DOI QR코드

DOI QR Code

A Study on Secure Routing Technique using Trust Value and Key in MANET

신뢰도와 키를 이용한 보안 라우팅 기법에 관한 연구

  • 양환석 (중부대학교 정보보호학과)
  • Received : 2015.08.18
  • Accepted : 2015.09.04
  • Published : 2015.09.30

Abstract

MANET is composed of only the mobile nodes have a limited transmission range. The dynamic topology by the frequent movement of nodes makes routing difficult and is also cause exposed to security vulnerabilities. In this paper, we propose the security routing technique consisted of mechanism of two steps in order to respond effectively to attack by the modification of the routing information and transmit secure data. The hierarchical structure is used and the authentication node that issues the key of the nodes within each cluster is elected in this proposed method. The authentication node manages key issues and issued information for encrypting the routing information from the source node. The reliability value for each node is managed to routing trust table in order to secure data transmission. In the first step, the route discovery is performed using this after the routing information is encrypted using the key issued by the authentication node. In the second step, the average reliability value of the node in the found path is calculated. And the safety of the data transmission is improved after the average reliability value selects the highest path. The improved performance of the proposed method in this paper was confirmed through comparative experiments with CBSR and SEER. It was confirmed a better performance in the transmission delay, the amount of the control packet, and the packet transmission success ratio.

Keywords

References

  1. P. Papadimitratos and Z. J. Haas, "Secure Message Transmission in Mobile Ad Hoc Networks," Elsevier Ad Hoc Networks J., Elsevier, vol. 1, no. 1, 2003, pp. 193-209. https://doi.org/10.1016/S1570-8705(03)00018-0
  2. Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks," Proc. 22nd Ann. Joint Conf. IEEE Computer and Communications Societies (INFOCOM 2003), IEEE Press, 2003, pp. 1976-1986.
  3. S. Marti, T. J. Giuli, K. Lai and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. 6th Annual ACM/ IEEE Int'l. Conf. Mobile Computing and Networking, 2000, pp. 255-265.
  4. A. A. Pirzada, C. Mcdonald, and A. Datta, "Performance Comparison of trust-based Reactive Routing Protocols," IEEE Trans. Mobile Computing, vol. 5, Issue 6, June 2006, pp. 695-710. https://doi.org/10.1109/TMC.2006.83
  5. P. Papadimitratos and Z. J. Haas, "Secure Routing: Secure Data Transmission in Mobile Ad Hoc Networks," Proc. ACM Wksp. Wireless Security 2003, Sept. 2003, pp. 41-50.
  6. 양환석, 양정모, "MANET에서 효율적 역추적을 위한 경로관리에 관한 연구," 디지털산업정보학회 논문지, 제7권, 제4호, 2011, pp. 31-37.
  7. P. A. R Kumar, S. Selvakumar, "Distribute Denail-of-Service (DDoS) Threat in Collaborative Environment - A survey of DDoS Attack Tools and Traceback Mechanism" IEEE International Advance Computing Conference (IACC 2009), March 2009, pp. 1275-1280.
  8. M. N. Iqbal, J. A. Khan, F. Umer, N. Javaid, I. Haq, M. Shakir, "Security Enhancement of Pro-active Protocols in Mobile Ad-hoc Networks," 2013.
  9. S. A. Mahdi, M. Othman, H. Ibrahim, J. M. Desa and J. Sulaiman" Protocols For Secure Routing And Transmission In Mobile Ad Hoc Network: A Review" Journal of Computer Science, vol. 9, no. 5, 2013, pp. 607-619. https://doi.org/10.3844/jcssp.2013.607.619
  10. 왕종수, 서두옥, "극단적인 네트워크 환경을 위한 효율적인 라우팅 알고리즘," 디지털산업정보학회 논문지, 제8권, 제1호, 2012, pp. 171-179.

Cited by

  1. 개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구 vol.12, pp.3, 2015, https://doi.org/10.17662/ksdim.2016.12.3.133