DOI QR코드

DOI QR Code

Secure Routing Protocol in Cluster-Based Ad Hoc Networks

클러스터 기반 애드혹 네트워크 환경에서의 보안 라우팅 프로토콜

  • 민성근 (경북대학교 전자전기컴퓨터학부) ;
  • 박요한 (경북대학교 전자공학과) ;
  • 박영호 (경북대학교 산업전자공학과) ;
  • 문상재 (경북대학교 전자전기컴퓨터학부)
  • Received : 2012.08.31
  • Accepted : 2012.11.22
  • Published : 2012.12.28

Abstract

Mobile ad hoc networks (MANETs) are infrastructure-less, autonomous, and stand-alone wireless networks with dynamic topologies. Recently, cluster-based ad hoc networks which enhance the security and efficiency of ad hoc networks are being actively researched. And routing protocols for cluster-based ad hoc networks are also studied. However, there are few studies about secure routing protocols in cluster-based ad hoc networks. In this paper, we propose secure routing protocol for cluster-based ad hoc networks. We use Diffie-Hellman key agreement, HMAC, and digital signature to support integrity of routing messages, and finally can perform secure routing.

이동 애드혹 네트워크는 고정된 기반 망의 도움 없이 이동 단말만으로 구성된 자율적이고 독립적인 네트워크이다. 최근 애드혹 네트워크의 보안성과 효율성을 높이는 방법으로 클러스터 기반 애드혹 네트워크가 대두되고 있다. 또한 이에 적합한 라우팅 프로토콜 역시 활발히 연구되고 있다. 하지만 클러스터 기반 ad-hoc 네트워크에서 보안을 고려한 라우팅 프로토콜에 대한 연구는 미흡한 실정이다. 본 논문에서는 클러스터 기반 애드혹 네트워크에서 공격에 안전한 보안 라우팅 프로토콜을 제안한다. 제안하는 보안 라우팅 프로토콜은 Diffie-Hellman 키 교환, HMAC, 디지털 서명 등을 사용하여 라우팅 메시지에 대한 무결성을 보장하여 안전한 경로 설정을 수행하였다.

Keywords

Acknowledgement

Supported by : 한국연구재단

References

  1. M. S. Corson and J. Macker, "Mobile ad hoc networking(MANET): routing protocol performance issues and evaluation considerations," RFC 250, Internet Engineering Task Force, Jan. 1999.
  2. M. Abolhasan, T. Wysocki, and E. Dutkiewicz, "A review of routing protocols for mobile ad hoc networks," Ad Hoc Networks, vol. 2, no. 1, pp. 1-22, Jan. 2004. https://doi.org/10.1016/S1570-8705(03)00043-X
  3. M. J Kim and Y. I Eom, "Efficient route maintenance scheme for wireless ad-hoc network environments," J. The Korean Institute of communications and Information Sciences(KICS), vol. 30, no. 8A, pp. 639-648, Aug. 2005.
  4. C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination Sequenced Distance Vector Routing (DSDV) for Mobile Computers," Newslett. ACM SIGCOMM Comput. Commun. Rev., vol. 24, no. 4, pp. 234-244, Oct. 1994.
  5. C. E. Perkins, "Ad hoc on demand distance vector (AODV) routing," IETF Internet Draft, July 2003.
  6. C. E. Perkins, "Ad hoc on demand distance vector (AODV) routing," in Proc. IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90-100, LA, USA, Feb. 1999.
  7. Z. J. Hass and M. R. Pearlman, "The Zone Routing Protocol(ZRP) for Ad Hoc Networks," draft-Ietf-manet-zone-zrp-02.txt, June 1999.
  8. M. Rezaee and M. Yaghmaee, "Cluster based Routing for Mobile Ad Hoc networks," J. comput. sci., vol. 8, no. 2, pp. 30-36, June 2009.
  9. S. Gupte and M. Singhal, "Secure routing in mobile wireless ad hoc networks," Ad Hoc Networks, vol. 1, no. 1, pp. 151-174, Jan. 2003. https://doi.org/10.1016/S1570-8705(03)00017-9
  10. Y. C. Hu and A. Perring, "A survey of secure wireless ad hoc routing," IEEE, Security & Privacy, vol. 2, no. 3, pp. 28-39, June 2004.
  11. L. Tamilselvan and V. Sankaranarayanan, "Prevention of Blackhole Attack in MANET," in Proc. IEEE Int. Conf. Wireless Broadband and Ultra Wideband Commun., pp. 21-26, Sydney, NSW, Aug. 2007.
  12. B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour "A survey of routing attacks in mobile ad hoc networks," IEEE Wireless Commun., vol. 14, no. 5, pp. 85-91, Oct. 2007. https://doi.org/10.1109/MWC.2007.4396947
  13. R. H. Khokhar, M. A. Ngadi, and S. Mandala "A review of current routing attacks in mobile ad hoc networks," Int. J. Comput. Sci. and Secur. (IJCSS), vol. 2, no. 3, pp. 18-29, June 2008.
  14. A. Burak and M. Ufuk, "A formal security analysis of secure AODV using model checking," in Proc. ISCN, pp. 38-44, Istanbul, June 2008.
  15. B. Swetha and S. A. Kummar & TVS P. Gupta, "Flaws in Endair-A secure routing protocol for manets," Special Issue of Int. J. Comput. Sci. & Inform. (IJCSI), vol. 2, no. 1, pp. 127-132, Jan. 2012.
  16. Y. C. Hu, A. Perring, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," J. Wireless Networks, vol. 11, no. 1-2, pp. 21-38, Jan. 2005. https://doi.org/10.1007/s11276-004-4744-y
  17. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A secure routing protocol for ad hoc networks," in Proc. IEEE Int. Conf. Network Protocols, pp. 78-87, CA, USA, Nov. 2002.
  18. D. Benetti, M. Merro, and L. Vigano', "Model checking ad hoc network routing protocols: ARAN vs. Endaira," in Proc. IEEE Int. Conf. Software Engineering and Formal Methods (SEFM), pp. 191-202, Verona, Italy, Sep. 2010.
  19. A. F. A. Abidin, N. S. M. Usop, and N. H. N. Zulkifli, "An analysis on Endaira," Int. J. Comput. Sci. and Eng., vol. 2, no. 3, pp. 437-442, Mar. 2010.
  20. M. G. Zapata and N. Asokan, "Securing ad hoc routing protocols," in Proc. WISE, pp. 1-10, NY, USA, Sep. 2002.
  21. R. Poosarla, H. Deng, A. Ojha, and D. P. Agrawal, "A cluster Based Secure Routing Scheme for Wireless Ad Hoc Networks," in Proc. IEEE, Int. Conf. Perform., Comput., and Commun., pp. 171-175, OH, USA, April 2004.
  22. M. H. Guo, H. T. Liaw, D. J. Deng, and H. C. Chao, "Cluster-based secure communication mechanism in wireless ad hoc networks," Institution of Engineering and Technology Information Security, vol. 4, no. 4, pp. 352-360, Dec. 2010.