Browse > Article
http://dx.doi.org/10.6109/jkiice.2008.12.12.2293

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network  

Lee, Jae-Hyun (단국대학교 전자계산학과)
Kim, Jin-Hee (단국대학교 전자계산학과)
Kwon, Kyung-Hee (단국대학교 전자계산학과)
Abstract
In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.
Keywords
AODV; AODV Sorority; Ad hoc Network; Sensor Network; Ubiquitous;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 S. j. Lee, B.h. Han, and M.h, Shin, "Robust routing in wireless ad hoc networks," in proc. ICCP2002, vol. 6, pp. 73-78, Aug. 2002
2 K. Sanziri, B. Dahill, B. N. Levine, and E. M. B. Royer, "A secure routing protocol for ad hoc networks," in proc. ICNP2002, vol. 10, no. 10, pp. 78-87, November. 2002
3 Hu, Y. -C., Johnson, D. B. and Perrig, A, "Sead: Secure efficient distance vector routing in mobile wireless Ad Hoc networks", Proc. of Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02), pp. 3 -13 , 2002
4 K. Sanzgiri et al, "A Secure Routing Protocol for Ad Hoc Networks", ICNP IEEE Press, 2002
5 M. G. Zapata and N. Asokan, "Security ad hoc routing protocols," ACM Wise2002, vol.10, no.1 , pp.1-10, Sept. 2002
6 Larry L.Peterson, Bruce S. Davie, Compuer Networks "Computer Networks : A Systems Approach", Morgan Kaufmann, 1999
7 http://www.ietf.org/rfc/rfc3561.txt
8 김한식, 박현희, 강병석, 백상헌, 강철희, "모바일 애드혹 네트워크에서 안전한 라우팅을 위한 경로 조사 기법",한국통신학회 '07 하계 학술 발표 논문집, 2007.7
9 이명진, 김미희, 채기준, 김호원, "센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석", 정보처리학회 논문지 C 제14-C권 제 3호, pp 0229 - 0238, 2007,6   과학기술학회마을   DOI
10 서현곤, 김기형, "애드 혹 네트워크 네트워크에서 AODV 에 기반한 효율적인 경로 복구 기법", KNOM Review 제6권 제1호, pp1-8, 2003.6.
11 김종천, 김영용, "AD Hoc 통신망 프로토콜 개발동향", Telecommunications Reviw, vol.12, no. 3, 2002