• Title/Summary/Keyword: RREQ

Search Result 46, Processing Time 0.025 seconds

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.

An Analysis on the Effect of Packet Dropping Attacks in Wireless Ad hoc Networks (애드 혹 네트워크상의 패킷 폐기 공격의 영향 분석)

  • Kim, Sang-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.61-63
    • /
    • 2005
  • 본 논문에서는 무선 애드 혹 네트워크상의 패킷 폐기 공격의 영향을 분석하고 시뮬레이션을 통해 그 효과를 측정하였다. 시뮬레이션 수행 결과 RREQ 패킷을 폐기한 경우에는 네트워크에 미치는 영향이 적은 반면, RREP 및 DATA 패킷을 폐기한 경우는 네트워크의 전송 효율이 떨어졌으며. 또한 패킷을 폐기하는 악성노드가 많을수록 데이터의 전달율이 감소하고 하나의 데이터를 전송 하는데 필요한 제어 패킷의 수가 늘어남을 알 수 있었다. 시뮬레이션을 통해 분석된 결과를 바탕으로 패킷 폐기 공격의 징후를 미리 검출하거나 공격 형태를 식별하는 기초 자료로 활용가능 할 것이다.

  • PDF

Design of The Selective Route Discovery Routing Protocol for Mobile Ad-Hoc Networks (이동 애드혹 네트워크 환경에서의 선택적 경로 탐색 라우팅 프로토콜 설계)

  • 김태은;박용진
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.262-264
    • /
    • 2004
  • 본 논문에서는 소수 노드가 대부분의 네트워크 트래픽을 차지하는 실제 트래픽 형태에서 이동 애드혹 네트워크가 효율적으로 동작하기 위한 선택적 경로 탐색 라우팅 프로토콜을 제안한다. 선택적 경로 탐색 라우팅 프로토콜은 각 송신노드마다 자주 사용되는 목적노드를 주기적으로 선별하고 주기적인 RREQ 메시지를 보냄으로써 빠른 응답성을 가지도록 한다. 마지막으로 모의실험을 통해 우리가 제안한 방법이 기존의 On-Demand 라우팅 프로토콜보다 우수함을 보인다.

  • PDF

A Design of ETWAD(Encapsulation and Tunneling Wormhole Attack Detection) based on Positional Information and Hop Counts on Ad-Hoc (애드 혹 네트워크에서 위치 정보와 홉 카운트 기반 ETWAD(Encapsulation and Tunneling Wormhole Attack Detection) 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.73-81
    • /
    • 2012
  • This paper proposes an ETWAD(Encapsulation and Tunneling Wormhole Attack Detection) design based on positional information and hop count on Ad-Hoc Network. The ETWAD technique is designed for generating GAK(Group Authentication Key) to ascertain the node ID and group key within Ad-hoc Network and authenticating a member of Ad-hoc Network by appending it to RREQ and RREP. In addition, A GeoWAD algorithm detecting Encapsulation and Tunneling Wormhole Attack by using a hop count about the number of Hops within RREP message and a critical value about the distance between a source node S and a destination node D is also presented in ETWAD technique. Therefore, as this paper is estimated as the average probability of Wormhole Attack detection 91%and average FPR 4.4%, it improves the reliability and probability of Wormhole Attack Detection.

A Path Establishment Method for Improving Path Stability in Mobile Ad-Hoc Networks (이동 애드혹 네트워크에서 경로의 안정성 향상을 위한 경로 설정 방식)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.9B
    • /
    • pp.563-568
    • /
    • 2007
  • This paper proposes a routing establishment method for improving path stability in mobile ad-hoc networks. In mobile ad-hoc networks, the network topology is highly dynamic due to the node mobility unlike wired networks. Since the existing methods are based on the shortest path algorithm with the minimum hop count regardless of the path stability, it could lead to packet loss and path disconnection in mobile ad-hoc networks. In particular, if control packets and critical data are transmitted on the unstable path, it causes serious problems. Therefore, this paper proposes one approach in order to minimize packet loss and path disconnection by considering the node mobility. After the destination node receives multiple RREQ messages, it selects the stable path through the proposed MinMax algorithm according to the node speed.

A Study on Attack Detection Technique based on n-hop Node Certification in Wireless Ad Hoc Network (Wireless Ad Hoc Network에서 n-hop 노드 인증 기반 공격 탐지 기법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.3-8
    • /
    • 2014
  • Wireless Ad hoc Network is threatened from many types of attacks because of its open structure, dynamic topology and the absence of infrastructure. Attacks by malicious nodes inside the network destroy communication path and discard packet. The damage is quite large and detecting attacks are difficult. In this paper, we proposed attack detection technique using secure authentication infrastructure for efficient detection and prevention of internal attack nodes. Cluster structure is used in the proposed method so that each nodes act as a certificate authority and the public key is issued in cluster head through trust evaluation of nodes. Symmetric Key is shared for integrity of data between the nodes and the structure which adds authentication message to the RREQ packet is used. ns-2 simulator is used to evaluate performance of proposed method and excellent performance can be performed through the experiment.

