DOI QR코드

DOI QR Code

Transmission Performance of Voice Traffic on MANET under Grayhole Attack

그레이홀 공격이 있는 MANET에서 음성 트래픽의 전송성능

  • Kim, Young-Dong (Dept. of Electric Railway Communications Engineering, Dongyang University)
  • 김영동 (동양대학교 철도전기통신학과)
  • Received : 2015.11.16
  • Accepted : 2015.12.24
  • Published : 2015.12.31

Abstract

Grayhole attack, one of attack to MANET routing function, is very severe in point of view of causing results which disturbs normal transmission function of network with uneasy finding of attacks. In this paper, effects of grayhole attack to application service on MANET is analyzed. Based on this analysis, some conditions is suggested for anti-intrusion to operate an application service on MANET under grayhole attack. This study is done with computer simulation based on NS-2 be added grayhole attack function which is implemented in this paper.

그레이홀 공격은 MANET의 라우팅 기능에 대한 공격의 하나로 전송되는 패킷의 일부만을 공격의 대상으로 삼고 있어 발견이 쉽지 않은 반면 네트워크의 정상적인 전송기능을 방해한다는 점에서 치명적인 결과를 초래할 수 있다. 본 논문에서는 그레이홀 공격이 MANET 응용 서비스에 미치는 영향을 분석하고, 이를 토대로 그레이홀 공격이 있는 MANET에서 특정한 응용 서비스를 운영하기 위한 침해대응 조건을 제시하였다. 본 연구는 NS-2를 기반으로 한 컴퓨터 시뮬레이션을 사용하여 수행하였다. 시뮬레이션에서 그레이홀 공격 기능은 본 연구에서 구현하여 사용하였다.

Keywords

References

  1. Y. Kim, "Transmission Performance of Application Service Traffic on MANET with IDS," In Proc. of Conf. on Korea Institute of Information anc Communication Engineering 2012, vol. 16, no. 1, Busan, Korea, May, 2012, pp. 584-587.
  2. Y. Kim, "Transmission Performance of Voice Traffic with Packet Aggregations on MANET under Black Hole Attacks," In Proc. of Conf. on The Korea Institute of Electronic Communication Sciences 2012, vol. 6 no. 1, Gwangju, Korea, June 2012, pp. 368-371.
  3. H. Simarenare and R. Sari, "Performance Evaluation of AODV Variants on DDoS, Blackhole and Malicious Attacks," Int. J. of Computer and Networks Security, vol. 11, no. 6, 2011, pp. 277-287.
  4. G. Neekhra, S. Patel, A. Verma, and A. Chaurasia, "Effect Of Grayhole Attack With Ids Technique For Aodv Routing Protocol Using Network Simulator," Int. J. of Advanced Research in Computer Engineering & Technology, vol. 3, issue 12, 2014, pp. 4184-4190.
  5. J. Kaur and V. Kumar, "An Effectual Defense Method against Gray Hole Attack in Wireless Sensor Networks," Int. J. of Computer Science and Information Technologues, vol. 3, no. 3, 2012, pp. 4523-4528.
  6. Y. Kim, "Transmission Performance of MANET under Grayhole Attack," In Proc. of Conf. on Korea Institute of Information and Communication Engineering 2015, vol. 19 no.1, Tongyeong, Korea, May, 2015, pp. 639-641.
  7. A. Bacioccola, C. Cicconetti, and G. Stea, "User - level Performance Evluation of VoIP using NS-2," In Proc. of 2nd Int. Conf. on Performance Evaluation Methodologies and Tools, Nantes, France, Oct. 2007.
  8. D. Choi, "Evaluation of VoIP Service Quality under the Roaming of Mobile Terminals," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, 2012, pp. 747-752. https://doi.org/10.13067/JKIECS.2012.7.4.747
  9. D. Choi, "Evaluation of VoIP Capacity for IEEE 802.11b WiFi Environment under Voice Coding Methods," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 2, Apr. 2012, pp. 243-248. https://doi.org/10.13067/JKIECS.2012.7.2.243
  10. B. Kim, "Software-based Quality Measurement of Mobile VoIP Services," J. of the Korea Institute of Electronic Communication Sciences, vol. 6, no. 1, 2011, pp. 55-60.