DOI QR코드

DOI QR Code

A Study on Trusted Routing Scheme for Secure Path and Secure Data Transmission in MANET

MANET에서 보안 경로와 안전한 데이터 전송을 위한 신뢰 기반 라우팅 기법에 관한 연구

  • 양환석 (중부대학교 정보보호학과)
  • Received : 2017.05.14
  • Accepted : 2017.06.12
  • Published : 2017.06.30

Abstract

Recently, MANET has been used in many fields as the range of applications increases. However, the dynamic topology that MANET has makes it difficult to route and provides the cause of exposure to security vulnerabilities. Therefore, the security features that can be robust to many attacks must have been applied in the routing technique provided in the MANET. In this paper, we propose a secure routing method that secure route is established by reliability evaluation of nodes and secure data communication has applied through key exchange mechanism. The proposed technique used hierarchical structure for efficiency of reliability evaluation of nodes. The reliability of nodes is performed by trust management node and reliability of nodes managed periodically is broadcasted. And the key exchange for secure data transmission is dene without CA as the certificate issuing organization. This allows fast key exchange and the integrity of data transmission improved. The proposed technique improves the security of the data transmission because a secure route to the destination node is established by the reliability evaluation and the data transmission is performed after the key between the source node and the destination node is exchanged through the established route.

Keywords

References

  1. Sevil Sen, John A. Clark and Juan E. Tapiador, "Security Threats in Mobile Ad Hoc Networks Auerbach Publications," 2011, pp. 1-20.
  2. Durgesh Wadbude and Vineet Richariya, "An Efficient Secure AODV Routing Protocol in MANET," International Journal of Engineering and Innovative Technology, Vol. 1(4), 2012, pp. 274-279.
  3. ditya Bakshi, A.K.Sharma and Atul Mishra, "Significance of Mobile Ad-Hoc Networks (MANETs)," International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol.2(4), 2013, pp. 1-5.
  4. harma, D., V. Kumar, and R. Kumar, "Prevention of Wormhole Attack Using Identity Based Signature Scheme in MANET," Comput. Int. in Data Mining, 2016, pp. 475-485.
  5. 양환석, "신뢰도와 키를 이용한 보안 라우팅 기법에 관한 연구," 디지털산업정보학회지, 제11권 제3호, 2015, pp. 69-77.
  6. Kumar, V., and R., Kumar, "An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET," Security in Comp. & Comm., 2015, pp. 110-112.
  7. Maulik, R., and N. Chaki, "A Comprehensive Review on Wormhole Attacks in MANET," Int. Conf. on Com. Info. Syst. and Industrial Management Applications, 2013, pp. 233-238.
  8. M. Hossain, V. Raghunathan, Aegis, "A lightweight rewall for wireless sensor networks," Distributed Computing in Sensor Systems, 2010, pp. 258-272.
  9. 왕종수, 서두옥, "Sparse M2M 환경을 위한 DTMNs 라우팅 프로토콜," 디지털산업정보학회지, 제10권 제4호, 2014, pp. 11-18.
  10. G. Acs, L. Buttyan, and L. Dora. "Misbehaving router detection in link-state routing for wireless mesh networks," In Proc. of WoWMoM, 2010, pp. 1-6.