환경을 위한 효율적인 라우팅 알고리즘," 디지털산업정보학회지, 제8권, 제1호, 2012, pp. 47-53.
  7. X. Su, R. V. Boppana, "On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks," IEEE International Conference on Communications, ICC '07, June 2007, pp. 1136-1141.
  8. L. Zhou and Z. J. Haas, "Securing Ad hoc Networks," IEEE Network Magazine, vol. 6, no. 13, 1999, pp. 24-30.
  9. X. Lin, R. Lu, H. Zhu, P. H. Ho, X. Shen and Z. Cao, "ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks," IEEE International Conference on Communications, ICC '07, June 2007, pp. 1247-1253.
  10. B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour, "A Survey Of Routing Attacks In Mobile Ad Hoc Networks," IEEE Wireless Communications, vol. 14, issue 5, October 2007, pp. 85-91. https://doi.org/10.1109/MWC.2007.4396947
  11. S. Lee, B. Han, and M. Shin, "Robust Routing in Wireless Ad Hoc Networks," 2002 International. Conference on Parallel Processing Workshop, Vancouver, Canada, August 2002, pp. 73-78.