• 제목/요약/키워드: route security

검색결과 188건 처리시간 0.025초

Trust based Secure Reliable Route Discovery in Wireless Mesh Networks

  • Navmani, TM;Yogesh, P
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권7호
    • /
    • pp.3386-3411
    • /
    • 2019
  • Secured and reliable routing is a crucial factor for improving the performance of Wireless Mesh Networks (WMN) since these networks are susceptible to many types of attacks. The existing assumption about the internal nodes in wireless mesh networks is that they cooperate well during the forwarding of packets all the time. However, it is not always true due to the presence of malicious and mistrustful nodes. Hence, it is essential to establish a secure, reliable and stable route between a source node and a destination node in WMN. In this paper, a trust based secure routing algorithm is proposed for enhancing security and reliability of WMN, which contains cross layer and subject logic based reliable reputation scheme with security tag model for providing effective secured routing. This model uses only the trusted nodes with the forwarding reliability of data transmission and it isolates the malicious nodes from the providing path. Moreover, every node in this model is assigned with a security tag that is used for efficient authentication. Thus, by combining authentication, trust and subject logic, the proposed approach is capable of choosing the trusted nodes effectively to participate in forwarding the packets of trustful peer nodes successfully. The simulation results obtained from this work show that the proposed routing protocol provides optimal network performance in terms of security and packet delivery ratio.

Ad Hoc 기반 의료정보시스템의 네트워크 보안 효율성구조 Infrastructure 설계방법 (A Building Method of Infrastructure Efficiency under Ad Hoc-based on Network Infrastructure for Medical Information System)

  • 노시춘;유승재
    • 융합보안논문지
    • /
    • 제11권3호
    • /
    • pp.91-98
    • /
    • 2011
  • 의료정보시스템 상에서 ad hoc 기반으로 디자인 된 네트워크는 일반적인 정보시스템 네트워크와 보안 요구사항이 다르다. 의료정보 네트워크 구조상에서는 트래픽 소통경로를 따라 악성코드 침투와 보안기능이 수행된다. 의료정보시스템 보안도메인이란 침투와 방어기능이 수행되는 네트워크 구조상에서의 트래픽처리 영역과 그룹을 차별화 하여 구분시키는 개념이다. 의료정보시스템 보안도메인별 영역과 기능을 기준으로 도메인별로 차별화된 침투발생이 가능하고 따라서 도메인별로 차별화된 보안 메커니즘이 개발되고 적용되어야 한다. Ad Hoc 기반 의료정보시스템은 어떤 기준으로 효율성 구조 Infrastructure 설계가 이루어져야 하는가 방법론 도출을 위해 본 연구를 제안한다. 본 논문에서는 의료정보시스템 네트워크 형상(Topology) 결정 요소, 보안도메인 설정기준, 구조도 선택기준, 차단위치 결정 구성기준을 제시한다. 제안된 방법론을 적용할 경우 의료정보시스템 보안도메인 영역기준에 따라 차별화된 설계가 필요하며 보안효율을 증대시킬수 있음을 본 연구를 통해 설명하고자 한다.

제주 해군기지의 역할과 전망 (Roles and strategic functions of the Jeju Naval Base)

