• 제목/요약/키워드: Secure routing

검색결과 150건 처리시간 0.021초

노드의 악의적 행위패턴 및 신뢰수준 기반의 MANET Secure 라무팅 방안 (A Secure Routing Protocol in MANET based on Malicious behavior Pattern of Node and Trust Level)

  • 박성승;박건우;류근호;이상훈
    • 한국컴퓨터정보학회논문지
    • /
    • 제14권5호
    • /
    • pp.103-117
    • /
    • 2009
  • 최근 MANET(Mobile Ad-Hoc Network)에서 보안요소를 추가한 라우팅 연구가 활발히 진행되어왔다. 그러나 기존 연구들은 secure 라우팅 또는 패킷 자체에 대한 악의적인 행위 탐지 중 어느 한 측면에 대해서만 연구가 되어왔다. 본 논문에서는 패킷 자체에 대한 악의적인 행위 및 라우팅 측면에서 보안 요소를 모두 고려한 SRPPnT(A Secure Routing Protocol in MANET based on Malicious Pattern on Node and Trust Level)를 제안한다. SRPPnT는 악의적인 행위가 이루어진 노드를 확인하여 각 노드에 대한 신뢰수준을 측정 후, 획득한 각 노드의 신뢰수준에 따라 라우팅 경로를 설정함으로써 패킷 및 라우팅 경로 설정에 대해 이루어질 수 있는 악의적인 행위를 효율적으로 대응할 수 있다. SRPPnT는 AODV(Ad-Hoc On-Demand Distance Vector Routing)를 기반으로 하였다. NS 네트워크 시뮬레이션 결과를 통해, 제안된 SRPPnT는 기존 프로토콜보다 네트워크 부하를 감소시킨 상태에서 악의적인 노드의 보다 정확하고 신속한 식별과 secure한 라우팅이 이루어짐을 확인하였다.

Security-Aware Optimized Link Routing Protocol for Mobile Ad-Hoc Networks

  • Dhir, Amandeep;Sengupta, Jyotsna
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제3권1호
    • /
    • pp.52-83
    • /
    • 2009
  • In this technical report, we have examined the basic building blocks of mobile ad-hoc networks. The paper discusses various security requirements of ad-hoc networks, attacks in ad-hoc networks, Security Implementation and Routing Protocols. The primary purpose of the paper is to address the Optimized Link State Routing (OLSR) protocol in detail, along with the various possible attacks. Finally, algorithms for securing OLSR are proposed, via the addition of digital signatures, as well as more advanced techniques such as cross checking of advertised routing control data with the node's geographical position. The main aim of this research work is the addition of security features to the existing OLSR protocol. In order to effectively design a secure routing protocol, we present a detailed literature survey of existing protocols, along with the various attacks. Based on the information gathered from the literature survey, a secure routing protocol for OLSR is proposed. The proposed secure routing protocol involves the addition of a digital signature as well as more advanced techniques such as the reuse of previous topology information to validate the actual link state. Thus, the main objective of this work is to provide secure routing and secure data transmission.

MANET에서 보안 경로와 안전한 데이터 전송을 위한 신뢰 기반 라우팅 기법에 관한 연구 (A Study on Trusted Routing Scheme for Secure Path and Secure Data Transmission in MANET)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제13권2호
    • /
    • pp.43-51
    • /
    • 2017
  • Recently, MANET has been used in many fields as the range of applications increases. However, the dynamic topology that MANET has makes it difficult to route and provides the cause of exposure to security vulnerabilities. Therefore, the security features that can be robust to many attacks must have been applied in the routing technique provided in the MANET. In this paper, we propose a secure routing method that secure route is established by reliability evaluation of nodes and secure data communication has applied through key exchange mechanism. The proposed technique used hierarchical structure for efficiency of reliability evaluation of nodes. The reliability of nodes is performed by trust management node and reliability of nodes managed periodically is broadcasted. And the key exchange for secure data transmission is dene without CA as the certificate issuing organization. This allows fast key exchange and the integrity of data transmission improved. The proposed technique improves the security of the data transmission because a secure route to the destination node is established by the reliability evaluation and the data transmission is performed after the key between the source node and the destination node is exchanged through the established route.

