• Title/Summary/Keyword: route security

Search Result 188, Processing Time 0.027 seconds

Analysis of Route Stability in Mobile Ad Hoc Networks (모바일 애드 혹 네트워크 환경에서 경로 신뢰성 분석)

  • Lee, Do-Hyeon
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.13-19
    • /
    • 2011
  • Mobile nodes in MANETs have the nature of unrestricted mobility so that they will join and leave the network frequently. Therefore, it important consideration to determine the optimal distance progress between relaying nodes along the route in order to maintain the established route for an arbitrary length of time (i.e., route duration). In this paper, we derived the link maintenance probability by considering the initial distance between two relaying nodes and node mobility. Based on the link maintenance probability, we further analyzed the route stability by considering the impact of distance progress between relaying nodes along the route.

Integrated NEMO Route Optimization to Improve Security and Communication Path (보안성과 전송 경로를 함께 개선한 NEMO의 통합적인 경로 최적화)

  • Cho, Kyung-San;Shin, Duk-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.203-210
    • /
    • 2008
  • Because BSP(Basic Support Protocol) of NEMO(Network Mobility) has important limitation of not providing route optimization, several route optimization schemes have been proposed. By analyzing and improving the limitations of the existing schemes. we Propose an advanced integrated route optimization scheme for the communication through both the internal and external routing of nested NEMO. Our proposal includes a secure route optimization protocol which connects TLMR directly to an external node CN without passing through any HAs. and allows TLMR to control the internal path without passing through the internet. Thus, our scheme can strengthen the security as well as improve the path and delay of NEMO communication.

  • PDF

HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks

  • Jiang, Rong;Luo, Jun;Wang, Xiaoping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.2042-2060
    • /
    • 2013
  • In wireless sensor networks (WSNs), energy efficiency is one of the most essential design considerations, since sensor nodes are resource constrained. Group communication can reduce WSNs communication overhead by sending a message to multiple nodes in one packet. In this paper, in order to simultaneously resolve the transmission security and scalability in WSNs group communications, we propose a hierarchical cluster-based secure and scalable group key management scheme, called HRKT, based on logic key tree and route key tree structure. The HRKT scheme divides the group key into cluster head key and cluster key. The cluster head generates a route key tree according to the route topology of the cluster. This hierarchical key structure facilitates local secure communications taking advantage of the fact that the nodes at a contiguous place usually communicate with each other more frequently. In HRKT scheme, the key updates are confined in a cluster, so the cost of the key updates is reduced efficiently, especially in the case of massive membership changes. The security analysis shows that the HRKT scheme meets the requirements of group communication. In addition, performance simulation results also demonstrate its efficiency in terms of low storage and flexibility when membership changes massively.

Traceback Technique using Table-based Route Management under Mobile Ad Hoc Network Environment (Mobile Ad Hoc Network에서 테이블 기반 경로 관리를 이용한 역추적 기법)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.19-24
    • /
    • 2013
  • MANET has a highly dynamic topology because it consists of only mobile nodes. Various attacks using these characteristics exist. Among them, damage of the attacks based flooding such as DoS or DDos is large and traceback of the attack node is not easy. It is because route information by moving of intermediate nodes which pass the data changes frequently. In this paper, we propose table-based traceback technique to perform efficient traceback although route information by moving of nodes changes frequently. Cluster head manages route management table in order to form cluster status table and network topology snapshot for storing the location information of mobile nodes when cluster member nodes change. Also, bloom filter is used to reduce the amount of storing route information. The performance of the proposed technique is confirmed through experiment.

A Conceptual Study on Evacuation Route Analysis and Development of Refuge Algoritm (피난 경로 분석 및 유도 알고리즘 개발에 관한 연구)

  • Park, Mi-Yun;Koo, Won-Yong;Park, Wan-Soon;Kwon, Se-Gon
    • Journal of Korean Society of Disaster and Security
    • /
    • v.8 no.1
    • /
    • pp.1-4
    • /
    • 2015
  • If a disaster occurs in the underground like subway, disaster response system should minimize the casualties. It must quickly guide passengers to a safe evacuation route. But sometimes the system does not work properly. And then they need distributed disaster response system which make decision autonomously. In this study, we proposed the evacuation route analysis and induction algorithms for creationg passenger evacuation route and offering optimal evacuation route.

