Browse > Article
http://dx.doi.org/10.7471/ikeee.2019.23.2.659

A Simulation-based Analysis and Verification Method for Network Vulnerability  

Lee, Hyun-Jin (Solvit System)
Kim, Kwang-hee (Solvit System)
Lee, Haeng-Ho (Agency for Defense Development)
Publication Information
Journal of IKEEE / v.23, no.2, 2019 , pp. 659-666 More about this Journal
Abstract
MANET can be applied to various applications as it can autonomously configure the network with only mobile nodes. However, the network can be vulnerable to cyber attacks because it is organized in a distributed environment without central control or management. In this paper, we propose a simulation-based network security vulnerability analysis and verification method. Using this method, we simulated the routing message modification attack, Sybil node attack, and TLV message modification attack that may frequently occur in MANET, and confirmed that similar vulnerabilities can be occurred in the real system. Therefore, the proposed method can be used to improve the accuracy of the protocol design by verifying possible security vulnerabilities through simulation during the protocol design procedure.
Keywords
Simulation; Vulnerability; Cyber Security; MANET; Network Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 KISA, "2019년도 7대 사이버 공격 전망," http://www.kisa.or.kr/notice/press_View.jsp?cPage=1&mode=view&p_No=8&b_No=8&d_No=1739&ST=&SV=
2 M. Antonakakis, et al. "Understanding the Mirai Botnet," In Proc. of 26 th USENIX Security Symposium, 2017.
3 B. Devi, et. al, "Analysis of MANET Routing Protocol in Presence of Worm-Hole Attack Using ANOVA Tool," International Journal of Pure and Applied Mathematics, vol.117, no.15, pp.1043-1055, 2017.
4 Andrea Holler, "Advances in Software-Based Fault Tolerance for Resilient Embedded Systems," Doctoral thesis, Graz University of Technology, 2016.
5 K. Kobara. "Cyber physical security for Industrial Control Systems and IoT," IEICE Transactions on Information and Systems, vol.E99.D no.4, pp.787-795, 2016. DOI: 10.1587/transinf.2015ICI0001   DOI
6 J. G. Ponsam, R. Srinivasan. "A survey on MANET security challenges, attacks and its countermeasures," International Journal of Emerging Trends & Technology in Computer Science, vol.3, no.1, pp.274-279, 2014.
7 Riverbed Modeler, https://www.riverbed.com/sg/products/steelcentral/steelcentral-riverbed-modeler.html
8 C. Alcaraz and J. Lopez, "A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems," IEEE Transactions on Systems, Man, and Cybernetics, vol.40, no.4, pp.419-428, 2010. DOI: 10.1109/TSMCC.2010.2045373   DOI
9 J. Lopez, R. Roman and C. Alcaraz, "Analysis of security threats, requirements, technologies and standards in wireless sensor networks," Foundations of Security Analysis and Design V, vol.5705, pp.289-338, 2009. DOI: 10.1007/978-3-642-03829-7_10   DOI
10 Z. Trifa, M. Khemakhem, "Sybil Nodes as a Mitigation Strategy against Sybil Attack," Procedia Computer Science, vol.32, pp.1135-1140, 2014. DOI: 10.1016/j.procs.2014.05.544   DOI
11 D. York, Seven Deadliest Unified Communications Attacks. Syngress, 2010.