클러스터 기반 애드혹 네트워크 환경에서의 보안 라우팅 프로토콜 (Secure Routing Protocol in Cluster-Based Ad Hoc Networks)

  • 민성근;박요한;박영호;문상재
    • 한국통신학회논문지
    • /
    • 제37C권12호
    • /
    • pp.1256-1262
    • /
    • 2012
  • 이동 애드혹 네트워크는 고정된 기반 망의 도움 없이 이동 단말만으로 구성된 자율적이고 독립적인 네트워크이다. 최근 애드혹 네트워크의 보안성과 효율성을 높이는 방법으로 클러스터 기반 애드혹 네트워크가 대두되고 있다. 또한 이에 적합한 라우팅 프로토콜 역시 활발히 연구되고 있다. 하지만 클러스터 기반 ad-hoc 네트워크에서 보안을 고려한 라우팅 프로토콜에 대한 연구는 미흡한 실정이다. 본 논문에서는 클러스터 기반 애드혹 네트워크에서 공격에 안전한 보안 라우팅 프로토콜을 제안한다. 제안하는 보안 라우팅 프로토콜은 Diffie-Hellman 키 교환, HMAC, 디지털 서명 등을 사용하여 라우팅 메시지에 대한 무결성을 보장하여 안전한 경로 설정을 수행하였다.

Wireless Ad Hoc Network에서 보안 영역과 노드 인증을 이용한 보안 라우팅 기법에 관한 연구 (A Study on Secure Routing using Secure Zone and Nodes Authentication in Wireless Ad Hoc Network)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제10권3호
    • /
    • pp.161-169
    • /
    • 2014
  • Wireless Ad Hoc Network is suitable for emergency situations such as and emergency, disaster recovery and war. That is, it has a characteristic that can build a network and use without help of any infrastructure. However, this characteristic is providing a cause of many security threats. In particular, routing attack is not applied the existing routing methods as it is and it is difficult to determine accurately whether nodes that participate in routing is malicious or not. The appropriate measure for this is necessary. In this paper, we propose a secure routing technique through a zone architecture-based node authentication in order to provide efficient routing between nodes. ZH node is elected for trust evaluation of the member nodes within each zone. The elected ZH node issues a certification of the member nodes and stores the information in ZMTT. The routing involvement of malicious nodes is blocked by limiting the transfer of data in the nodes which are not issued the certification. The superior performance of the proposed technique is confirmed through experiments.

신뢰도와 키를 이용한 보안 라우팅 기법에 관한 연구 (A Study on Secure Routing Technique using Trust Value and Key in MANET)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제11권3호
    • /
    • pp.69-77
    • /
    • 2015
  • MANET is composed of only the mobile nodes have a limited transmission range. The dynamic topology by the frequent movement of nodes makes routing difficult and is also cause exposed to security vulnerabilities. In this paper, we propose the security routing technique consisted of mechanism of two steps in order to respond effectively to attack by the modification of the routing information and transmit secure data. The hierarchical structure is used and the authentication node that issues the key of the nodes within each cluster is elected in this proposed method. The authentication node manages key issues and issued information for encrypting the routing information from the source node. The reliability value for each node is managed to routing trust table in order to secure data transmission. In the first step, the route discovery is performed using this after the routing information is encrypted using the key issued by the authentication node. In the second step, the average reliability value of the node in the found path is calculated. And the safety of the data transmission is improved after the average reliability value selects the highest path. The improved performance of the proposed method in this paper was confirmed through comparative experiments with CBSR and SEER. It was confirmed a better performance in the transmission delay, the amount of the control packet, and the packet transmission success ratio.

