Browse > Article

Security Design for Efficient Detection of Misbehavior Node in MANET  

Hwang, Yoon-Cheol (충주대학교 첨단과학기술대학)
Abstract
On a Mobile Ad hoc NETwork(MANET), it is difficult to detect and prevent misbehaviors nodes existing between end nodes, as communication between remote nodes is made through multiple hop routes due to lack of a fixed networked structure. Therefore, to maintain MANET's performance and security, a technique to identify misbehaving middle nodes and nodes that are compromise by such nodes is required. However, previously proposed techniques assumed that nodes comprising MANET are in a friendly and cooperative relationship, and suggested only methods to identify misbehaving nodes. When these methods are applied to a larger-scale MANET, large overhead is induced. As such, this paper suggests a system model called Secure Cluster-based MANET(SecCBM) to provide secure communication between components aperANET and to ensure eed. As such, this pand managems suapemisbehavior nodes. SecCBM consists apetwo stages. The first is the preventis pstage, whereemisbehavior nodes are identified when rANET is comprised by using a cluster-based hierarchical control structure through dynamic authentication. The second is the post-preventis pstage, whereemisbehavior nodes created during the course apecommunication amongst nodes comprising the network are dh, thed by using FC and MN tables. Through this, MANET's communication safety and efficiency were improved and the proposed method was confirmed to be suitable for MANET through simulation performance evaluation.
Keywords
MANET; Misbehavior Node; Clustering; Dynamic Authentication; Detection; Security;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 황윤철, 이상호, 김진일, "모바일 에드혹 네트워크에서 안정성을 향상 시킨 분산 조합 가중치 클러스터링 알고리즘," 한국컴퓨터정보학회 논문지, 제12권 제1호, pp.33-42, 2007.   과학기술학회마을
2 S. Corson, J. Macker, "Mobile Ad Hoc Networking (MANET)," Internet Draft, IETF, Oct. 1998.
3 M. Gerla, J. T. C. Tsai, "Multicluster, mobile, multimedia radio network," ACM/Baltzer Journal of Wireless Networks 1, 3, pp.225-265, Jul. 1995.
4 황윤철, 김진일, "이동 애드혹 네트워크에서 신뢰성 있는 클러스터기반 동적 인증 기법," 멀티미디어학회 논문지 제11권 5호, pp 661-672. 2008.
5 이근호, 한상법, 서혜숙, 이상근, 황종선, "이동 Ad Hoc 망을 위한 다중 계층 클러스터링 기반의 인증 프로토콜," 한국정보과학회논문지, 제33권 4호, pp.310-323, Apr. 2006.   과학기술학회마을
6 S. Marti, T. J. Giuli, K. Lai, M. Baker, "Mitigating routing misbe havior in mobile Ad Hoc networks," Mobile Computing and Net working, pp.255-265, Aug. 2000.
7 M. Chatterjee, S. K. DAS, "WCA: A Weighted Clustering Algori thm for mobile Ad Hoc Networks," Cluster Computing, Vol.5 No.2, pp. 193-204, Apr., 2002.   DOI   ScienceOn
8 T. Ohta, "An adaptive multihop clustering scheme for highly mo bile Ad Hoc networks," IEEE ISADS 2003, pp.293-300, Apr. 2003.
9 C. Jaikaeo, C. C. Shen, "Adaptive Backbone- Based Multicast for Ad Hoc networks," IEEE ICC2002, pp.3149-3155, May. 2002.
10 B. Awerbuch, D. Holmer, C. N. Rotaru, H. Rubens, "An On-De mand Secure Routing Protocol Resilient to Byzantine Failures," ACM WiSe, pp.21-30, Sep. 2002.
11 나가진, 도인실, 편혜진, 채기준, "애드 혹 네트워크에서의 이기적 노드를 관리하기 위한 보안 메 커니즘," JCCI 04, IV-E-4.1-4, pp.223-223, Apr. 2004.
12 W. Diffie, M. E. Hellman, "New Directions in cryptography," IEEE Transaction on Information Theroy, Vol.IT-22, No.6, pp.644-654, Nov. 1976.
13 M. Zapata, N. Asokan, "Securing Ad Hoc Routing Protocols," ACM WiSe, pp.1-10, Sep. 2002.
14 R. Bagrodia, R. Meyer, M. Takai, Y. hen, X. Zeng, J. Martin, b. Park, H. Song, "PARSEC: A Parallel Simulation Environment for Complex System," Computer Magazine, Vol.31, 10, pp. 77-85, Oct. 1998.   DOI   ScienceOn
15 R. L. Rivest, "The RC5 encryption algorithm," in: Bart Preneel (ED), Fast Software Encryption, Springer, pp.86-96, Mar. 1995.
16 L. B. Oliveira, Hao Cho Wang, A. A Loureiro, "LHA-SP:secure pr otocols for hierarchical wireless sensor networks," in 9th IFIP/IE EE International Symposium on Integrate Network Management, pp.31-44, May. 2005.
17 A. K. Parekh, "Selecting routers in ad-hoc wireless networks," Proc. of ITS, pp. 420-424, Aug. 1994.
18 C. C. Shen, "CLTC: A Cluster-Based Topology Control Frame w ork for Ad Hoc Networks," IEEE Tran. on Mobile Computing, Vol3, No. 1, pp.18-32, Jan. 2004.   DOI   ScienceOn
19 C. E. Perkins, Ad Hoc Networking, Addison Wesley, 2000.
20 S. Basagni, "Distributed Clustering for Ad Hoc Networks," Proc. of International Symposium on Parallel Architectures, Algorithms and Networks, pp.310-315, Jun. 1999.