  • 이춘근
    • Strategy21
    • /
    • 통권39호
    • /
    • pp.140-162
    • /
    • 2016
  • The construction of Jeju Naval Base was finally completed and donated to the Republic of Korea Navy on February 26th this year. There is no doubt that the new base will contribute to the substantial augmentation of Korea's naval power and maritime security. However, we should note that the new naval base took a long and hard twenty-three years to be completed. In the 21st century, Korea should adopt a new strategy that can fulfill the security requirements of Korea for the new age of international relations. The 21st century is characterized by globalization, and in the world of globalization, a national boarder has become meaningless. In the late 20th century, after the Cold War, trade between countries have greatly increased and so did the importance of the seas. Having transformed from an agricultural country into a commercial country, Korea went from a continental state to a maritime state. Korea has become the 9th largest trading state, and obviously, the importance of the sea has become significant. Korea's national strategic focus needs to be on the sea for national survival. Thus, since the 1990s, the Korean Navy has planned to build the Jeju Naval Base. Jeju, due to its geopolitical characteristics, is extremely important to the 21st century Korea's economy and national security. Jeju is the starting point of the sea route that reaches out to the world, and at the same time, the ending point of the sea route that heads towards Korea. Jeju is located in the center of Northeast Asia and thus, Jeju Naval Base is extremely important for the area's security and order. Jeju Naval Base will be very useful not only for the maritime security of Korea, but also for keeping peace and order in Northeast Asia. Jeju Naval Base was the minimal effort against the six sea route security threats towards Korea. The six sea route threats are: 1) Threat from North Korea; 2) China's Threat towards Korea's sovereignty; 3) China's treat towards Korea's fishery; 4) Threat from Japan; 5) Threat towards Korea's sea routes; 6) Threat from recent phenomena of isolationism of the United States. Jeju Naval Base is built for both warships and civilian ships--such as cruise ships--to use. Just like the United States' Pearl Harbor, Jeju Naval Base will become not only the largest military base, but a beautiful tourist site.

대칭키 암호화를 이용한 Ad Hoc 네트워크에서의 안전한 경로발견 프로토콜 제안 (A Proposal of Secure Route Discovery Protocol for Ad Hoc Network using Symmetric Key Cryptography)

  • 박영호;이상곤;문상재
    • 한국산업정보학회논문지
    • /
    • 제13권1호
    • /
    • pp.68-75
    • /
    • 2008
  • Ad hoc 네트워크는 구성이 변하기 쉬운 환경이므로 불법 노드가 네트워크 자원소비 및 경로방해 등의 동작이 용이하므로 라우팅 프로토콜 보호가 필요하다. 본 논문에서는 대칭키 암호화 방식을 이용하여 효율적이고 안전한 경로발견 프로토콜을 제안한다. 제안한 프로토콜은 대칭키 암호화 방식을 이용하여 각 홉에서 처리하는 연산량을 줄이며 경로응답 시 암/복호화 과정이 있어 정당한 홉을 가장한 active 공격에 강하다.

  • PDF

Energy Efficiency Enhancement of TICK -based Fuzzy Logic for Selecting Forwarding Nodes in WSNs

  • Ashraf, Muhammad;Cho, Tae Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권9호
    • /
    • pp.4271-4294
    • /
    • 2018
  • Communication cost is the most important factor in Wireless Sensor Networks (WSNs), as exchanging control keying messages consumes a large amount of energy from the constituent sensor nodes. Time-based Dynamic Keying and En-Route Filtering (TICK) can reduce the communication costs by utilizing local time values of the en-route nodes to generate one-time dynamic keys that are used to encrypt reports in a manner that further avoids the regular keying or re-keying of messages. Although TICK is more energy efficient, it employs no re-encryption operation strategy that cannot determine whether a healthy report might be considered as malicious if the clock drift between the source node and the forwarding node is too large. Secure SOurce-BAsed Loose Synchronization (SOBAS) employs a selective encryption en-route in which fixed nodes are selected to re-encrypt the data. Therefore, the selection of encryption nodes is non-adaptive, and the dynamic network conditions (i.e., The residual energy of en-route nodes, hop count, and false positive rate) are also not focused in SOBAS. We propose an energy efficient selection of re-encryption nodes based on fuzzy logic. Simulation results indicate that the proposed method achieves better energy conservation at the en-route nodes along the path when compared to TICK and SOBAS.

