Browse > Article

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment  

Yang, Ho-Kyung (광운대학교 방위사업학과)
Cha, Hyun-Jong (광운대학교 방위사업학과)
Shin, Hyo-Young (경복대학 컴퓨터정보과)
Ryou, Hwang-Bin (광운대학교 컴퓨터과학과)
Jo, Yong-Gun (광운대학교 방위사업학과)
Publication Information
Abstract
NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.
Keywords
NCW;
Citations & Related Records
연도 인용수 순위
  • Reference
1 gajin Na et al, "Secure Mechanism to manage selfish nodes in Ad hoc Network", JIIC. 2004.
2 C.E Perkins and P.Bhagwat, "Routing over Multi-hop Wireless Network of Mobile Computers," SIGCOMM'94 : Computer Communications Review, pp.234-244, Oct, 1994.
3 In Sung Han, Hwang-Bin Ryou, Seok-Joong Kang, "Multi-Path Security-Aware Routing Protocol Mechanism for Ad Hoc Network," ichit, pp.620-626, 2006 International Conference on Hybrid Information Technology-Vol 1(ICHIT'06), 2006
4 S. Marti et al., "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks", ACM MOBICOM, 2000.
5 T. Murata and H. Ishibuchi, "Performance evaluation of genetic algorithms for flows hop scheduling problems," Proc. 1st IEEE Conf. Evolutionary Computation, vol. 2, pp. 812-817, June 1994
6 배달형, 조용건, "NCW 컴퓨터네트워크작전 (CNO)의 작전적 원리와 한국군의 발전방향", 국방연구, 2009. 08
7 고석주, " 소부대 지휘자 통신체계 구현방안 연구", 배재대학교 정보통신대학원, 2005.12
8 Andrew S. Tanenbaum. "Computer Network." Prentice-Hell International Inc., Second Edition, pp.345-374, 1996.