Browse > Article
http://dx.doi.org/10.13089/JKIISC.2009.19.5.71

An Efficient Detection and Management Technique of Misbehavior nodes in Ad-hoc Networks  

Lee, Yun-Ho (Korea National Defense University)
Lee, Soo-Jin (Korea National Defense University)
Abstract
Ad-hoc network consists f mobile nodes, which they are together in the communication. However, if some misbehaving nodes are in network, it is faced to many threats. Therefore, detection and management of misbehaving node are necessary to make confident in Ad-hoc networks. To solve this problem, we use Node Weight Management Server(NWMS), which it manage each node's weight in local area. When NWMS detect misbehaving node, it adds the node's weight and if the node's weight exceeds threshold then NWMS broadcasts the node's information to isolate in network. These mechanisms show that they are highly effective and can reliably detect a multitude of misbehaving node.
Keywords
Ad-hoc network security; Tactical Ad-hoc network; NWMS;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Buchegger and J.L. Boudec, 'Performance analysis of the CONFIDANT Protocol.' Proceeding of the 3rd ACM International Symposium on Mobile ad hoc networking & computing, pp. 226-236, June 2002   DOI
2 N. Asokan and P. Ginzboorg, 'Key agreement in ad hoc networks,' Computer Communication, pp. 1627-1637, Nov. 2000   DOI   ScienceOn
3 S. Zhu, S. Xu, S. Setia, and S. Jajodia, 'Establishing Pairwise Keys for Secure Communication in Ad hoc Networks: A Probabilistic Approach,' Proceedings of the 11th IEEE Conference on Network Protocols(ICNP'03), pp. 326-335, Nov. 2003   DOI
4 S. Marti. T.J. Giuli, K. Lai. and M. Baker, 'Mitigating routing misbehavior in mobile ad hoc networks,' Proceeding of the 6th International Conference on Mobile Computing and Networking, pp. 255-265, Aug. 2000   DOI
5 C.E. Perkins, E.M. Royer, and S.R. Das, 'Ad hoc on-demand distance Vector(AODV) routing,' IETF Internet draft, MANET working group, Jan. 2002
6 L. Zhou and Z.J. Haas, 'Securing Ad Hoc Networks,' IEEE Network Magazine, vol. 13, pp. 24-30, Nov. 1999
7 M.G. Zapata and N. Asokan, 'Securing Ad hoc Routing Protocols,' In Proceeding of the 2002 ACM workshop on wireless security, pp. 1-10, Sep. 2002   DOI
8 C.K. Toh, C. Lee, and N.A. Ramos, 'Next-Generation Tactical Ad Hoc Mobile Wireless Networks,' Technology Review Journal. pp. 103-113, Apr. 2002
9 J. Brand and G. Hartwig, 'Management of tactical ad hoc networks with C2 data models,' Military Communication Conference 2001 IEEE, pp. 915-922, Aug. 2001
10 C.K. Toh, Ad Hoc Mobile Wireless Networks: Protocol and Systems, Prentice Hall PRT, Dec. 2001