• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ¸ð¹ÙÀÏ Ad Hoc ³×Æ®¿öÅ©¸¦ À§ÇÑ ¾ÈÀüÇÑ Ä§ÀÔ Å½Áö ½Ã½ºÅÛ
¿µ¹®Á¦¸ñ(English Title) A Secure Intrusion Detection System for Mobile Ad Hoc Network
ÀúÀÚ(Author) Rakesh Shrestha   ÀÌ»ó´ö   ÃÖµ¿À¯   ÇѽÂÁ¶   À̼ºÁÖ   Rakesh Shrestha   Sang-duk Lee   Dong-you Choi   Seung-jo Han   Seong-Joo Lee  
¿ø¹®¼ö·Ïó(Citation) VOL 13 NO. 01 PP. 0087 ~ 0094 (2009. 01)
Çѱ۳»¿ë
(Korean Abstract)
ħÀÔ Å½Áö ½Ã½ºÅÛÀº ¹«¼± ³×Æ®¿öÅ©¿¡¼­ È°¹ßÇÑ ¿¬±¸ ºÐ¾ßÁßÀÇ ÇϳªÀÌ´Ù. ³×Æ®¿öÅ© ÅäÆú·ÎÁö°¡ Àֱ⠶§¹®¿¡ ¹«¼± ¸ð¹ÙÀÏ Ad-hoc ³×Æ®¿öÅ©ÀÇ Ä§ÀÔ Å½Áö´Â µ¿Àû°ú ÁýÁßÈ­ ºÎÁ·ÀÇ °ø°ÝÀ» ¹Þ±â ½±´Ù. Âü°¡ÇÏ°í ÀÖ´Â ³ëµå°¡ ¾ÕÀÇ º¸¾È ¿¬ÇÕÀ» °¡Áö°í ÀÖÁö ¾Ê°í ¿­·Á ÀÖ´Â Ad-hoc ³×Æ®¿öÅ©ÀÇ ¾ÇÀÇÀûÀÎ ³ëµåÀÇ Å½Áö´Â ÀÌ ³í¹®¿¡¼­ ¹¦»çÇÏ´Â ¼ýÀÚ¿¡ Á÷¸éÇÑ´Ù. ÀÌ ³í¹®ÀÌ ¸ð¹ÙÀÏ Ad-hoc ³×Æ®¿öÅ©ÀÇ Áß¿äÇÑ Á¶°Ç¿¡¼­ ¾ÇÀÇÀûÀÎ ³ëµå¸¦ °áÁ¤ÇÏ´Â °Í¿¡ ´ëÇØ ÀÖ°í º¸¾È°ú ´õ ÁÁÀº ½ÇÇà°ú ħÀÔÀÇ Å½Áö·Î ³¡³ª´Â Ãë¾àÁ¡ À̽´¸¦ ´Ù·é´Ù.
¿µ¹®³»¿ë
(English Abstract)
The intrusion detection system is one of the active fields of research in wireless networks. Intrusion detection in wireless mobile Ad hoc network is challenging because the network topologies are dynamic, lack centralization and are vulnerable to attacks. Detection of malicious nodes in an open ad-hoc network in which participating nodes do not have previous security association has to face number of challenges which is described in this paper. This paper is about determining the malicious nodes under critical conditions in the mobile ad-hoc network and deals with security and vulnerabilities issues which results in the better performance and detection of the intrusion.
Å°¿öµå(Keyword) Intrusion detection   Mobile ad-hoc network   IDS technique  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå