DOI QR코드

DOI QR Code

A Design of TNA(Traceback against Network Attacks) Based on Multihop Clustering using the depth of Tree structure on Ad-hoc Networks

애드혹 네트워크 상에 트리구조 깊이를 이용한 다중홉 클러스터링 기반 TNA(Traceback against Network Attacks) 설계

  • Received : 2012.07.13
  • Accepted : 2012.09.14
  • Published : 2012.09.30

Abstract

In the current MANET, DOS or DDOS attacks are increasing, but as MANET has limited bandwidth, computational resources and battery power, the existing traceback mechanisms can not be applied to it. Therefore, in case of traceback techniques being applied to MANET, the resource of each node must be used efficiently. However, in the traceback techniques applied to an existing ad hoc network, as a cluster head which represents all nodes in the cluster area manages the traceback, the overhead of the cluster head shortens each node's life. In addition, in case of multi-hop clustering, as one Cluster head manages more node than one, its problem is getting even worse. This paper proposes TNA(Traceback against Network Attacks) based on multihop clustering using the depth of tree structure in order to reduce the overhead of distributed information management.

현재 MANET에서는 DOS나 DDOS 공격이 증가하고 있지만, MANET은 제한된 대역폭, 계산 자원 및 배터리 전원을 가진 노드들로 구성된 네트워크이기 때문에 기존의 역추적 메커니즘을 적용할 수가 없다. 따라서 MANET에서 역추적 기법을 적용 시킬 시에는 각 노드가 가지는 자원을 효율적으로 사용해야한다. 그러나 기존의 애드혹 네트워크에 적용한 역추적 기법은 클러스터링 영역에서 각 노드를 대표하는 Cluster head가 역추적 정보를 관리하기 때문에 Cluster head의 과부하로 노드의 수명을 단축시키는 문제점을 가지게 된다. 게다가, 다중홉 클러스터링일 경우, 하나의 Cluster head가 더 많은 노드를 관리하기 때문에 문제는 더욱 심각해진다. 본 논문에서는 이러한 Cluster head의 오버헤드를 줄이기 위한, 역추적 정보를 관리하기 위하여 트리구조의 깊이를 이용한 TNA(Traceback against Network Attacks)를 제안한다.

Keywords

References

  1. Geun-Bin Hong, Ji-hun Yun, Kwan-Woong Kim, "Study of the Wireless Ad-hoc Networks with Robust Route Maintenance Scheme." KIIECT vol.3, no.2, pp.46-49, Jun. 2010.
  2. In-ho Yeo, Hyo-sik Yang, Jong-Myung Rhee "Impacts of Radio Propagation Model on Mobile Ad-hoc Network (MANET) Performance in Group Mobility Environments" KIIECT vol.3, no.3, pp.62-72, Sep. 2010.
  3. Y Kim, A Helmy, "Attacker Tracevack With Cross-layer Monitoring in Wireless Multi-hop Networks." SASN, Oct. 2006
  4. I1 yong Kim, Ki Chang Kim, "A Resource-efficient IP Traceback Technique for Mobile Ad-hoc Networks Based on Time-tagged Bloom Filter." ICCIT. Nov. 2008
  5. yatagai, Iwao sasase, m_ishii, "Hierarchical traceback method using clustering for mobile ad hoc networks", PIMRC IEEE. PP. 2623-2627, 2009
  6. Yongjin Kim, Ahmed Helmy, "SWAT : Small World-based Attacker Traceback in ad-hoc Networks." MOBIQUITOUS, Jul. 2005
  7. yi-sn husng, wenke Lee. "hotspot-Based for Mobile Ad-hoc Networks," ACM Pro. of the 4th ACM workshop on wireleess security. pp. 43-54. Sept. 2005
  8. Y. Huang and W. Leem "A Cooperative Intrusion Detection System for Ad Hoc Networks." Pro. of the ACM Workshop on Security in Ad hoc and Sensor Networks. Fairfax, VA. USA. 2003.
  9. MAINAK CHATTETJEE, SAJAL K. DAS and DAMLA TURGUT, "WCA: A Weighted Clustering Algorithm for Mobile AD Hoc Networks", Cluster Computing 5, pp.193-204, 2002 https://doi.org/10.1023/A:1013941929408
  10. Sung-Gook Lim, Hun-je Yeon, JaiYong Lee "Adaptive Clusterhead Positioning for Muti-hop Ad-hoc Networks" JCCI 2006