Improved AODV Routing Protocol Considering the Link Quality of Wireless Transmission Environments (무선 전송환경의 링크품질을 고려한 개선된 AODV 라우팅프로토콜)

  • Lee, Tae-Hoon;Jeun, Sung-Woo;Kim, Young-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1903-1911
    • /
    • 2016
  • As interest in MANET is increasing nowadays, research upon an efficient MANET routing protocol is actively under way. A LQA(Link Qualty Aware)-AODV routing protocol to deal with frequent changes of topology and wireless link variations under tactical operating conditions is proposed in this paper. The suggested LQA-AODV takes into account the channel capacity of each hop during the route request process of the traditional AODV protocol. In detail, LQA-AODV adds a channel capacity cost value to the RREQ message format that occurs during the routing process of the existing AODV Routing Protocol causing the accumulated channel capacity cost values of each sections to be compared before establishing a route. To verify the performance of LQA-AODV, NS2.35 was utilized and the Link-Quality Model was applied in order to reflect the tactical wireless environment. The simulation compares and analyzes LQA-AODV and the existing AODV, showing a large improvement over the traditional AODV in regards to the Packet Delivery Ratio, and End-to-End Delay.

Efficient New Routing Protocol for Mobile Ad Hoc Networks (이동 애드혹 네트워크을 위한 새로운 라우팅 프로토콜 기법)

  • Ngo, Van-Vuong;Jang, Jaeshin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.815-818
    • /
    • 2015
  • AODV routing protocol, one of the most studied routing protocols for the Mobile Ad hoc Network (MANET), uses the number of hops as the metric to choose a path from a source node to a destination node. If the path is deteriorated, it will cause many problems to the communication. In order to improve the performance of the network, we propose AuM-AODV routing protocol that contains an auxiliary metric besides the number of hops. Nodes using AuM-AODV use control packets such as Route Request (RREQ), Route Reply (RREP), and HELLO to exchange information about network topology like AODV routing protocol. AuM-AODV routing protocol is implemented in NS-3 for performance evaluation. We use three performance metrics, that is to say, throughput, packet delivery ratio, and average end-to-end delay. According to numerical results, the new AuM-AODV routing protocol has better performance over three performance metrics than AODV routing protocol.

  • PDF

A New Framework for Ad Hoc Network routing Protocol without Destination Sequence Number (목적지 순차 번호를 사용하지 않은 새로운 구조의 Ad Hoc 네트워크의 라우팅 프로토콜)

  • Seo, Jae-Hong;Jung, Ho-Youl
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.3
    • /
    • pp.155-163
    • /
    • 2007
  • In Ad Hoc Networks, a connection breaks due to the irregular movement of mobile nodes and the inherent characteristics of the wireless medium such as the interference and the multi-path fading. AODV, a typical on-demand routing protocol in Ad Hoc networks, uses Destination sequence numbering for loop-free, but it may cause RREQ broadcast storm problem. This paper proposes AODV_ods that does not need destination sequence number, in routing message and routing table without routing loop. To show the effectiveness of the proposed scheme, we performed extensive simulation with NS-2. The simulation results show that the proposed ADOV_ods efficiently uses wireless bandwidth compare to the original AODV. Finally AODV ods reduces the routing overhead, end to end delay and increases the overall packet delivery ratio.

  • PDF

Performance Evaluation of a New AODV Protocol with Auxiliary Metrics

  • Ngo, Van-Vuong;Jang, Jaeshin
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.1
    • /
    • pp.14-20
    • /
    • 2016
  • The AODV protocol uses many RREQ messages and one RREP message in the path-discovery process. This protocol has only one metric, the number of hops. Although it is simple, this protocol is not efficient. To avoid this problem, we propose a new AODV with two auxiliary metrics (AuM-2-AODV). The AuM-2-AODV protocol tries multiple route replies, which reduces the chance of path failure and helps the network obtain a better data rate. It has two auxiliary metrics, the remaining energy of its nodes and the number of HELLO messages received at the nodes. With these two metrics, the reliable path from the source node to the destination node will be chosen. In this paper, the performance of the AuM-2-AODV is evaluated using the NS-3 simulator. The performance results show that AuM-2-AODV provides greater throughput and packet delivery ratio by 20% and up to 50% and about 100% in some cases, respectively, than previous protocols.