Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2012.19C.2.083

Identification Technition of Malicious Behavior node Based on Collaboration in MANET  

Jeon, Seo-In (육군본부 전산체계처)
Ryu, Keun-Ho (충북대학교 전자정보대학 소프트웨어전공)
Abstract
MANET(Mobile Ad-Hoc Network) has a weakness from a security aspect because it operates where no wired network is built, which causes the exposed media, dynamic topology, and the lack of both central monitoring and management. It is especially difficult to detect and mitigate a malicious node because there is not a mediator which controls the network. This kind of malicious node is closely connected to the routing in the field of study of Ad-Hoc security. Accordingly this paper proposes the method on how to enhance the security for the safe and effective routing by detecting the malicious node. We propose MBC(Identification technition of Malicious Behavior node based on Collaboration in MANET) that can effectively cope with malicious behavior though double detecting the node executing the malicious behavior by the collaboration between individual node and the neighbor, and also managing the individual nodes in accordance with the trust level obtained. The simulation test results show that MBC can find the malicious nodes more accurately and promptly that leads to the more effectively secure routing than the existing method.
Keywords
Malicious Node; Malicious Behavior Pattern; Trust Level; Secure Routing;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H. Jhaveri and D. Patel and D. Parmar and I. Shah, "MANET Routing Protocols and Wormhole Attack against AODV", IJCSNS International Journal of Computer Science and Network Security, Vol.10, No.4, Apr., 2010.
2 C. Komala and S. Srinivas and S. Padmashree and E. Elevarasi, "Wireless Ad hoc Mobile Networks", National Conference on Computing Communication and Technology, pp.168-174, 2010.
3 A. H. A. Rahman and Z. A. Z.ukarnain, "Performance Comparison of AODV,DSDV and I-DSDV Routing Protocols in Mobile Ad Hoc Networks", European Journal of Scientific Research, pp.566-576, 2009.
4 S. K. B.V and V. A.L, "Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism, International Journal of Scientific & Engineering Research, Vol.1, Issue3, Dec., 2010.
5 N. S. M. Usop and A. Abdullah and A. F. Abidin, "PerformanceEvaluation of AODV,DSDV & DSR Routing Protocol in Grid Environment", IJCSNS International Journal of Computer Science and Network Security, pp.261-268, 2009.
6 H. Rutvij and D. Ashish and D. Jatin, "MANET Routing Protocols and Wormhole Attack against AODV", IJCSNS International Journal of Computer Science and Network Security, Vol.10, No.4, Apr., 2010.
7 김재홍, 김세헌, "MANET에서 wormhole 공격의 탐지 및 방지 를 위한 알고리즘에 대한 연구", 한국경영과학회 추계학술대회 및 정기총회, pp.494-497, 2008.
8 배달형, 조용건, "NCW 컴퓨터네트워크작전(CNO)의 작전적 원리와 한국군의 발전방향", 국방연구, 2009.
9 H. Yang and H. Luo and F. Ye and S. Lu, and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions", IEEE Wireless Communications, 2004.
10 황윤철, "MANET에서 비정상 노드를 효율적으로 탐지하기 위한 보안 설계", 한국통신학회논문지 제35권 제3호(네트워크 및 서비스), pp.373-563, 2010.