Browse > Article

Routing Attack Detection for Performance Enhancement of AODV Protocol In Mobile Ad Hoc Networks  

Lee, Jae-Young (중부대학교)
Choi, Seung-Kwon (충북대학교 전기전자컴퓨터공학부)
Lee, Byong-Rok (중부대학교)
Kim, Sun-Chul (중부대학교)
Sin, Byoung-Gon (중부대학교)
Cho, Yong-Hwan (중부대학교)
Abstract
Since the mobile node acts as the router, the Mobile Ad Hoc network requires the security methods that are different from that of network of the wire environment. Also, since the total network can't be included in the transmission area of the mobile node, when one node sends the message to the other node, we need the middle node. But if the middle node is the unreliable malicious node, we can't guarantee the secure message transmission. Also, because all nodes configuring the network are the mobile nodes, they use the restricted battery capacity and the restricted resources. Therefore, because we have trouble performing the encryption that many resources are required when we sending the message, it is vulnerable to the security than the network of the wire environment. Last, because the network topology continues to change by the mobility of nodes configuring the network, we need the security measure that matches the network characteristics. We suggest the routing attack detection for performance enhancement of AODV protocol in Mobile Ad Hoc networks.
Keywords
MANET; AODV; Detection; DSR; DSDV;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. E. Perkins, 'Ad hoc Networking', Addsion-Wesley Publishing Company, 2000
2 P. Papadimitratos and Z.J.Haas, 'Secure Routing for Mobile Ad Hoc Networks,' SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January. p27-31. 2002
3 Songwu Lu, and Lixia Zhang, 'Security in Mobile Ad Hoc Network : Challenges and Solutions.', IEEE Wireless Communications, 2004
4 배재호(2004), MANET에서 악의적인 노드의 효율적인 검출 방안, 연세대학교 대학원, 공학석사학위논문
5 C. K. Toh, 'Ad-hoc Mobile Wireless Networks: Protocols and System', Prentice Hall PTR, 2002
6 S. Marti and T. J. Giuli and K. Lai and M. Baker, 'Mitigating routing misbehavior in mobile ad hoc network', Mobile Computing and Networking, pp15-22, Vol. 2, No 4. 2000
7 이정은, '이동 Ad Hoc 환경에서 AODV 기반의 분기 노드를 이용한 대체 경로 라우팅 기법', 경희대 대학원 이학석사학위논문. 2004
8 Sonja Buchegger and Jean-Yues Le Boudec (2002), 'Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Distributed Ad-hoc Networks', In roceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobilHOC), Lausaanne, CH, pp.10-15, Vol 5, No. 4. June
9 E. M. Royer, C-K Toh, 'A Rewiew Routing Protocols for Ad-Hoc Mobile Wireless Network.' IEEE Personal Communication 6(2). 1999
10 L. Buttyan and J. P. Hubaux(2001), 'Stimulation Cooperation in Self-Organizing Mobile Ad Hoc Networks.' Technical Report No. DSC/2001/046, Swiss Federal Institute of Technology, Lausanne, Auguest
11 L. Buttyan and J. P. Hubaux, 'Report on a Working Session on Security in Wireless Ad Hoc Networks' Mobile Computing and Communications Review, Vol. 6, No. 4. 2002
12 P. Michiardi, R. Molva (2002), 'Core: A COllaborative REputation Mechanism to enforce node cooperation in Mobile Ad Hoc Networks.' in Communication and Multimedia Security 2002 Conference
13 Lidong Zhou, Zygmunt J. Haas, 'Securing Ad Hoc Network'. IEEE Network, Special Issue on Network Security, November/Decenber, 1999