Browse > Article
http://dx.doi.org/10.7840/kics.2012.37A.9.772

A Design of TNA(Traceback against Network Attacks) Based on Multihop Clustering using the depth of Tree structure on Ad-hoc Networks  

Kim, Ju-Yung (관동대학교 전자계산공학과)
Lee, Byung-Kwan (관동대학교 컴퓨터학과)
Abstract
In the current MANET, DOS or DDOS attacks are increasing, but as MANET has limited bandwidth, computational resources and battery power, the existing traceback mechanisms can not be applied to it. Therefore, in case of traceback techniques being applied to MANET, the resource of each node must be used efficiently. However, in the traceback techniques applied to an existing ad hoc network, as a cluster head which represents all nodes in the cluster area manages the traceback, the overhead of the cluster head shortens each node's life. In addition, in case of multi-hop clustering, as one Cluster head manages more node than one, its problem is getting even worse. This paper proposes TNA(Traceback against Network Attacks) based on multihop clustering using the depth of tree structure in order to reduce the overhead of distributed information management.
Keywords
TNA; Multihop Clustering; MANET; Cluster head; Marking_ID; Marking table;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Y. Huang and W. Leem "A Cooperative Intrusion Detection System for Ad Hoc Networks." Pro. of the ACM Workshop on Security in Ad hoc and Sensor Networks. Fairfax, VA. USA. 2003.
2 MAINAK CHATTETJEE, SAJAL K. DAS and DAMLA TURGUT, "WCA: A Weighted Clustering Algorithm for Mobile AD Hoc Networks", Cluster Computing 5, pp.193-204, 2002   DOI   ScienceOn
3 Sung-Gook Lim, Hun-je Yeon, JaiYong Lee "Adaptive Clusterhead Positioning for Muti-hop Ad-hoc Networks" JCCI 2006
4 Y Kim, A Helmy, "Attacker Tracevack With Cross-layer Monitoring in Wireless Multi-hop Networks." SASN, Oct. 2006
5 I1 yong Kim, Ki Chang Kim, "A Resource-efficient IP Traceback Technique for Mobile Ad-hoc Networks Based on Time-tagged Bloom Filter." ICCIT. Nov. 2008
6 yatagai, Iwao sasase, m_ishii, "Hierarchical traceback method using clustering for mobile ad hoc networks", PIMRC IEEE. PP. 2623-2627, 2009
7 Yongjin Kim, Ahmed Helmy, "SWAT : Small World-based Attacker Traceback in ad-hoc Networks." MOBIQUITOUS, Jul. 2005
8 yi-sn husng, wenke Lee. "hotspot-Based for Mobile Ad-hoc Networks," ACM Pro. of the 4th ACM workshop on wireleess security. pp. 43-54. Sept. 2005
9 Geun-Bin Hong, Ji-hun Yun, Kwan-Woong Kim, "Study of the Wireless Ad-hoc Networks with Robust Route Maintenance Scheme." KIIECT vol.3, no.2, pp.46-49, Jun. 2010.
10 In-ho Yeo, Hyo-sik Yang, Jong-Myung Rhee "Impacts of Radio Propagation Model on Mobile Ad-hoc Network (MANET) Performance in Group Mobility Environments" KIIECT vol.3, no.3, pp.62-72, Sep. 2010.