• Title/Summary/Keyword: MANET(Mobile Ad Hoc-NETwork)

Search Result 366, Processing Time 0.023 seconds

A Study on Attack Detection using Hierarchy Architecture in Mobile Ad Hoc Network (MANET에서 계층 구조를 이용한 공격 탐지 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.75-82
    • /
    • 2014
  • MANET has various types of attacks. In particular, routing attacks using characteristics of movement of nodes and wireless communication is the most threatening because all nodes which configure network perform a function of router which forwards packets. Therefore, mechanisms that detect routing attacks and defense must be applied. In this paper, we proposed hierarchical structure attack detection techniques in order to improve the detection ability against routing attacks. Black hole detection is performed using PIT for monitoring about control packets within cluster and packet information management on the cluster head. Flooding attack prevention is performed using cooperation-based distributed detection technique by member nodes. For this, member node uses NTT for information management of neighbor nodes and threshold whether attack or not receives from cluster head. The performance of attack detection could be further improved by calculating at regular intervals threshold considering the total traffic within cluster in the cluster head.

Anonymous Ad Hoc Routing Protocol based on Group Signature (그룹서명에 기반한 익명성을 제공하는 애드 혹 라우팅 프로토콜)

  • Paik, Jung-Ha;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.15-25
    • /
    • 2007
  • According to augmentation about interesting and demanding of privacy over the rest few years, researches that provide anonymity have been conducted in a number of applications. The ad hoc routing with providing anonymity protects privacy of nodes and also restricts collecting network information to malicious one. Until recently, quite a number of anonymous routing protocols have been proposed, many of them, however, do not make allowance for authentication. Thus, they should be able to have vulnerabilities which are not only modifying packet data illegally but also DoS(denial of service) attack. In this paper, we propose routing protocol with providing both anonymity and authentication in the mobile ad hoc network such as MANET, VANET, and more. This scheme supports all of the anonymity properties which should be provided in Ad Hoc network. In addition, based on the group signature, authentication is also provided for nodes and packets during route discovery phase. Finally, route discovery includes key-agreement between source and destination in order to transfer data securely.

A Routing Algorithm Minimizing the Maximum used Power for Mobile Ad-hoc Networks (이동 애드혹 네트워크에서 단말의 최대 소모 에너지를 최적화라는 라우팅 방안)

  • Yu, Nam-Kyu;Kim, Kwang-Ryoul;Min, Sung-Gi
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.158-165
    • /
    • 2008
  • In this paper, we present a MMPR (Minimizing the Maximum Used Power Routing) Algorithm in a MANET (Mobile ad hoc network) by modifying the route selection algorithm in well-known routing MANET protocol. In the previous route selection algorithms, the metric for cost function is the minimal hop which does not consider the energy status. MMPR uses the metric with used energy The node that want to know the route for some destination begins calculating the route cost function with alpha which is the maximum used energy in the known route. If the new route that contains the node whose used energy is greater than previous known alpha is known to the node that want to send a packet in some moment, the probability of selecting the new route is lower. Experimental results with MMPR show higher performance in both the maximum used energy and the number of dead nodes than that of the CMMBCR (Conditional Max-Min Battery Routing).

Comparative Analysis for Node Auto-Configuration Protocols of Mobile Nodes on Mobile Ad-Hoc Networks (Mobile Ad-Hoc Network 상에서 제안된 이동노드의 자동 주소할당 및 자동설정 기법의 비교분석)

  • 봉진숙;성수련;신용태
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.673-675
    • /
    • 2004
  • Mobile Ad-Hoc Network는 base station에 의존하지 않는 다중 홉 무선 네트워크이다. 이 기술은 동적 주소할당을 위해 일반적으로 사용되는 DHCP 프로토콜이나 경로 메시지를 전달하는 라우터를 사용하지 않고 통신에 참가하는 모든 노드가 라우터 역할을 함으로써 네트워크를 구성한다. 현재 제안되고 있는 라우팅 프로토콜은 모두 네트워크 형성 이전의 노드 설정을 가정한다. MANET의 상용화 관점에서 본 논문은 이동 노드의 주소 할당 및 설정을 위해 zeroconfiguration[2]과 MANETconf[3] 및 네 가지 종류의 주소할당 메커니즘의 특징을 살펴보고 상태 유지필요성, 주소충돌가능성, 알고리즘 복잡성, 통신오버헤드, 확장성 관점에서 비교분석 하고자 한다.

  • PDF

Detecting Jamming Attacks in MANET (MANET에서의 전파방해 공격 탐지)

  • Shrestha, Rakesh;Lee, Sang-Duk;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.482-488
    • /
    • 2009
  • Mobile Ad-hoc Networks provide communication without a centralized infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. On the other hand, they are susceptible to malicious exploitation and have to face different challenges at different layers due to its open Ad-hoc network structure which lacks previous security measures. Denial of service (DoS) attack is one that interferes with the radio transmission channel causing a jamming attack. In this kind of attack, an attacker emits a signal that interrupts the energy of the packets causing many errors in the packet currently being transmitted. In harsh environments where there is constant traffic, a jamming attack causes serious problems; therefore measures to prevent these types of attacks are required. The objective of this paper is to carry out the simulation of the jamming attack on the nodes and determine the DoS attacks in OPNET so as to obtain better results. We have used effective anomaly detection system to detect the malicious behaviour of the jammer node and analyzed the results that deny channel access by jamming in the mobile Ad-hoc networks.

