• 제목/요약/키워드: Ad-hoc Security

검색결과 296건 처리시간 0.025초

Ad-hoc wireless network에서의 authentication을 보장하는 zero-knowledge proof 기반의 프로토콜 (Zero-knowledge proof based authentication protocol in ad-hoc wireless network)

  • 윤여원;예흥진
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2002년도 종합학술발표회논문집
    • /
    • pp.473-476
    • /
    • 2002
  • 본 논문에서는 ad-hoc wireless network에서 상호간의 사전지식 없이 상대편을 authenticate하는 프로토콜을 제시한다. 기존에 Dirk Balfanz et al에 의해 제시된 변형된interactive Guy Fawkes protocol은 해쉬함수의, 전달하고자 하는 메시지와 그 authenticator의 해쉬값을 보내고, 다음 단계에서 그 원본을 밝히는 원리를 이용한 것으로, PKI 없이 해쉬함수 만으로 상호인증과 메시지의 무결성을 보장함으로써 전반적인 ID 체계와 public key encryption, decryption 연산에 대한 부담을 덜었다. 하지만, 이것은 여전히 eavesdropping같은 passive attack에 노출되어 있다[1]. 본 논문에서는 zero-knowledge 기반의 프로토콜을 이용하여 상호 정보를 교환할 수 없는 환경에서도 안전하게 상호 authentication을 가능하게 하는 방법을 제시한다.

  • PDF

이동 Ad Hoc 네트워크에서의 효율적인 인증기법에 대한 연구 (Effective Authentication in Mobile Ad Hoc Networks)

  • 마용재;이승찬;박건우;송주석
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.670-673
    • /
    • 2006
  • PKI(Public Key Infrastructure)는 인증, 무결성, 기밀성, 부인봉쇄, 접근통제 등의 보안기능을 일관성 있게 제공해 주는 기술로서, 이동통신과 무선 인터넷의 급속한 성장에 따른 무선 환경에서도 무선 PKI가 보안기능을 제공할 궁극적인 대안으로 여겨지고 있다. 본 연구는 이동 Ad-hoc 네트워크에서 Threshold cryptography를 이용하여 PKI의 기능을 제공할 수 있도록 하였으며, 기존의 연구들과 유사한 수준의 보안성을 가지면서도 CR(Certification Responsible) 노드의 가용성을 높여 네트워크의 성능을 향상 시킬 수 있는 인증 기법을 제시한다.

  • PDF

애드 혹(Ad Hoc) 네트워크에서의 위치정보 기반의 웜홀(Wormhole) 탐지 기법 (Wormhole Detection Method using Node Location in Mobile Ad hoc Networks)

  • 이규호;이건희;김동규;서정택;손기욱
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2006년도 가을 학술발표논문집 Vol.33 No.2 (D)
    • /
    • pp.681-685
    • /
    • 2006
  • 이동 애드 혹(Ad Hoc)네트워크는 노드의 참여와 이탈이 자유롭고 토폴로지의 변화가 잦기 때문에 일반 고정 유선네트워크에 비해 보안적으로 훨씬 더 많은 잠재적인 위험을 지니고 있다. 그 중 주변 노드들의 신뢰도에 대한 보장이 이루어지지 않기 때문에 멀티 홉 방식의 라우팅을 할 경우, 악의적인 중간 노드에 의해 정상적인 통신과 서비스를 방해하는 라우팅 과정에서의 공격이 일어날 수 있다. 특히 협력노드를 이용한 웜홀 공격은 단일노드에 의한 공격보다 탐지가 어렵고 그 피해도 더욱 크다. 이러한 웜홀 공격에 대응하기 위하여 본 논문에서는 네트워크에 참여한 노드들의 위치정보를 이용한 CA(central authority)에서의 경로 분석을 통해 웜홀을 탐지하는 기법을 제안하였다.

  • PDF

Ad hoc Software Rejuvenation for Survivability

  • Khin Mi Mi Aung;Park, Jong-Sou
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2003년도 동계학술대회
    • /
    • pp.141-145
    • /
    • 2003
  • We propose the model of Software Rejuvenation methodology, which is applicable for survivability. Software rejuvenation is a proactive fault management technique and being used in fault tolerant systems as a cost effective technique for dealing with software faults. Survivability focuses on delivery of essential services and preservation of essential assets, even systems are penetrated and compromised. Thus, our objective is to detect the intrusions in a real time and survive in face of such attacks. As we deterrent against an attack in a system level, the Intrusion tolerance could be maximized at the target environment. We address the optimal time to execute ad hoc software rejuvenation and we compute it by using the semi Markov process. This is one way that could be really frustrated and deterred the attacks, as the attacker can't make their progress. This Software Rejuvenation method can be very effective under the assumption of unknown attacks. In this paper, we compute the optimum time to perform an ad hoc Software Rejuvenation through intrusions.

  • PDF

FANET:-Communication Architecture and Routing Protocols A Review

  • Moazzam Ali;Adil Idress;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • 제24권5호
    • /
    • pp.181-190
    • /
    • 2024
  • FANET (Flying ad-hoc network) is a self-adjusting wireless network that enables easy to deploy flying nodes, inexpensive, flexible such as UAV in the absence of fixed network infrastructure they communicate amoung themselves. Past few decades FANET is only the emerging networks with it's huge range of next-generation applications.FANET is a sub-set of MANET's(Mobile Ad-hoc Network) and UAV networks are known as FANET.Routing enables the flying nodes to establish routes to radio access infrastructure specifically FANET and among themselves coordinate and collaborate.This paper presents a review on existing proposed communication architecture and routing protocols for FANETS.In addition open issues and challenges are summarized in tabular form with proposed solution.Our goal is to provide a general idea to the researchers about different topics to be addressed in future.

