Browse > Article

Construct of Cooperative Security System for Secure MANET  

Yang, Hwan Seok (중부대학교 정보보호학과)
Yoo, Seung Jae (중부대학교 정보보호학과)
Publication Information
Abstract
Security between mobile nodes and efficient communication is one of the most important parts of the MANET. In particular, the wireless network is significantly higher for the attack threats because of collaborative structure for open communication media and communication. However, application of existing security mechanisms and intrusion detection system is not easy due to the characteristics of MANET. It is because collection and integration of adult data by the dynamic topology due to the mobility of nodes and many network sensors is difficult. In this study, we propose cooperative security system technique that can improve the reliability based on authentication assessing confidence about the whole nodes which joins to network and detect effectively this when intrusion occurs. Cluster head which manages the cluster performs CA role for the certificate issue and the gateway node performs role of intrusion detection system. Intrusion detection is performed by cooperating with neighboring nodes when attack is not detected in one intrusion detection node. The performance of the proposed method was confirmed through experiments comparing with the SRP technique.
Keywords
Cooperative Security; IDS; MANET; Network Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 B. J. Kim and I. K. Kim, "Kernel based intrusion detection system," Fourth Annual International Conference on Computer and Information Science (ACIS), pp.13-18, 2005.
2 Gahng-Seop Ahn, Andrew T. Campbell, Adnras Veres, Li-Hsiang Sun, "SWAN: Service Differentation in Stateless Wireless Ad Hoc Networks," in Proceedings of IEEE Twenty-First Annual Joing Conference of the IEEE Computer and Communications Societies, INFOCOM, Vol.2, 2002.
3 A. Mishra, K. Nadkarni, A. Patcha, "Intrusion Detection in Wireless Ad hoc Netoworks," Wireless Communications, IEEE, Vol.11, Issue 1, pp.48-60, 2004.
4 W. Zhang, et al, "Secure Routing in Ad hoc Networks and a related Intrusion Detection Problem," IEEE Military Conference (MILCOM), Vol.2, pp.735-740, 2003.
5 S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour, and Y. Nemoto, "Detecting blackhole attack on aodv-based mobile ad-hoc networks by dynamic learning," International Journal of Network Security, Vol.4, no.3, pp.338-346, 2007.
6 D. Watkins, C. Scott, "Methodology for evaluating the effectiveness of intrusion detection in tactical mobile ad hoc networks," IEEE Wireless Communications and Networking Conference (WCNC), Vol.1, pp.622-627, 2004.
7 E.C.H. Ngai, M. R. Lyu, "Trust and clustering based authentication services in mobile ad hoc networks," 24th International Conference on Distributed Computing Systems Workshops, pp.582-587, 2004.