A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks

  • Anand, Anjali;Rani, Rinkle;Aggarwal, Himanshu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4701-4719
    • /
    • 2015
  • A Mobile Ad hoc Network (MANET) consists of mobile nodes which co-operate to forward each other's packets without the presence of any centralized authority. Due to this lack of centralized monitoring authority, MANETs have become vulnerable to various kinds of routing misbehaviour. Sometimes, nodes exhibit non-cooperating behaviour for conserving their own resources and exploiting others' by relaying their traffic. A node may even drop packets of other nodes in the guise of forwarding them. This paper proposes an efficient Reputation and Collaboration technique through route-request for handling such misbehaving nodes. It lays emphasis not only on direct observation but also considers the opinion of other nodes about misbehaving nodes in the network. Unlike existing schemes which generate separate messages for spreading second-hand information in the network, nodes purvey their opinion through route-request packet. Simulation studies reveal that the proposed scheme significantly improves the network performance by efficiently handling the misbehaving nodes in the network.

서울여대 보안 동아리 스윙에 관한 소개와 연구활동 (Introduction SWING(Seoul Women's University Internet & Security Group) and Research Activities)

  • 김미애
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2003년도 하계학술대회논문집
    • /
    • pp.99-103
    • /
    • 2003
  • 서울여대 인터넷 보안 그룹인 스윙에 대해 소개하고, 현재 진행중인 연구활동에 대한 간략한 소개와 그중 안티바이러스 연구에 대해 좀 더 구체적으로 설명하도록 하겠다. 안티바이러스 연구의 내용 중 바이러스 감염 경로, 진단 방법, 기존 안티바이러스 엔진 동작 연구 수행 활동과 앞으로의 연구 방향에 대해서 다루도록 하겠다.

  • PDF

광우병과 크로이츠펠트 야콥병의 사회안전위협에 대한 안전대책 (Social Safty Measures against Creutzfedt-jakob's and Mad Cow Disease)

  • 김두현;김정현
    • 시큐리티연구
    • /
    • 제4호
    • /
    • pp.29-46
    • /
    • 2001
  • This research is based on the protection of the social safty with the preventive measures against Creutzfedt-jakob's and Mad cow Disease which has been drawn an attention of the public. It also has Known as an epidemic with rapid transmission an severe conteminaton to hurt the health through beef. In this work, some fruitful suggestions have been made to prevent and to minimize the harms Creutzfedt-jakob's and Mad Cow Disease : 1) We should Pay attention to the prior preventive measures by detecting the modes and the causes of the contemination lute route ; 2) there should be a step to inoculate the cattles to provide non-conteminated fresh feed for cows ; and 3) a health official should be alert to prevent the rapid transmission to the public by breaking the infected route of it.

  • PDF

A FUZZY-BASED APPROACH FOR TRAFFIC JAM DETECTION

  • Abd El-Tawaba, Ayman Hussein;Abd El Fattah, Tarek;Mahmood, Mahmood A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.257-263
    • /
    • 2021
  • Though many have studied choosing one of the alternative ways to reach a destination, the factors such as average road speed, distance, and number of traffic signals, traffic congestion, safety, and services still presents an indisputable challenge. This paper proposes two approaches: Appropriate membership function and ambiguous rule-based approach. It aims to tackle the route choice problem faced by almost all drivers in any city. It indirectly helps in tackling the problem of traffic congestion. The proposed approach considers the preference of each driver which is determined in a flexible way like a human and stored in the driver profile. These preferences relate to the criteria for evaluating each candidate route, considering the average speed, distance, safety, and services available. An illustrative case study demonstrates the added value of the proposed approach compared to some other approaches.

A Parallel Algorithm for Finding Routes in Cities with Diagonal Streets

  • Hatem M. El-Boghdadi
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.45-51
    • /
    • 2024
  • The subject of navigation has drawn a large interest in the last few years. The navigation within a city is to find the path between two points, source location and destination location. In many cities, solving the routing problem is very essential as to find the route between different locations (starting location (source) and an ending location (destination)) in a fast and efficient way. This paper considers streets with diagonal streets. Such streets pose a problem in determining the directions of the route to be followed. The paper presents a solution for the path planning using the reconfigurable mesh (R-Mesh). R-Mesh is a parallel platform that has very fast solutions to many problems and can be deployed in moving vehicles and moving robots. This paper presents a solution that is very fast in computing the routes.