Backward-Compatible Route Optimization in Mobile IP (Mobile IP에서의 역 방향 호환성 Route Optimization 방안)

  • Park, Hyun-Seo;Choi, Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10b
    • /
    • pp.1079-1082
    • /
    • 2000
  • 인터넷에서 호스트의 이동성을 지원해주기 위한 프로토콜인 Mobile IP 의 가장 근 문제점의 하나는 Triangle Routing Problem이며 이를 해결하기 위한 방안으로서 Route Optimization이 있다. 그러나, 이 방식은 Route Optimization 을 위해서 기존의 인터넷 호스트, 즉 Correspondent Node 가 Binding Cache를 유지하고, Encapsulation의 기능을 가져야 하고, Home Agent와 Security Association을 갖도록 변경이 불가피하다. 본 논문에서는 기존 인터넷 호스트에서의 변경을 필요로 하지 않는 새로운 Route Optimization 방안인 Backward-Compatible Route Optimization을 제시한다.

  • PDF

Novel Two-Level Randomized Sector-based Routing to Maintain Source Location Privacy in WSN for IoT

  • Jainulabudeen, A.;Surputheen, M. Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.285-291
    • /
    • 2022
  • WSN is the major component for information transfer in IoT environments. Source Location Privacy (SLP) has attracted attention in WSN environments. Effective SLP can avoid adversaries to backtrack and capture source nodes. This work presents a Two-Level Randomized Sector-based Routing (TLRSR) model to ensure SLP in wireless environments. Sector creation is the initial process, where the nodes in the network are grouped into defined sectors. The first level routing process identifies sector-based route to the destination node, which is performed by Ant Colony Optimization (ACO). The second level performs route extraction, which identifies the actual nodes for transmission. The route extraction is randomized and is performed using Simulated Annealing. This process is distributed between the nodes, hence ensures even charge depletion across the network. Randomized node selection process ensures SLP and also avoids depletion of certain specific nodes, resulting in increased network lifetime. Experiments and comparisons indicate faster route detection and optimal paths by the TLRSR model.

Intelligent Route Construction Algorithm for Solving Traveling Salesman Problem

  • Rahman, Md. Azizur;Islam, Ariful;Ali, Lasker Ershad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.33-40
    • /
    • 2021
  • The traveling salesman problem (TSP) is one of the well-known and extensively studied NPC problems in combinatorial optimization. To solve it effectively and efficiently, various optimization algorithms have been developed by scientists and researchers. However, most optimization algorithms are designed based on the concept of improving route in the iterative improvement process so that the optimal solution can be finally found. In contrast, there have been relatively few algorithms to find the optimal solution using route construction mechanism. In this paper, we propose a route construction optimization algorithm to solve the symmetric TSP with the help of ratio value. The proposed algorithm starts with a set of sub-routes consisting of three cities, and then each good sub-route is enhanced step by step on both ends until feasible routes are formed. Before each subsequent expansion, a ratio value is adopted such that the good routes are retained. The experiments are conducted on a collection of benchmark symmetric TSP datasets to evaluate the algorithm. The experimental results demonstrate that the proposed algorithm produces the best-known optimal results in some cases, and performs better than some other route construction optimization algorithms in many symmetric TSP datasets.

A Study on Trusted Routing Scheme for Secure Path and Secure Data Transmission in MANET (MANET에서 보안 경로와 안전한 데이터 전송을 위한 신뢰 기반 라우팅 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.43-51
    • /
    • 2017
  • Recently, MANET has been used in many fields as the range of applications increases. However, the dynamic topology that MANET has makes it difficult to route and provides the cause of exposure to security vulnerabilities. Therefore, the security features that can be robust to many attacks must have been applied in the routing technique provided in the MANET. In this paper, we propose a secure routing method that secure route is established by reliability evaluation of nodes and secure data communication has applied through key exchange mechanism. The proposed technique used hierarchical structure for efficiency of reliability evaluation of nodes. The reliability of nodes is performed by trust management node and reliability of nodes managed periodically is broadcasted. And the key exchange for secure data transmission is dene without CA as the certificate issuing organization. This allows fast key exchange and the integrity of data transmission improved. The proposed technique improves the security of the data transmission because a secure route to the destination node is established by the reliability evaluation and the data transmission is performed after the key between the source node and the destination node is exchanged through the established route.

Routing Protocol using One-Way Hash Functions for Mobile Ad Hoc Networks

  • Park, Young-Ho
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2007.02a
    • /
    • pp.26-31
    • /
    • 2007
  • An ad hoc network is a collection of mobile nodes without any Infrastructure. However, ad hoc networks are vulnerable to attacks such as routing disruption and resource consumption; thus, routing protocol security is needed This paper proposes a secure and efficient routing protocol for mobile ad hoc networks, where only one-way hash function are used to authenticate nodes in the ROUTE REQUEST, while additional public-key cryptography is used to guard against active attackers disguising a node in the ROUTE REPLY.

  • PDF