Browse > Article
http://dx.doi.org/10.13067/JKIECS.2012.7.4.797

A Study on MD5 Security Routing based on MANET  

Lee, Cheol-Seung (광주 여자대학교 교양.교직과정부)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.7, no.4, 2012 , pp. 797-803 More about this Journal
Abstract
Recently demands in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on and much attention has been paid to the application of MANET as a Ubiquitous network which is growing fast. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing, but have vulnerable points, such as lack of network scalability and dynamic network topology due to mobility, passive attacks, active attacks, which make continuous security service impossible. In this study, hashed AODV routing is used to protect from counterfeiting messages by malicious nodes in the course of path finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.
Keywords
MANET; MD5; AODV;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 M. S. Corson, J. P. Macker, "Mobile Ad hoc Networking(MANET) : Routing Protocol Performance Issues and Evaluation Considerations", RFC 2501, pp. 3-5, January, 1999.
2 김관웅, 배성환, 김대익, "MANETs의 AODV기반 향상된 견고한 라우팅 프로토콜", 한국전자통신학회논문지, 4권, 1호, pp. 14-15, 2009.
3 K. Weniger, M. Zitterbart, "Address autoconfiguration in mobile ad hoc networks : current approaches and future directions," IEEE Netw. Mag., Vol. 18, No. 4, pp. 6-11, Jul. 2000.
4 Manel Guerrero Zapata, Manel Guerrero, "Secure Ad Hoc On-Demand Distance Vector (SAODV) Routing", IETF Internet Draft : draft-guerrero-manet-saodv-05.txt, pp. 12-13, February, 2005.
5 C-K Toh, "Ad Hoc Mobile Wireless Networks Protocols and System", Prentice Hall, pp. 200-252, Jan, 2004.
6 김영동, "다중침해가 있는 MANET에서 VoIP 트래픽의 전송성능", 한국전자통신학회논문지, 7권, 2호, pp. 258, 2012.
7 A. Patwardhan, J. Parker, A. Joshi, A. Karygiannis, M. Iorga, "Secure Routing and Intrusion Detection in Ad Hoc Networks", Third IEEE International Conference on Pervasive Computing and Communications, pp.2-3, March, 2005.
8 G. Montenegro, C. Castelluccia, "Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Address", NDSS' 02, pp. 1-2, February, 2002.
9 B. Kadri, A. M'hamed, M. Feham, "Secured Clustering Algorithm for Mobile Ad Hoc Networks", IJCSNS International Journal of Computer Science and Network Security, Vol. 7, No. 3, pp. 27, March, 2007.
10 김영동, "DDoS 침해가 있는 MANET에서 VoIP 트래픽의 성능", 한국전자통신학회논문지, 6권, 4호, pp. 493-494, 2011.