• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document : 27 / 102 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) MANET¿¡¼­ÀÇ ÀüÆĹæÇØ °ø°Ý ŽÁö
¿µ¹®Á¦¸ñ(English Title) Detecting Jamming Attacks in MANET
ÀúÀÚ(Author) Rakesh Shrestha   ÀÌ»ó´ö   ÃÖµ¿À¯   ÇѽÂÁ¶   Rakesh Shrestha   Sang-duk Lee   Dong-you Choi   Seung-jo Han   Corresponding author   Seung-jo Han  
¿ø¹®¼ö·Ïó(Citation) VOL 13 NO. 03 PP. 0482 ~ 0488 (2009. 03)
Çѱ۳»¿ë
(Korean Abstract)
¸ð¹ÙÀÏ Ad-hoc ³×Æ®¿öÅ©´Â ÀçÇØÁö¿ªÀ̳ª ºü¸¥ ±¸¼ºÀ» ÇÊ¿ä·Î ÇÒ ¶§ Áß¾Ó ÁýÁß ±¸Á¶ ÇüÅ°¡ ¾ø´Â Åë½ÅÀ» Á¦°øÇÏ¿© ÁØ´Ù. ¹Ý¸é¿¡ ¾ÇÀÇÀûÀÎ °ø°Ý°ú »çÀü º¸¾È ÃøÁ¤ ºÎÁ·À¸·Î ÀÎÇÑ °³¹æÇü Ad-hoc ³×Æ®¿öÅ© ±¸Á¶¿¡ ¶§¹®¿¡ ´Ù¸¥ °èÃþ¿¡¼­ ¹®Á¦¿¡ Á÷¸éÇÒ ¼ö ÀÖ´Ù. DOS°ø°ÝÀº ÀüÆÄ Àü¼Û ä³Î¿¡¼­ ¹æÇظ¦ ÇÏ´Â °ø°ÝÁß ÇϳªÀ̸ç ÀüÆĹæÇØ °ø°ÝÀ¸·Î ¾Ë·ÁÁ® ÀÖ´Ù. ÀÌ·¯ÇÑ Á¾·ùÀÇ °ø°ÝÀº °ø°ÝÀÚ°¡ ÆÐŶÀ» ¹æÇØÇÏ´Â ½ÅÈ£¸¦ º¸³»°í ÆÐŶÀÌ Àü¼ÛµÇ´Â µ¿¾È ¸¹Àº ¿¡·¯¿Í ½É°¢ÇÑ ¹®Á¦¸¦ ¹ß»ý½ÃŲ´Ù. ±× °á°ú ÀÌ·¯ÇÑ Á¾·ùÀÇ °ø°ÝÀ» ¹æÁöÇϱâ À§ÇÑ ¹æ¹ýÀÌ ¿ä±¸µÈ´Ù. µû¶ó¼­ º» ³í¹®¿¡¼­´Â ³×Æ®¿öÅ© ½Ã¹Ä·¹ÀÌÅÍÀÎ OPNETÀ» È°¿ëÇÏ¿© DoS °ø°Ý°ú °¢ ³ëµå »ó¿¡¼­ ÀüÆĹæÇØ °ø°Ý ½Ã¹Ä·¹À̼ÇÀ» ¼öÇàÇÏ¿´°í, ¸ð¹ÙÀÏ Ad-hoc ³×Æ®¿öÅ©¿¡¼­ ÀüÆĹæÇØ¿¡ ÀÇÇÑ Ã¤³Î Á¢±ÙÀ» ¹æÇØÇÏ´Â °ø°Ý¿¡ ´ëÇؼ­ ºÐ¼®ÇÏ¿´´Ù. ¿ì¸®´Â È¿°úÀûÀÎ ÀÌ»óÀû ºÐ¼® ŽÁö ½Ã½ºÅÛ »ç¿ëÇÏ¿© ¹æÇØÀüÆÄ ³ëµåÀÇ ¾ÇÀÇÀûÀÎ ÇൿÀ» ŽÁöÇÏ°í ¸ð¹ÙÀÏ Ad-hoc³×Æ®¿öÅ©¿¡¼­ ÀüÆĹæÇØ Áß¿¡ ºÎÁ¤ÀûÀΠä³ÎÀÇ Á¢¼ÓÇÑ °á°ú¸¦ ºÐ¼®ÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
Mobile Ad-hoc Networks provide communication without a centralized infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. On the other hand, they are susceptible to malicious exploitation and have to face different challenges at different layers due to its open Ad-hoc network structure which lacks previous security measures. Denial of service (DoS) attack is one that interferes with the radio transmission channel causing a jamming attack. In this kind of attack, an attacker emits a signal that interrupts the energy of the packets causing many errors in the packet currently being transmitted. In harsh environments where there is constant traffic, a jamming attack causes serious problems; therefore measures to prevent these types of attacks are required. The objective of this paper is to carry out the simulation of the jamming attack on the nodes and determine the DoS attacks in OPNET so as to obtain better results. We have used effective anomaly detection system to detect the malicious behaviour of the jammer node and analyzed the results that deny channel access by jamming in the mobile Ad-hoc networks.
Å°¿öµå(Keyword) Denial of Service   Mobile Ad-hoc Networks   IDS   Wireless Jamming  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå