DOI QR코드

DOI QR Code

MANET에서 계층 구조를 이용한 공격 탐지 기법 연구

A Study on Attack Detection using Hierarchy Architecture in Mobile Ad Hoc Network

  • 양환석 (중부대학교 정보보호학과)
  • 투고 : 2014.05.09
  • 심사 : 2014.06.02
  • 발행 : 2014.06.30

초록

MANET has various types of attacks. In particular, routing attacks using characteristics of movement of nodes and wireless communication is the most threatening because all nodes which configure network perform a function of router which forwards packets. Therefore, mechanisms that detect routing attacks and defense must be applied. In this paper, we proposed hierarchical structure attack detection techniques in order to improve the detection ability against routing attacks. Black hole detection is performed using PIT for monitoring about control packets within cluster and packet information management on the cluster head. Flooding attack prevention is performed using cooperation-based distributed detection technique by member nodes. For this, member node uses NTT for information management of neighbor nodes and threshold whether attack or not receives from cluster head. The performance of attack detection could be further improved by calculating at regular intervals threshold considering the total traffic within cluster in the cluster head.

키워드

참고문헌

  1. Ping Yi , Futai Zou, Yan Zou, and Zhiyang Wang, "Performance analysis of mobile ad hoc networks under flooding attacks," Journal of Systems Engineering and Electronics, April 2011, Vol. 22, No. 2, pp. 334-339. https://doi.org/10.3969/j.issn.1004-4132.2011.02.022
  2. Jonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter, "Detection of denial-ofmessage attacks on sensor network broadcasts," Proceedings of IEEE Symposium on Security and Privacy, May 2005, pp. 64-78.
  3. 왕종수, 서두옥, "극단적인 네트워크 환경을 위한 효율적인 라우팅 알고리즘," 디지털산업정보학회지, 제8권, 제1호, 2012, pp. 47-53.
  4. R. Ranjana and M. Rajaram, "Detecting Intrusion Attacks in Ad-hoc Networks," Asian journal in information technology, 2007, Vol. 6, No. 7, pp. 758-761.
  5. S. kannan, T. Kalaikumaran, S. Karthik and V. P. Arunachalam, "A Review on attack prevention methods in MANET," Journal of Modern Mathematics and Statistics, 2011, Vol. 5, No. 1, pp. 37-42. https://doi.org/10.3923/jmmstat.2011.37.42
  6. 양환석, "MANET에서의 의심노드 탐지 정확도 향상을 위한 기법 연구," 디지털산업정보학회지, 제9권, 제4호, 2013, pp. 95-101.
  7. P. Yi, Z. Dai, Y. Zhong and S. Zhang, "Resisting Flooding Attacks in Ad Hoc Networks," Proceedings of International Conference on Information Technology: Coding and Computing (ITCC'05), April 2005, pp. 657-662.
  8. Yi Ping, Hou Yafei, Bong Yiping, Zhang Shiyong & Dui Zhoulin, "Flooding Attacks and defence in Ad hoc networks," Journal of Systems Engineering and Electronics, 2006, Vol. 17, No. 2, pp. 410- 416. https://doi.org/10.1016/S1004-4132(06)60070-4
  9. Zhi Ang EU and Winston Khoon Guan SEAH,"Mitigating Route Request Flooding Attacks in Mobile Ad Hoc Networks," Proceedings of International Conference on Information networking (ICOIN-2006), Sendai, Japan, 2006.
  10. Mulert, J. V., I. Welchn and W. K. G. Seah, " Security threats and solutions in MANETs: A case study using AODV and SAODV," Journal of Network Computing Application, 2012, Vol. 35, pp. 1249-1259. https://doi.org/10.1016/j.jnca.2012.01.019