DOI QR코드

DOI QR Code

A Study on Secure Routing using Secure Zone and Nodes Authentication in Wireless Ad Hoc Network

Wireless Ad Hoc Network에서 보안 영역과 노드 인증을 이용한 보안 라우팅 기법에 관한 연구

  • 양환석 (중부대학교 정보보호학과)
  • Received : 2014.08.12
  • Accepted : 2014.08.21
  • Published : 2014.09.30

Abstract

Wireless Ad Hoc Network is suitable for emergency situations such as and emergency, disaster recovery and war. That is, it has a characteristic that can build a network and use without help of any infrastructure. However, this characteristic is providing a cause of many security threats. In particular, routing attack is not applied the existing routing methods as it is and it is difficult to determine accurately whether nodes that participate in routing is malicious or not. The appropriate measure for this is necessary. In this paper, we propose a secure routing technique through a zone architecture-based node authentication in order to provide efficient routing between nodes. ZH node is elected for trust evaluation of the member nodes within each zone. The elected ZH node issues a certification of the member nodes and stores the information in ZMTT. The routing involvement of malicious nodes is blocked by limiting the transfer of data in the nodes which are not issued the certification. The superior performance of the proposed technique is confirmed through experiments.

Keywords

References

  1. P Narayan, V R. Syrotiuk, "valuation of the AODV and DSR Routing Protocols Using the MERIT Tool," In proceeding or ADHOC-NOW 2004, pp. 25-36.
  2. Law, Y. W., Palaniswami, M., Hoesel, L. V., Doumen, J., Hartel, P. Havinga, P., "Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols," ACM Trans. Sens. Netw., 2009, Vol. 5, No. 1, pp. 1-38.
  3. 서두옥, 이동호, "DTMNs를 위한 방향성 정보와 최대 공동 이웃 노드에 기반한 효율적인 라우팅 프로토콜," 디지털산업정보학회지, 제6권, 제1호, 2010, pp.83-90.
  4. Seyed Amin Hosseini Seno, Rahmat Budiarto and Tat-Chee Wan, "SHSDAP: Secure Hierarchical Service Discovery and Advertisement Protocol in Cluster Based Mobile Ad hoc Network," World Applied Sciences Journal, 2009, Vol. 7, pp. 115-128.
  5. Jigar Doshi, Prahlad Kilambi, "AFAR:An Adaptive Bandwidth-Efficient Routing Protocol for Mobile Ad Hoc Networks," Proceeding of ADHOC-NOW 2003, springer 2003, pp. 12-24.
  6. 양환석, "MANET에서 노드들의 신뢰 검증 향상을 위한 3-tiers 인증 기법 연구," 디지털산업정보학회지, 제9권, 제1호, 2013, pp.87-93.
  7. Yan L. Sun, Wei Yu, "nformation Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks," IEEE 2006, pp. 305-317.
  8. Rajiv k. Nekkanti, Chung-wei Lee, "Trust Based Adaptive On Demand Ad Hoc Routing Protocol," ACMSE '4, April 2-3, 2004, ACM 2004, pp.88-93.
  9. Ritu Sharma, Yogesh Chaba, Yudhvir Singh, "Analysis of Security Protocols in Wireless Sensor Network," International Journal Advanced Networking and Applications, 2010, Vol.02, Issue: 03, pp. 707-713.
  10. L. Abusalah, A. Khokhar, "TARP : Trust-Aware Routing Protocol," IWCMC'6, July 3-6, 2006, ACM 2006, pp. 135-140.
  11. K. Sanzgiri et al., "A Secure Routing Protocol for Ad Hoc Networks," Proc. 10th IEEE Int'l Conf. Network Protocols (ICNP '02), IEEE Press, 2002, pp. 78-87.
  12. Y. -C. Hu, D. B. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks," Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 02), IEEE Press, 2002, pp. 3-13.