DOI QR코드

DOI QR Code

Routing Table Protection From an Attack to Falsify Hop Count in Mobile Ad-hoc Networks

모바일 애드 혹 네트워크(Mobile Ad-hoc Networks)에서 홉 카운트 변조 공격으로부터의 라우팅 테이블 보안

  • 김진희 (단국대학교 전자계산학과 컴퓨터과학) ;
  • 이재현 (단국대학교 전자계산학과 컴퓨터과학) ;
  • 권경희 (단국대학교 전자계산학과 컴퓨터과학)
  • Published : 2008.07.28

Abstract

The AODV routing algorithm in a mobile ad-hoc networks broadcasts RREQ packet to find a route from a source to a destination. An attacker node may intercept a RREQ packet and attack by falsifying a field in that packet. In this paper, we propose a simply modified method which can protect a routing table from an attack to falsify the hop count field in the RREQ packet. When establishing a connection between a source and a destination, we update routing table of each node on the connection based on minimum delay instead of minimum hop count. By doing this, we can protect routing table from an attack to falsify a hop count Our simulation is implemented in Network Simulator(NS-2). We analyze how an attacker affects the mobile ad-hoc networks. The result of the simulation shows that the proposed mechanism transfers a data securely.

Keywords

Ad-hoc;AODV;Security;Performance

References

  1. L. P. Larry and S. D. Bruce, Compuer Networks "Computer Networks : A Systems Approach," Morgan Kaufmann, 1999.
  2. 서현곤, 김기형, "애드 혹 네트워크 네트워크에서 AODV 에 기반한 효율적인 경로 복구 기법", KNOM Review, 제6권, 제1호, pp.1-8, 2003(6).
  3. 이명진, 김미희, 채기준, 김호원, "센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석", 정보처리학회 논문지 C, 제14-C권, 제3호, pp.0229-0238, 2007. https://doi.org/10.3745/KIPSTC.2007.14-C.3.229
  4. 김종천, 김영용, "AD Hoc 통신망 프로토콜 개발 동향", Telecommunications Reviw, Vol.12, No. 3, 2002.
  5. 김한식, 박현희, 강병석, 백상헌, 강철희, "모바일애드혹 네트워크에서 안전한 라우팅을 위한 경로조사 기법", 한국통신학회 '07 하계 학술 발표 논문집, 2007.
  6. M. G. Zapata and N. Asokan, "Security ad hoc routing protocols," ACM Wise2002, Vol.10, No.1, pp.1-10, 2002(10).
  7. S. J. Lee, B. H. Han, and M. H, Shin, "Robust routing in wireless ad hoc networks," in proc. ICCP2002, Vol.6, pp.73-78, 2002(8). https://doi.org/10.1109/ICPPW.2002.1039714
  8. M. G. Zapata, "Secure Ad hoc On-Demand Distance Vector SAODV) outing," IEEE Internetdraft, draft-guerrero-manet-saodv-06.txt>, 2006(9).
  9. K. Sanziri, B. Dahill, B. N. Levine, and E. M. B. Royer, "A secure routing protocol for ad hoc networks," in proc. ICNP2002, Vol.10, No.10, pp.78-87, 2002(11). https://doi.org/10.1109/ICNS.2007.18
  10. Y. C. Hu, D. B. Johnson, and A. Perrig, "Sead: Secure efficient distance vector routing in mobile wireless Ad Hoc networks," Proc. of Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02), pp.3-13, 2002. https://doi.org/10.1109/MCSA.2002.1017480
  11. K. Sanzgiri, "A Secure Routing Protocol for Ad Honc Networks," ICNP IEEE Press, 2002.
  12. Y. C. Hu, A. Perrig, and D. Johnson, "Ariadne A secure on demand routing protocol for Ad Hoc networks," Proc. of the 8th ACM International Conference on Mobile Computing and Networking, 2002.
  13. M. G. Zapata, "Secure Ad Hoc On-Demand Distance Vector (SAODV) Routing," Internet Draft: draft-guerrero-manetsaodv-00.txt, Work in Progress, 2002.
  14. http://www.ietf.org/rfc/rfc3561.txt.