Browse > Article
http://dx.doi.org/10.9766/KIMST.2011.14.6.1097

An Intrusion Detection Technique Suitable for TICN  

Lee, Yun-Ho (Korea National Defense University)
Lee, Soo-Jin (Korea National Defense University)
Publication Information
Journal of the Korea Institute of Military Science and Technology / v.14, no.6, 2011 , pp. 1097-1106 More about this Journal
Abstract
Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.
Keywords
TICN; Intrusion Detection; Ad-hoc Network; Misbehaving Node; False Accusation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Y. Hu, A. Perring, and D. Johnson, "Ariadne : A Secure On-Demand Routing Protocol for Ad Hoc Network", in Proceedings of ACM MobiCom '02, 2002.
2 G. Zapata, "Secure Ad Hoc On-Demand Distance Vector(SAODV) Routing", in IETF Draft, http://www.ietf.org/internet-draft/draft-guerrero-manet-saodv-00.txt, 2001.
3 K. Sanzgiri, B. Dahill, B. Levine, and E. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks", in Proceedings of IEEE ICNP '02, 2002.
4 F. Kargl, and A. Geiss, "Secure Dynamic Source Routing", in Proceedings of HICSS 38, 2005.
5 Oscar F. Gonzalez, Godwin Ansa, Michael Howarth, and George Pavlou, "Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-hoc Networks", Journal of Internet Engineering, Vol. 2, No. 1, June, 2008.
6 P. Michiardi, and R. Molva, "Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks", European Wireless Conference, 2002.
7 Panagiotis Papadimitratos, and Zygmunt J. Hass, "Secure Routing for Mobile Ad Hoc Networks", in SCS Communication Networks and Distributed Systems Modeling and Simulation Conference(CNDS 2002), San Antonio, TX, Jan. 2002.
8 C. E. Perkins, E. M. Royer, and S. R. Das., "Ad Hoc On-Demand Distance Vector(AODV) Routing", IETF, MANET Working Group, Oct. 1999.
9 Chin-Yang Tseng, Poornima Balasubra-manyam, Calvin Ko, and Karl Levitt, "A Specification-Based Intrusion Detection Model for OLSR", LNCS 3858, pp. 330-350, 2006.
10 Aikaterini Mitrokotsa, Rosa Mavropodi, and Christos Douligeris, "Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks", International Conference on Intelligent Systems and Computing : Theory and Applications, July, 2006.
11 Jaydip Sen, and Kaustav Goswami, "An Algorithm for Detection of Selfish Nodes in Wireless Mesh Networks", in Proceedings of the International Symposium on Intelligent Information Systems and Applications, pp. 571-576, Oct., 2009.
12 Y. Zhang, and W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks," in Mobile Computing and Networking, pp. 275-283, 2000.
13 S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks", in Proceeding of the 6th International Conference on Mobile Computing and Networking, pp. 255-265, Aug. 2000.
14 S. Buchegger, J-Y. L. Boudec, "Nodes Bearing Grudges : Towards Routing Security, Fairness and Robustness in Mobile Ad Hoc Networks", in Euromicro Workshop on Parallel, Distributed amd Network-based Processing, pp. 403-410, Jan. 2002.
15 S. Buchegger, and J. L. Boudec, "Performance Analysis of the CONFIDANT Protocol," in Proceeding of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 226-236, 2002.
16 Jaydip Sen, "A Survey on Reputation and Trust-Based Systems for Wireless Communication Networks", CoRR, 2010.
17 C. K. Toh, C. Lee, and N. A. Ramos, "Next-Generation Tactical Ad Hoc Mobile Wireless Networks", in Technology Review Journal Spring, pp. 103-113, 2002.
18 J. Brand, and G. Hart Wig, "Management of Tactical Ad Hoc Networks with C2 Data Models", Military Communication Conference 2001 IEEE, pp. 915-922, Aug. 2002.