DOI QR코드

DOI QR Code

협력기반 인증 기법을 통한 라우팅 성능 개선에 관한 연구

A Study on Routing Performance Improvement through Cooperation Authentication Technique

  • 양환석 (중부대학교 정보보호학과)
  • 투고 : 2016.02.21
  • 심사 : 2016.03.15
  • 발행 : 2016.03.30

초록

The main security threats in MANET are integrity and non-repudiation. In the meantime, a lot of secure routing protocols have been designed in order to block these security threats. In this paper, partnership-based authentication technique is proposed in order to provide participation exclusion of network and non-repudiation for the nodes. The proposed technique is a technique that participates in data communication for only the nodes receiving the authentication through the authentication process for the nodes. For this, the proposed technique is largely consists of two steps. The first step is the process that issued the certificate after the reliability for the nodes participating in the network is evaluated. And in the second step, the key exchange agreement with the neighbor nodes is performed and data communication is made after setting security path with responding nodes. The level of security in data transmission is improved because the process of path setting is performed through cooperation with a neighboring nodes having high reliability during the course of these two steps. The superiority of proposed technique in this paper was confirmed through the comparative experiment.

키워드

참고문헌

  1. J. Sen, "Robust and Efficient Node Authentication Protocol for Mobile Ad Hoc Networks," Second International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), 2010, pp. 476-481.
  2. J. Sen, P. R. Chowdhury, I. Sengupta, "A distributed trust establishment scheme for mobile ad hoc networks," in Proceedings of the International Conference on Computing: Theory and Applications, 2007, pp. 51-58.
  3. K. Naik (Joshi), A. Dixit, "Resource Aware Node Authentication Framework for Secure MANET," IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 16, 2014, pp. 109-113.
  4. 왕종수, 서두옥, "Sparse M2M 환경을 위한 DTMNs 라우팅 프로토콜," 디지털산업정보학회지, 제10권, 제4호, 2014, pp. 11-18.
  5. M. K. Rafsanjani, A. Movaghar, "Identifying Monitoring Nodes with Selection of Authorized Nodes in Mobile Ad Hoc Networks," World Applied Sciences Journal, Vol. 4, No. 3, 2008, pp. 444-449.
  6. Kush, A., Hwang, C., Gupta, P., "Secured Routing Scheme for Adhoc Networks," International Journal of Computer Theory and Engineering (IJCTE) 3, Vol. 60, No. 1, 2013, pp. 1089-1098.
  7. P. Singh, M. Chandra Pandey, "Evaluation of certificate-based authentication in Mobile Ad-hoc networks," International Conference on Recent Trends in Engineering and Technology, 2012.
  8. 왕종수, 서두옥, "극단적인 네트워크 환경을 위한 효율적인 라우팅 알고리즘," 디지털산업정보학회지, 제8권, 제1호, 2012, pp. 47-53.
  9. Gomathi, S., Duraiswamy, K., "Guaranteed Packet Transfer in MANET", In and Out of Coverage Areas and Energy Saving Using Random Casting (IJCSE) International Journal on Computer Science and Engineering 02(03), 2010, pp. 865-869.
  10. J. Sen, P. R. Chowdhury, and I. Sengupta, "A distributed trust establishment scheme for mobile ad hoc networks," in Proceedings of the International Conference on Computing: Theory and Applications, 2007, pp. 51-58.
  11. M. Cagalj, S. Capkun, and J. P. Hubaux, "Key Agreement in Peer-to-Peer Wireless Networks," Proceedings of IEEE, Special Issue on Security and Cryptography, Vol. 94, No. 2, 2006, pp. 467-478.

피인용 문헌

  1. 실시간 분산 시스템에서 heartbeat 시그널을 이용한 장애 검출 vol.14, pp.3, 2018, https://doi.org/10.17662/ksdim.2018.14.3.039