DOI QR코드

DOI QR Code

A Design of ETWAD(Encapsulation and Tunneling Wormhole Attack Detection) based on Positional Information and Hop Counts on Ad-Hoc

애드 혹 네트워크에서 위치 정보와 홉 카운트 기반 ETWAD(Encapsulation and Tunneling Wormhole Attack Detection) 설계

  • Received : 2012.10.23
  • Accepted : 2012.11.14
  • Published : 2012.11.30

Abstract

This paper proposes an ETWAD(Encapsulation and Tunneling Wormhole Attack Detection) design based on positional information and hop count on Ad-Hoc Network. The ETWAD technique is designed for generating GAK(Group Authentication Key) to ascertain the node ID and group key within Ad-hoc Network and authenticating a member of Ad-hoc Network by appending it to RREQ and RREP. In addition, A GeoWAD algorithm detecting Encapsulation and Tunneling Wormhole Attack by using a hop count about the number of Hops within RREP message and a critical value about the distance between a source node S and a destination node D is also presented in ETWAD technique. Therefore, as this paper is estimated as the average probability of Wormhole Attack detection 91%and average FPR 4.4%, it improves the reliability and probability of Wormhole Attack Detection.

본 논문에서는 애드 혹 네트워크의 노드 위치 정보와 홉 수를 이용하여 캡슐화 웜홀 공격과 터널링 웜홀 공격을 탐지하는 ETWAD(Encapsulation and Tunneling Wormhole Attack Detection) 기법을 설계하였다. ETWAD 탐지 기법은 애드 혹 네트워크 내의 노드 ID와 그룹 키로 노드의 신분을 확인할 수 있는 GAK(Group Authentication Key)를 생성하여 RREQ와 RREP에 추가하여 애드 혹 네트워크의 구성원임으로 인증할 수 있도록 설계하였다. 또한, ETWAD 탐지 기법은 RREP 메시지 내의 홉 수를 카운트하고, 근원지 노드 S와 목적지 노드 D의 거리를 계산하여 임계치와 홉 수를 이용하여 캡슐화 웜홀 공격, 터널링 공격을 탐지하는 GeoWAD 알고리즘을 설계하였다. 그 결과, 평균 웜홀 공격 탐지율이 91%, 평균 FPR이 4.4%로 평가되므로 ETWAD 탐지 기법은 웜홀 공격 탐지율과 웜홀 공격 탐지의 신뢰성을 향상시켰다고 볼 수 있다.

Keywords

References

  1. Yih-ChunHu, "Wormhole Attack in Wireless Networks," IEE EJournal, Communication, Vol.24, No.2, pp. 370-380, Feb. 2006
  2. Yih-Chun Hu, Adrian Perrig and David B. Johnson, "Packet Leashes : A Defense against Wormhole Attacks in Wireless AdHoc Networks," In Proceedings of IEEE INFOCOM 2003, pp.1976-1986, April 2003
  3. Adrian Perrig, Ran Canetti, J. D. Tygar, andDawn Song, "Efficient Authentication and Signing of Multicast Streams over Lossy Channels," Security and Privacy 2000 IEEE, pp.56-73, May 2000
  4. R. L. Rivest, "Amethod for obtaining digital signature and public-key cryptosystems," Communication of the ACM, Vol.21, No.2, pp.120-126, Feb. 1978 https://doi.org/10.1145/359340.359342
  5. Intae Kim, Seungjin Han and Junghyun Lee, "Wormhole Detection using Multipath in Sensor Network," KSCI review, Vol.15, No.1, pp.77-81, 2007
  6. Issa Khalil, Saurabh Bagehi and Nesss B. Shroff, "LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks," In Proceedings of the International Conference on Dependable Systemand Networks, pp.612-621, 2005
  7. A. VANI and D. Sreenivasa Rao, "A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks," IJCSE, Vol.3, No.6, pp. 2377-2384, June 2011
  8. Khin Sandar Win, "Analysis of Detecting Wormhole Attack in Wireless Networks," World Academy of Science, Engineering andTechnology 48, pp.422-423, 2008
  9. Jun Jie Piao and TaeMu Chang, "Transmission Power Based Source Routing Protocol for Mobile Ad Hoc Networks with Unidirectional Links," ICHIT 2011, LNCS Vol.6935, pp. 146-153, Sept. 2011
  10. Rakesh Babu Bobba, Laurent Eschenauer, Virgil Gligor and William Arbaugh, "Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks." Technical Report TR 2002-44, University of Maryland, May 2002
  11. The Network Simulator NS-2, http://www.isi.edu/ nsnam/ns/
  12. Nam: Network Animator, http://www.is.edu/nsnam/ nam

Cited by

  1. 자발적 공유 경제 방식의 개인 콘텐츠 관리 및 공유 시스템 vol.19, pp.9, 2012, https://doi.org/10.9717/kmms.2016.19.9.1698