DOI QR코드

DOI QR Code

A Routing Security Authentication using S-EKE in MANET Environments

MANET 환경에서 S-EKE를 이용한 라우팅 보안 인증

  • 이철승 (광주 여자대학교 교양.교직과정부)
  • Received : 2014.01.21
  • Accepted : 2014.04.11
  • Published : 2014.04.30

Abstract

The demanding in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on MANET and the application of MANET has been paid much attention as a Ubiquitous computing which is growing fast in the field of computer science. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing but have vulnerable points, about lack of dynamic network topology due to mobility, network scalability, passive attacks, and active attacks which make it impossible to manage continuous security authentication service. In this study, proposes S-EKE authentication mechanism for a robust authentication based on MANET and through identify wireless environment security vulnerabilities, currently being used in OTP S/Key and DH-EKE analyzes.

독립된 네트워크의 구성 및 컨버전스 디바이스간 상호연결에 대한 요구로 MANET의 연구는 유비쿼터스 컴퓨팅 활용에 많은 주목과 고도의 성장을 보이고 있다. MANET에 참여하는 이동노드들은 호스트와 라우터 기능을 동시에 수행하여 네트워크 환경설정이 쉽고 빠른 대응력으로 임베디드 컴퓨팅에 적합하지만, 이동성으로 인한 동적 네트워크 토폴로지, 네트워크 확장성 결여 그리고 수동적 공격, 능동적 공격에 대한 취약성을 지니고 있어 지속적인 보안 인증 서비스를 관리할 수 없다. 본 논문은 MANET의 무선 보안의 취약성과 현재 활용되고 있는 OTP S/Key와 DH-EKE를 분석하여, MANET 기반 강인한 인증을 위해 S-EKE 인증기법을 제안한다.

Keywords

References

  1. B. Kadri, A. M'hamed, and M. Feham, "Secured Clustering Algorithm for Mobile Ad Hoc Networks," Int. J. of Computer Science and Network Security IJCSNS, vol. 7, no. 3, Mar. 2007, pp. 27-34.
  2. Y.-D. Kim, "Performance of VoIP Traffics over MANETs under DDoS Intrusions," J. of The Korea Institute of Electronic Communication Sciences, vol. 6, no. 4, 2011, pp. 493-498.
  3. X. Jia, J. Wu, and Y. He, "Mobile Ad-hoc and Sensor Networks," Proc. Lecture Notes in Computer Science First International Conference MSN 2005, vol. 3794, Springer, 2005, pp. 164-174.
  4. R. Zheng and R. Kravets, "On-demand power management for Ad Hoc networks," Twenty-Second Annual Joint Conf. of the IEEE Computer and Communications Societies 2003 (INFOCOM 2003), vol. 1, Mar. 2003, pp. 481-491.
  5. K. Kim, S. Bae, and D. Kim, "An Enhanced Robust Routing Protocol in AODV over MANETs," J. of The Korea Institute of Electronic Communication Sciences, vol. 4, no. 1, 2009, pp. 13-18.
  6. C.-K. Toh, "Ad Hoc Mobile Wireless Networks Protocols and System," Prentice Hall, Jan. 2004, pp. 200-252.
  7. Y.-D. Kim, "Transmission Performance of VoIP Traffics over MANETs under Multi Intrusions," J. of The Korea Institute of Electronic Communication Sciences vol. 7, no. 2, 2012, pp. 258-263.
  8. A. Patwardhan, J. Parker, A. Joshi, A. Karygiannis, and M. Iorga, "Secure Routing and Intrusion Detection in Ad Hoc Networks," Third IEEE Int. Conf. on Pervasive Computing and Communications, Mar. 2005.
  9. V. Boyko, P. MacKenzie, and S. Patel, "Provably secure password authenticated key exchange using Diffie_Hellman," Advances in Cryptology-Eurocrypt 2000, May 2000, pp. 14-18.
  10. C.-S. Lee, "A Study on MD5 Security Routing based on MANET," J. of The Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, 2012, pp. 797-803.