DOI QR코드

DOI QR Code

An Efficient Detection And Management Of False Accusation Attacks In Hierarchical Ad-Hoc Networks

  • Lee, Yun-Ho (Department of Defense Information Science, Korea National Defense University) ;
  • Yoo, Sang-Guun (Department of Computer Science and Engineering, Sogang University) ;
  • Lee, Soo-Jin (Department of Defense Information Science, Korea National Defense University)
  • Received : 2011.05.18
  • Accepted : 2012.06.20
  • Published : 2012.07.31

Abstract

An approach to detect abnormal activities based on reputations created individually by each node is vulnerable to a false accusation since intrusion detection in ad-hoc networks is done in a distributed and cooperative manner. Detection of false accusation is considered important because the efficiency or survivability of the network can be degraded severely if normal nodes were excluded from the network by being considered as abnormal ones in the intrusion detection process. In this paper, we propose an improved reputation-based intrusion detection technique to efficiently detect and manage false accusations in ad-hoc networks. Additionally, we execute simulations of the proposed technique to analyze its performance and feasibility to be implemented in a real environment.

Keywords

References

  1. P. Michiardi, and R. Molva, "Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks," in Proc. of European Wireless 2002 Conference, 2002.
  2. Y. Zhang, and W. Lee. "Intrusion detection in wireless ad-hoc networks," in Proc. of 6th ACM Annual International Conference on Mobile Computing and Networking, pp.275-283, Aug.2000.
  3. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. of 6th ACM Annual International Conference on Mobile Computing and Networking, pp.255-265, Aug.2000.
  4. S. Buchegger, and J-Y. L. Boudec, "Nodes Bearing Grudges: towards routing security, fairness and robustness in mobile ad hoc networks," in Proc. of 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, pp.403-410, Jan.2002.
  5. S. Buchegger, and J-Y. L. Boudec, "Performance analysis of the CONFIDANT Protocol," in Proc. of the 3rd ACM International Symposium on Mobile ad hoc networking & computing, pp.226-236, 2002.
  6. K. Chang, and J-L Chen, "A Survey of Trust Management in WSNs, Internet of Things and Future Internet," KSII Transactions on Internet and Information System, vol.6, no.1, pp.5-23, Jan.2012
  7. P. Kyul, H. Nishiyama, N.Ansari, and N. Kato, "certificate revocation to cope with false accusations in mobile ad hoc networks," in Proc. of 71st IEEE Vehicular Technology Conference, pp.1-5, May,2010.
  8. A. Kathirvel, and R. Srinivasan, "Self_USS:A self umpiring system for security in mobile ad hoc network," International Journal of Engineering and Technology, vol.2, no.2, pp.196-203, Apr.2010.
  9. C. Tseng, T. Song, P. Balasubramanyam, A. Ko, and K. Levitt, "A specification-based Intrusion Detection Model for OLSR", LNCS, vol.3858, pp.330-350, 2006.
  10. A. Mitrokotsa, R. Mavropodi, and C. Douligeris, "intrusion detection of packet dropping attacks in mobile ad hoc networks," in Proc. of International Conference on Intelligent Systems and Computing: Theory And Applications, pp.111-118, Jul.2006.
  11. O. Gonzalez, G. Ansa, M. Howarth, and G. Pavlou, "Detection and accusation of packet forwarding misbehavior in mobile ad-hoc networks," Journal of Internet Engineering, pp.181-192, Jun.2008.
  12. J. Sen, and K. Goswami, "An algorithm for detection of selfish nodes in wireless mesh networks," in Proc. of the International Symposium on Intelligent Information Systems and Applications, pp.571-576, Oct.2009.
  13. T. Anantvalee, and J. Wu, "A survey on intrusion detection in mobile ad hoc networks," Book Series Wireless Network Security, Springer, pp.170-196, 2007.
  14. V. Gokhole, S.K. Ghosh, and A. Gupta, "classification of attacks on wireless mobile ad hoc networks and vehicular ad hoc networks," Taylor and Francis Group, eBook, pp.195-225, 2011.
  15. C. K. Toh, E.C. Lee, and N.A. Ramos, "Next-Generation Tactical Ad Hoc Mobile Wireless Networks," NORHTROP GRUMMAN Technology Review Journal, pp.103-116, Spring/Summer 2004.
  16. J. Brand, and G. Hartwig, "Management of tactical ad hoc networks with C2 data models," in Proc. of MILCOM 2001, pp.915-922, Aug.2001.
  17. M. Popa, C. Moica, A.S. Popa, D. Mnerie, "Hierarchical Ad Hoc Networks", in Proc. of IEEE EUROCON 2007, The International Conference on "Computer as a Tool", pp.2509-2516, 2007.
  18. S-J. Yoon, S-H. Lee, Y-B. Ko, "Reliable dual-path geocasting for tactical ad hoc networks," in Proc. of MILCOM 2009, pp.1-7, Oct.2009.
  19. H. Wang, Y. Wang, J. Han, "A security architecture for tactical mobile ad hoc networks," in Proc. Of IEEE 2nd International Workshop on Knowledge Discovery and Data Mining, pp.312-315, Jan.2009.
  20. F.R. Yu, H. Tang, P.C. Mason, Wang Fei, "A hierarchical identity based key management scheme in tactical mobile ad hoc networks," IEEE Transactions on Network and Service Management, vol.7, no.4, pp.258-267, Dec.2010. https://doi.org/10.1109/TNSM.2010.1012.0362
  21. S-W. Lee, J. Y. Choi, K. W. Lim, Y-B. Ko, and B-H. Roh, "a reliable and hybrid multi-path routing protocol for multi-interface tactical ad hoc networks," in Proc. of MILCOM 2010, pp.2237-2242, Nov.2010.
  22. C. E. Perkins, and E. M. Royer, "Ad-hoc on-demand distance vector routing," in Proc. of 2nd IEEE Workshop on Mobile Computer Systems and Applications, pp.90-100, Feb., 1999.