DOI QR코드

DOI QR Code

Experiment and Analysis of Session-key Authentication Mechanism based on MANET

MANET 기반 세션키 인증기법의 실험 및 분석

  • 이철승 (광주여자대학교 교양교직과정부) ;
  • 정성옥 (광주여자대학교 보건행정학과)
  • Received : 2015.10.26
  • Accepted : 2015.12.24
  • Published : 2015.12.31

Abstract

Recently MANET application is diversified studies on the MANET routing security and the reliable authentication mechanism is actively in progress. Stand-alone network structure of a MANET is an important field of ubiquitous computing environment of interest, Authentication techniques are already provided safety when applied to MANET reliability and efficiency in a secure authentication mechanism using the session key. However, most of the MANET environment, the model has been based on the assumption that the safety is guaranteed, When applied to an actual network situation, we can not rule out a variety of threats. This study is the testing and analysis to add the malicious node extracted at random to demonstrate the safety and efficacy of the session key certification techniques of the MANET environment.

최근 MANET 응용이 다양화 되면서 MANET 라우팅 보안 및 신뢰성 있는 인증기법에 대한 연구가 활발히 진행 중에 있다. MANET의 독립적인 네트워크 구성은 유비쿼터스 컴퓨팅 환경의 중요한 관심분야이며, 세션키를 이용한 인증기법은 이미 신뢰성이 확보된 인증기법으로 MANET에 적용시 안전성과 효율성이 제공된다. 하지만 MANET 환경의 대부분의 모델들은 안전성이 보장된다는 가정 하에 진행되고 있으며, 실제 네트워크 상황에 적용 시 다양한 위협요소를 배제할 수 없다. 이에 본 연구는 MANET 환경의 세션키 인증기법의 안전성과 효율성을 증명하기 위해 무작위로 추출된 악의적인 이동노드를 추가하여 실험 및 분석을 한다.

Keywords

References

  1. B. Kadri, A. M'hamed, and M. Feham, "Secured Clustering Algorithm for Mobile Ad Hoc Networks," Int. J. of Computer Science and Network Security (IJCSNS), vol. 7, no. 3, 2007, pp. 27-34.
  2. Y. Kim, "Performance of VoIP Traffics over MANETs under DDoS Intrusions," J. of the Korea Institute of Electronic Communication Sciences, vol. 6, no. 4, 2011, pp. 493-498.
  3. C. Lee, "A Study on Effectiveness using Security Routing based on Mobile Ad-hoc Networks," Int. J. of Security and Its Applications (IJSIA), vol. 9, no. 7, 2015, pp. 141-152. https://doi.org/10.14257/ijsia.2015.9.7.13
  4. V. Boyko, P. MacKenzie, and S. Patel, "Provably secure password authenticated key exchange using Diffie_Hellman," Int. J. of the Lecture Notes in Computer Science (LNCS), vol. 1807, 2000, pp. 156-171.
  5. C. Lee, "A Routing Security Authentication using S-EKE in MANET Environments," J. of the Korea Institute of Electronic Communication Science, vol. 9, no. 4, 2014, pp. 433-438. https://doi.org/10.13067/JKIECS.2014.9.4.433
  6. D. Kim, S. Lee, and Y. Ko, "A New Visualization Tool for the ns-3 based Wireless Network Simulation," J. of the Korean Institute of Information Scientists and Engineers, vol. 38, no. 2, 2011, pp. 89-94.
  7. K. Choi, "Vehicle Collision Avoidance Sensor with Interference Immunity to Own Transmitted Sign," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 2, 2013, pp. 433-438. https://doi.org/10.13067/JKIECS.2012.7.2.433
  8. T. Kim, Y. Rhee, and S. Kim, "Implementation of a Microwave Doppler Sensor," J. of the Korea Institute of Electronic Communication Sciences, vol. 4, no. 2, 2009, pp. 75-81.