Browse > Article
http://dx.doi.org/10.33778/kcsa.2020.20.5.033

A Study on the Zone-Key based Secure Routing Scheme in MANET  

Yang, Hwan Seok (중부대학교/정보보호학과)
Kim, Young Sun (중부대학교/전기전자공학과)
Publication Information
Abstract
In MANET consisting of only mobile nodes, all nodes serve as routes. However, the dynamic topology due to frequent movement of nodes degrades routing performance and is also cause of many security vulnerabilities. Therefore, security must be applied to routing techniques that can influence the performance of MANET. In this paper, we propose a technique for efficiently responding to various routing attacks and safe data transmission through application of zone-key based security routing techniques. A zone-based network structure was used, and a management node that manages member nodes in each zone was used in the proposed technique. In addition, the damage from the attacking node was minimized by issuing a key to each node and applying this to a routing technique. The zone management node issues a key for encryption routing information and manages the issuance information. A member node that wants to transmit data encrypts routing in formation using a key issued from the zone management node, and then performs path discovery using this. The improved performance of the proposed technique was confirmed through a comparative experiment with the CBSR and ARNA technique, excellent performance was confirmed through experiments.
Keywords
Secure Routing Protocol; Mobile Ad-hoc Network; Routing Attacks; Authentication Technique;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Anjum, S. S., Md Noor, R., & Anisi, M. H., "Review on MANET based communication for search and rescue operations," Wireless Personal Communications, Vol.94, pp.31-52, 2017.   DOI
2 Chatterjee P, Ghosh U, Sengupta I, Ghosh SK , "A trust enhanced secure clustering framework for wireless ad hoc networks," Springer Wireless Networks, Vol.20, No.7, pp.1669-1684, 2014.   DOI
3 Fleury, M., Kanellopoulos, D., & Qadri, N. N, "Video streaming over MANETs: An overview of techniques. Multimedia Tools and Applications," pp.23749-23782, 2019.   DOI
4 Moussaoui, A., & Boukeream, A., "A survey of routing protocols based on link-stability in mobile ad hoc networks," Journal of Network and Computer Applications, Vol.47, pp.1-10, 2015.   DOI
5 Di Pietro, R., Guarino, S., Verde, N. V., & Domingo-Ferrer, J., "Security in wireless ad-hoc networks-A survey," Computer Communications Journal, Vol.51, pp.1-20, 2014.   DOI
6 Il Yong Kim and Ki Chang Kim, "A Resource-efficient IP Traceback Technique for Mobile Ad-hoc Networks Based on Time-tagged Bloom Filter," ICCIT. Nov. 2008.
7 K. Park and H. Lee, "On the Effectiveness of Route-based Packet Filtering for Ditributed DoS Attack Prevention in Power-Law Internet," Proc. ACM SIGCOMM'01, pp.15-26, 2001.