A study on Dynamic Routing Protocol using Entropy-Doppler Topology (엔트로피-도플러 기법을 이용한 동적 라우팅 프로토콜에 관한 연구)

  • Chi, Sam-Hyun;Kim, Sun-Guk;Doo, Kyung-Min;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.461-465
    • /
    • 2007
  • MANET(Mobile Ad hoc Networks) is free-mobility formation of mobile nodes in the wireless networks. Generally, wireless networks has two main type of structures which Tree and Mesh. These general structure is difficult to do which connectivity, redundancy transmit and network continuant. In this paper, we would suggest a new ODDMRP(Ontology Doppler effect-based Dynamic Multicast Routing Protocol) technology for effective MANET which Ontology Doppler effect-based. ODDMRP consist of the parameters for node entropy when using Doppler effect which moving position of round node, moving time, and distribution chart in velocity also it express distance of destination node and property structure organization. It would be used to provide improvement to keep the optimal communication routing and also could be improve network stabilization, and continuation durability of connectivity.

  • PDF

Study on the wormhole detection and prevention algorithm for MANET (MANET에서 wormhole 공격의 탐지 및 방지를 위한 알고리즘에 대한 연구)

  • Kim, Jae-Honh;Kim, Se-Heon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2008.10a
    • /
    • pp.494-497
    • /
    • 2008
  • In Mobile ad hoc networks (MANET), nodes could transmit packets for each other to communicate beyond their transmission range without centralized control. Unlike infrastructure-based wireless networks, due to the unique characteristics of MANETs such as open network architecture, stringent resource constraints and highly dynamic network topology, networks are vulnerable to wormhole attacks launched through colluding nodes. In this paper, we develop an wormhole detection and prevention algorithm for MANET.

  • PDF

Power Aware Routing Protocol based on Both Threshold by Residual Battery Capacity and Signal Strength in Mobile Ad-hoc Network (Mobile Ad-hoc 네트워크에서 Threshold 적용과 신호세기 기반의 효율적인 파워소모 라우팅 프로토콜)

  • Park Gun-Woo;Song Joo-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1139-1142
    • /
    • 2006
  • Mobile Ad-hoc 네트워크(MANET)에서 각 노드들은 한정된 배터리에 의존하여 통신한다. 이와 같은 제한사항을 극복하기 위해 링크의 안정성을 유지하거나 파워 소모를 고려한 프로토콜에 대한 연구들이 활발히 이루어져 왔다. 하지만 링크의 안정성 또는 파워 소모의 어느 한 측면만을 고려함으로써 링크의 안정성은 높일 수 있으나 파워 소모가 효율적이지 못했다. 반면에 전체 파워소모는 줄일 수 있었으나 파워소모의 균형을 이루지 못함으로써 네트워크 수명을 오래 지속시킬 수 없는 문제점이 발생 했다. 본 논문에서는 배터리 잔량에 대한 threshold를 적용함과 동시에 신호세기를 고려하여 각 노드들의 균형된 파워소모와 네트워크 전체의 파워 소모를 최소화함으로써 네트워크 수명을 오래 지속시키기 위한 프로토콜인 PRTRS(Power Aware Routing Protocol based on Both Threshold by Residual Battery Capacity and Signal Strength in Mobile Ad-hoc Network)를 제안한다. PRTRS는 AODV(Ad-hoc On-demand Distance Vector Routing)를 기반으로 하였다. NS-2 네트워크 시뮬레이션 결과 PRTRS는 특정 노드로 집중되는 트래픽을 분산시켜 파워소모의 균형을 이루고 네트워크 전체의 파워소모를 최소화함으로써 네트워크 수명이 연장됨을 확인하였다.

  • PDF

Transmission Performance of Application Traffic on Underwater MANETs (수중 MANET에서 응용 트래픽의 전송 성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.557-560
    • /
    • 2013
  • MANTET(Mobile Ad-Hoc Networks), which is configured and operated by each terminals with no support of communication infra-structures, is recently expanded its application fields from terrestrial communications to underwater environments with technical advances of Wi/Fi and minimized portable terminals. Underwater sensor network, undersea environment explorations and probes, information transmission for underwater area, etc., is typical application fields of underwater MANET. Especially, Performance measurement and analysis on this application fields is one of important research area and base of design, implementation and operation for underwater MANET. However, the research results are focued on various transmission parameters on network level, and its objects of analysis are also performance of network level. In this paper, transmission performances for application levels are measured and analyzed for user levels on underwater MANET. In this study, voice traffic is assumed as object application traffic, computer simulation which is based on NS-2 having additional implemented functions for underwater communications is used. on some defined scale of MANET, transmission performances according to varying traffic environments are measured and analyzed, operation conditions on underwater MANET is suggested with the analysis.

  • PDF

A Scheme of IP address Auto-configuration for Mobile Ad-hoc NETwork (이동 애드혹 네트워크에서 자동주소 설정 기술)

  • Hwang, Jin-Ok;Youn, Joo-Sang;Park, So-Young;Min, Sung-Gi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.489-491
    • /
    • 2009
  • Recently, a range of diverse networks are undergoing speedy evolution and inspiring variety applications. Among many networks, mobile Ad-Hoc networks (MANETs) are active working with a part of routing protocols. But, the majority of routing protocols have required a unique identifier, such as an IP address. At this while, IP address assignment scheme in MANET remains unsolved. When a centralized agent server is not exist, IP address is an critical issue such as a single MANET. This paper look over previous work about basic principles, also we suggest simple solution to overcome the power of two ($2^m$).

  • PDF