Performance Variations of AODV, DSDV and DSR Protocols in MANET under CBR Traffic using NS-2.35

  • Chandra, Pankaj;Soni, Santosh
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.13-20
    • /
    • 2022
  • Basically Mobile Ad Hoc Network (MANET) is an autonomous system with the collection of mobile nodes, these nodes are connected to each other by using wireless networks. A mobile ad hoc network poses this quality which makes topology in dynamic manner. As this type of network is Ad Hoc in nature hence it doesn't have fixed infrastructure. If a node wishes to transfer data from source node to a sink node in the network, the data must be passed through intermediate nodes to reach the destination node, hence in this process data packet loss occurs in various MANET protocols. This research study gives a comparison of various Mobile Ad Hoc Network routing protocols like proactive (DSDV) and reactive (AODV, DSR) by using random topology with more intermediate nodes using CBR traffic. Our simulation used 50, 100, and 150 nodes variations to examine the performance of the MANET routing protocols. We compared the performance of DSDV, AODV and DSR, MANET routing protocols with the result of existing protocol using NS-2 environment, on the basis of different performance parameters like Packet Delivery Ratio, average throughput and average end to end delay. Finally we found that our results are better in terms of throughput and packet delivery ratio along with low data loss.

Robust Conditional Privacy-Preserving Authentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks

  • Alazzawi, Murtadha A.;Lu, Hongwei;Yassin, Ali A.;Chen, Kai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권12호
    • /
    • pp.6121-6144
    • /
    • 2019
  • Numerous privacy-preserving authentication schemes have been proposed but vehicular ad hoc networks (VANETs) still suffer from security and privacy issues as well as computation and communication overheads. In this paper, we proposed a robust conditional privacy-preserving authentication scheme based on pseudonym root with cuckoo filter to meet security and privacy requirements and reduce computation and communication overheads. In our proposed scheme, we used a new idea to generate pseudonyms for vehicles where each on-board unit (OBU) saves one pseudonym, named as "pseudonym root," and generates all pseudonyms from the same pseudonym. Therefore, OBU does not need to enlarge its storage. In addition, the scheme does not use bilinear pairing operation that causes computation overhead and has no certification revocation list that leads to computation and communication overheads. The proposed scheme has lightweight mutual authentication among all parties and just for once. Moreover, it provides strong anonymity to preserve privacy and resists ordinary attacks. We analyzed our proposed scheme and showed that it meets security and privacy requirements of VANETs and is more efficient than traditional schemes. The communication and computation overheads were also discussed to show the cost-effectiveness of the proposed scheme.

모바일 에드혹네트워크를 위한 효과적인 침입 탐지 시스템 (An Effective Intrusion Detection System for MobileAdHocNetwork)

  • ;박규진;박광채;최동유;한승조
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 춘계종합학술대회 A
    • /
    • pp.271-276
    • /
    • 2008
  • The intrusion detection system is one of the active fields of research in wireless networks. Intrusion detection in wireless mobile Ad hoc network is challenging because the network topologies is dynamic, lack centralization and are vulnerable to attacks. This paper is about the effective enhancement of the IDS technique that is being implemented in the mobile ad hoc network and deals with security and vulnerabilities issues which results in the better performance and detection of the intrusion.

  • PDF

An Architecture for Key Management in Hierarchical Mobile Ad-hoc Networks

  • Rhee, Kyung-Hyune;Park, Young-Ho;Gene Tsudik
    • Journal of Communications and Networks
    • /
    • 제6권2호
    • /
    • pp.156-162
    • /
    • 2004
  • In recent years, mobile ad-hoc networks have received a great deal of attention in both academia and industry to provide anytime-anywhere networking services. As wireless networks are rapidly deployed, the security of wireless environment will be mandatory. In this paper, we describe a group key management architecture and key agreement protocols for secure communication in mobile ad-hoc wireless networks (MANETs) overseen by unmanned aerial vehicles (UAVs). We use implicitly certified public keys method, which alleviates the certificate overhead and improves computational efficiency. The architecture uses a two-layered key management approach where the group of nodes is divided into: 1) Cell groups consisting of ground nodes and 2) control groups consisting of cell group managers. The chief benefit of this approach is that the effects of a membership change are restricted to the single cell group.

엿듣기를 이용한 Ad-hoc 네트워크 라우팅에서의 오버헤드 절감 아이디어 (Overhead Reduction Ideas based on Overhear in Ad-hoc Networks Routing)

  • 이동현
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2005년도 한국컴퓨터종합학술대회 논문집 Vol.32 No.1 (A)
    • /
    • pp.499-501
    • /
    • 2005
  • Ad-hoc네트워크의 효율적인 라우팅을 위해서는 라우팅 각 과정의 오버헤드를 최소화하여야 한다. 본 논문에서는 기존의 연구물들을 바탕으로 Ad-hoc 네트워크 라우팅에서 흔히 일어 나는 주요 오버헤드 요소들을 살펴보고, 그 오버헤드를 절감시킬 수 있는 간단하고 효율적 인 아이디어를 제시한다. 제안한 방법은 무선 네트워크의 특성을 활용하여 별도의 메시지 교환 없이 엿듣기를 통하여 라우팅 정보를 수집하는 특징을 가지고 있다. 이 엿듣기로 수집된 라우팅 정보를 바탕으로 플러딩 메시지 감소, 멀티 패스, 중앙 병목현상 분산을 구현하고, 이를 통해 라우팅 오버헤드를 크게 경감시킬 수 있을 것으로 기대한다.

  • PDF