DOI QR코드

DOI QR Code

The Study on the Effective Prevention Mechanism of Masquerade Attacks on Wireless Ad hoc Network

무선 Ad hoc 네트워크의 효율적인 위장 공격 방지 메커니즘에 관한 연구

  • Published : 2006.12.31

Abstract

Securing wireless Ad hoc network including the secure mechanism design and implementation is generally more difficult for vulnerability of channels and nodes, the absence of infrastructure, topology that change dynamically, and etc, than ire network. The efforts of early researches are based on the adaptation of securing methods for the wire network to wireless ad hoc network. However, wireless ad hoc network could not get effective study finding because network has essential problems. This paper proposes that some new problems are being came to light over the survivability and availability of the network itself, that are caused by the massive packet attack of more than one or two nodes, and proves the consequence of this phenomenon. Also, we propose an effective prevention mechanism of masquerade attacks for survivability reinforcement that escape standard of the early way by survivability of wireless Ad hoc network and approaches for performance elevation and reflect special quality of wireless Ad hoc network.

무선 Ad hoc 네트워크는 통신 채널의 취약성, 노드의 보안 취약점, 기반 구조의 부재, 동적인 위상 변화 등의 특성으로 인해 보안 메커니즘 설계 및 구현이 기존 유선 네트워크에 비해 어려운 것으로 인식되고 있다. 기존의 연구들이 유선 네트워크의 보안을 무선 Ad hoc 네트워크로 적용하는데 많은 노력을 기울여 왔으나, 무선 Ad hoc 네트워크의 본질적인 문제로 인하여 효과적인 성과를 거두지 못하고 있다 본 논문은 무선 Ad hoc 네트워크의 보안 분야 중에서 하나 또는 둘 이상의 협업된 위장노드들의 대량의 위장 패킷 공격으로 인해 네트워크 자체의 생존성 및 가용성에 새로운 문제가 있음을 제기하고 그 결과를 증명한다. 또한 무선 Ad hoc 네트워크의 생존성 및 성능 향상을 위한 접근 방법으로 기존 방식의 기준을 탈피하여 무선 Ad hoc 네트워크의 특성을 반영하는 생존성 강화를 위하여 효율적인 위장 공격 방지 메커니즘을 제안한다.

Keywords

References

  1. C-K Toh, 'Ad hoc Mobile Wireless Networks', Prentice Hall PTR 2002
  2. Levente Buttyan, Jean-Pierre Hubaux, 'Report on a working session on security in wireless Ad hoc networks', ACM SIGMOBILE Mobile Computing and Communications Review, Volume 7 Issue 1, January 2003
  3. Soonjwa Hong, Seung Hyong Rhee, Jae-Cheol Ryou, 'Simulation-Based Analysis of DoS Attacks in Wireless Ad hoc Networks', IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, Vol.E87-D No. 10 pp. 2415-2418, October 2004
  4. A. Wood and J. Stankovic, 'Denial of service in sensor networks,' IEEE Computer, pp. 48-56, Oct. 2002
  5. P. Michiardi and R. Molva, 'Simulation- based analysis of security exposures in mobile Ad hoc networks,' European Wireless Conference, Feb. 2002
  6. P. Kyasanur and N. Vaidya, 'Diagnosing and penalizing MAC layer misbehavior in wireless networks,' Technical Report, Dept. of ECE, UIUC, Dec. 2002
  7. The CMU Monarch project's wireless and mobility extensions to ns, Snapshot Release 1.1.1, Carnegie mellon University, Aug. 1999
  8. HyoJun Lim, Chong-kwon Kim, 'Flooding in Wireless Ad hoc Networks', Computer Communications, Vol. 24, February 2001
  9. Manel, G.Z., 'Secure Ad hoc Ondemand Distance Vector Routing', IETF internet Draft draft-guerrero- manet-saodv-00.txt (work in progress), 2001
  10. Yih-Chun Hu, Adrian Perrig, David B. Johnson, 'Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks', In Proceedings of the 8th annual international conference on Mobile computing and networking, pp. 12-23.ACM Press, 2002
  11. Y.-C. Hu, D. B. Johnson, and A. Perrig. 'Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks', In Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications, page 3, 2002
  12. U. Lu, B.; Pooch. 'Cooperative security-enforcement routing in mobile ad hoc networks', Mobile and Wireless Communications Network, 2002
  13. Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 275-283, ACM Press, 2000
  14. C.-Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasit-tiporn, J. Rowe, and K. Levitt. 'A specificationbased intrusion detection system for aodv', In Proceedings of the 1st ACM workshop on Security of Ad hoc and sensor networks, pp. 125-134, ACM Press, 2003
  15. Amin Vahdat, Alvin Lebeck, Carla Schlatter Ellis, 'Every joule is precious: the case for revisiting operating system design for energy efficiency', Proceedings of the 9th workshop on ACM SIGOPS European workshop, September 2000
  16. Sung Park, Mani B. Srivastava, 'Dynamic battery state aware approaches for improving battery utilization', Proceedings of the 2002 international conference on Compilers, architecture, and synthesis for embedded systems, October 2002
  17. Mathias Bohge, Wade Trappe, 'An authentication framework for hierarchical ad hoc sensor networks', Proceedings of the 2003 ACM workshop on Wireless security, September 2003
  18. Andre Weimerskirch, Dirk Westhoff, 'Identity certified authentication for ad-hoc networks, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, October 2003
  19. He Huang, Shyhtsun Felix Wu, 'An approach to certificate path discovery in mobile Ad Hoc networks', Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, October 2003
  20. Jim Binkley, William Trost, 'Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems', Wireless Networks 7, pp. 139-145, 2001 https://doi.org/10.1023/A:1016633521987
  21. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, 'Random keyassignment for secure Wireless Sensor Networks', Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, October 2003
  22. D. B. Johnson, D. A. Maltz, and Yih-Chun Hu, 'The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks(DSR)', IETF MANET Working Group Internet draft, July 2004
  23. 박용우, '블루투스 기술발전에 따른 국내기업 의 대응전략', 정보통신정책, 제13권 14호 통권283호, pp. 1-26, 2002년 8월