The Wormhole Routing Attack in Wireless Sensor Networks (WSN)

  • Sharif, Lukman;Ahmed, Munir
    • Journal of Information Processing Systems
    • /
    • 제6권2호
    • /
    • pp.177-184
    • /
    • 2010
  • Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to the inherently constrained capabilities of sensor nodes. Although a wide variety of routing protocols have been proposed for WSNs, most do not take security into account as a main goal. Routing attacks can have devastating effects on WSNs and present a major challenge when designing robust security mechanisms for WSNs. In this paper, we examine some of the most common routing attacks in WSNs. In particular, we focus on the wormhole routing attack in some detail. A variety of countermeasures have been proposed in the literature for such attacks. However, most of these countermeasures suffer from flaws that essentially render them ineffective for use in large scale WSN deployments. Due to the inherent constraints found in WSNs, there is a need for lightweight and robust security mechanisms. The examination of the wormhole routing attack and some of the proposed countermeasures makes it evident that it is extremely difficult to retrofit existing protocols with defenses against routing attacks. It is suggested that one of the ways to approach this rich field of research problems in WSNs could be to carefully design new routing protocols in which attacks such as wormholes can be rendered meaningless.

Partially Distributed Dynamic Model for Secure and Reliable Routing in Mobile Ad hoc Networks

  • Anand, Anjali;Aggarwal, Himanshu;Rani, Rinkle
    • Journal of Communications and Networks
    • /
    • 제18권6호
    • /
    • pp.938-947
    • /
    • 2016
  • A mobile ad hoc network (MANET) is a collection of mobile nodes communicating in an infrastructure-less environment without the aid of a central administrating authority. Such networks entail greater dependency on synergy amongst the nodes to execute fundamental network operations. The scarcity of resources makes it economically logical for nodes to misbehave to preserve their resources which makes secure routing difficult to achieve. To ensure secure routing a mechanism is required to discourage misbehavior and maintain the synergy in the network. The proposed scheme employs a partially distributed dynamic model at each node for enhancing the security of the network. Supplementary information regarding misbehavior in the network is partially distributed among the nodes during route establishment which is used as a cautionary measure to ensure secure routing. The proposed scheme contemplates the real world scenario where a node may exhibit different kinds of misbehavior at different times. Thus, it provides a dynamic decision making procedure to deal with nodes exhibiting varying misbehaviors in accordance to their severity. Simulations conducted to evaluate the performance of the model demonstrate its effectiveness in dealing with misbehaving nodes.

이동 싱크를 가진 무선 센서 네트워크의 안전한 라우팅 기법 (A Secure Routing Scheme for Wireless Sensor Network with a Mobile Sink)

  • 김태균;김상진;이익섭;유동영;오희국
    • 정보보호학회논문지
    • /
    • 제15권2호
    • /
    • pp.53-64
    • /
    • 2005
  • 센서 네트워크에서 기존의안전한 라우팅 방식은 고정된 싱크(sink)를 가정하였다. 그러나 실제 센서 네트워크가 활용되는 많은 분야에서 싱크는 차량에 의해 이동되는 경우가 많다. 싱크의 이동은 감지된 데이터를 전달하기 위한 라우팅 경로의 재구성, 싱크의 위치 노출, 안전한 액세스 포인트 노드의 선택과 같은 기존의 연구에서 고려하지 않은 추가적인 문제점을 발생시틴다. 본 논문에서는 양방향 해쉬 체인과 그리드(grid) 형태의 위임 노드(delegation mode)를 이용하여 위의 문제점을 해결하는 기법을 제안한다. 요청-응답 프로토콜과 이벤트유도 프로토콜로 구성된 이 기법은 싱크의 이동에 따른 라우팅 경로를 안전하게 재구성해주고, 싱크의 위치 정보가 노출되지 않도록 보호해준다. 성능면에서 제안하는 기법은 경로를 저장하여 이용하는 라우팅 방식보다 통신 횟수가 적어 자원을 절약 할 수 있다. 본 논문은 제안한 시스템의 안전성 분석과 시뮬레이션을 통한 성능평가 결과를 보여준다.

ad-hoc 네트워크에서의 안전한 라우팅 기법에 관한 연구 (A Note on a Secure Routing Method for ad-hoc Networks)

  • 황정연;김경신;김형중;이동훈
    • 정보통신설비학회논문지
    • /
    • 제8권2호
    • /
    • pp.53-56
    • /
    • 2009
  • Kim et al. recently proposed an identity-based aggregate signature scheme to construct a secure routing protocol in ad-hoc networks. In this note, we unfortunately show that the identity-based aggregate signature scheme is universally forgeable, that is, anyone can forge the signature of any messages of its choice. This subsequently means that their secure routing protocol is not secure.

  • PDF