Browse > Article
http://dx.doi.org/10.9708/jksci.2013.18.3.035

Collaboration Model Design to Improve Malicious Node Detection Rate in MANET  

Shin, Eon-Seok (육군본부)
Jeon, Seo-In (육군본부)
Park, Gun-Woo (육군본부)
Ryu, Keun-Ho (충북대학교 전자정보대학)
Abstract
MANET has a weak point because it allows access from not only legal nodes but also illegal nodes. Most of the MANET researches had been focused on attack on routing path or packet forwarding. Nevertheless, there are insuffcient studies on a comprehensive approach to detect various attacks on malicious nodes at packet forwarding processes. In this paper, we propose a technique, named DTecBC (detection technique of malicious node behaviors based on collaboration), which can handle more effciently various types of malicious node attacks on MANET environment. The DTecBC is designed to detect malicious nodes by communication between neighboring nodes, and manage malicious nodes using a maintain table. OPNET tool was used to compare with Watchdog, CONFIDANT, SRRPPnT for verifying effectiveness of our approach. As a result, DTecBC detects various behaviors of malicious nodes more effectively than other techniques.
Keywords
MANET; Malicious Node; Malicious Behavior Pattern; Trust Level; Secure Routing;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 D.Elma, G., Nils, A., Pete, M. and Jens, T., "Detecting black hole attacks in tactical MANET using topology graphs", In Proceedings of the 32nd IEEE conference on local compute networks, pp.1043-1052, 2007.
2 Hong, D., "Routing Security in ad hoc Networks", IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks, Vol.40, No.10, pp.70-75, 2
3 Jinsub, K., Dan, S., Rommie, H., Roshan, K. and Lang, T., "Timing-based localization of in-band wormhole tunnels in MANETs", In Proceedings of the 3rd ACM conference on Wireless network security, pp.1-12, 2010.
4 Yang, H., Luo, H., Ye, F. and Zhang, L., "Security in Mobile ad hoc Networks : Challenges and Solutions", IEEE Wireless Communications, Vol.11, Issue.1, pp.38-47, 2004.
5 Zapata, M. G. and Asokan, N., "Securing ad hoc routing protocols", In Proceedings of the 1st ACM workshop on Wireless security. pp.1-10, 2002.
6 Abdul, H. A. and Zuriati, A. Z.,"Performance Comparison of AODV, DSDV and I-DSDV Routing Protocols in Mobile ad hoc Networks", European Journal of Scientific Research, Vol.31, No.4, pp.566-576, 2009.
7 Usop, N. S., Abdullah, A. and Abidin, A. F., "Performance Evaluation of AODV, DSDV & DSR Routing Protocol in Grid Environment", IJCSNS International Journal of Computer Science and Network Security, Vol.9, No.7, pp.261-268, 2009.
8 Hwang Y. C., Kim J. I. and Kim, J. S, "Malicious Node Detection Mechanism of Consideration Compromised Node in MANET", KIIT, Vol.7, No.5, pp.113-124, 2009.
9 Park, S. S., Park, G. W., Ryu, K. H, and Lee, S. H, "A Secure Routing Protocol in MANET based on Malicious behavior Pattern of Node and Trust Level", KSCI, Vol.14, No.5, pp.103-117, 2009.   과학기술학회마을