Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)
ÇѱÛÁ¦¸ñ(Korean Title) |
MANET¿¡¼ÀÇ ÀüÆĹæÇØ °ø°Ý ŽÁö |
¿µ¹®Á¦¸ñ(English Title) |
Detecting Jamming Attacks in MANET |
ÀúÀÚ(Author) |
Rakesh Shrestha
ÀÌ»ó´ö
ÃÖµ¿À¯
ÇѽÂÁ¶
Rakesh Shrestha
Sang-duk Lee
Dong-you Choi
Seung-jo Han
Corresponding author
Seung-jo Han
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 13 NO. 03 PP. 0482 ~ 0488 (2009. 03) |
Çѱ۳»¿ë (Korean Abstract) |
¸ð¹ÙÀÏ Ad-hoc ³×Æ®¿öÅ©´Â ÀçÇØÁö¿ªÀ̳ª ºü¸¥ ±¸¼ºÀ» ÇÊ¿ä·Î ÇÒ ¶§ Áß¾Ó ÁýÁß ±¸Á¶ ÇüÅ°¡ ¾ø´Â Åë½ÅÀ» Á¦°øÇÏ¿© ÁØ´Ù. ¹Ý¸é¿¡ ¾ÇÀÇÀûÀÎ °ø°Ý°ú »çÀü º¸¾È ÃøÁ¤ ºÎÁ·À¸·Î ÀÎÇÑ °³¹æÇü Ad-hoc ³×Æ®¿öÅ© ±¸Á¶¿¡ ¶§¹®¿¡ ´Ù¸¥ °èÃþ¿¡¼ ¹®Á¦¿¡ Á÷¸éÇÒ ¼ö ÀÖ´Ù. DOS°ø°ÝÀº ÀüÆÄ Àü¼Û ä³Î¿¡¼ ¹æÇظ¦ ÇÏ´Â °ø°ÝÁß ÇϳªÀ̸ç ÀüÆĹæÇØ °ø°ÝÀ¸·Î ¾Ë·ÁÁ® ÀÖ´Ù. ÀÌ·¯ÇÑ Á¾·ùÀÇ °ø°ÝÀº °ø°ÝÀÚ°¡ ÆÐŶÀ» ¹æÇØÇÏ´Â ½ÅÈ£¸¦ º¸³»°í ÆÐŶÀÌ Àü¼ÛµÇ´Â µ¿¾È ¸¹Àº ¿¡·¯¿Í ½É°¢ÇÑ ¹®Á¦¸¦ ¹ß»ý½ÃŲ´Ù. ±× °á°ú ÀÌ·¯ÇÑ Á¾·ùÀÇ °ø°ÝÀ» ¹æÁöÇϱâ À§ÇÑ ¹æ¹ýÀÌ ¿ä±¸µÈ´Ù. µû¶ó¼ º» ³í¹®¿¡¼´Â ³×Æ®¿öÅ© ½Ã¹Ä·¹ÀÌÅÍÀÎ OPNETÀ» È°¿ëÇÏ¿© DoS °ø°Ý°ú °¢ ³ëµå »ó¿¡¼ ÀüÆĹæÇØ °ø°Ý ½Ã¹Ä·¹À̼ÇÀ» ¼öÇàÇÏ¿´°í, ¸ð¹ÙÀÏ Ad-hoc ³×Æ®¿öÅ©¿¡¼ ÀüÆĹæÇØ¿¡ ÀÇÇÑ Ã¤³Î Á¢±ÙÀ» ¹æÇØÇÏ´Â °ø°Ý¿¡ ´ëÇؼ ºÐ¼®ÇÏ¿´´Ù. ¿ì¸®´Â È¿°úÀûÀÎ ÀÌ»óÀû ºÐ¼® ŽÁö ½Ã½ºÅÛ »ç¿ëÇÏ¿© ¹æÇØÀüÆÄ ³ëµåÀÇ ¾ÇÀÇÀûÀÎ ÇൿÀ» ŽÁöÇÏ°í ¸ð¹ÙÀÏ Ad-hoc³×Æ®¿öÅ©¿¡¼ ÀüÆĹæÇØ Áß¿¡ ºÎÁ¤ÀûÀΠä³ÎÀÇ Á¢¼ÓÇÑ °á°ú¸¦ ºÐ¼®ÇÏ¿´´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
Mobile Ad-hoc Networks provide communication without a centralized infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. On the other hand, they are susceptible to malicious exploitation and have to face different challenges at different layers due to its open Ad-hoc network structure which lacks previous security measures. Denial of service (DoS) attack is one that interferes with the radio transmission channel causing a jamming attack. In this kind of attack, an attacker emits a signal that interrupts the energy of the packets causing many errors in the packet currently being transmitted. In harsh environments where there is constant traffic, a jamming attack causes serious problems; therefore measures to prevent these types of attacks are required. The objective of this paper is to carry out the simulation of the jamming attack on the nodes and determine the DoS attacks in OPNET so as to obtain better results. We have used effective anomaly detection system to detect the malicious behaviour of the jammer node and analyzed the results that deny channel access by jamming in the mobile Ad-hoc networks.
|
Å°¿öµå(Keyword) |
Denial of Service
Mobile Ad-hoc Networks
IDS
Wireless Jamming
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|