Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
¸ð¹ÙÀÏ Ad Hoc ³×Æ®¿öÅ©¸¦ À§ÇÑ ¾ÈÀüÇÑ Ä§ÀÔ Å½Áö ½Ã½ºÅÛ |
¿µ¹®Á¦¸ñ(English Title) |
A Secure Intrusion Detection System for Mobile Ad Hoc Network |
ÀúÀÚ(Author) |
Rakesh Shrestha
ÀÌ»ó´ö
ÃÖµ¿À¯
ÇѽÂÁ¶
À̼ºÁÖ
Rakesh Shrestha
Sang-duk Lee
Dong-you Choi
Seung-jo Han
Seong-Joo Lee
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 13 NO. 01 PP. 0087 ~ 0094 (2009. 01) |
Çѱ۳»¿ë (Korean Abstract) |
ħÀÔ Å½Áö ½Ã½ºÅÛÀº ¹«¼± ³×Æ®¿öÅ©¿¡¼ È°¹ßÇÑ ¿¬±¸ ºÐ¾ßÁßÀÇ ÇϳªÀÌ´Ù. ³×Æ®¿öÅ© ÅäÆú·ÎÁö°¡ Àֱ⠶§¹®¿¡ ¹«¼± ¸ð¹ÙÀÏ Ad-hoc ³×Æ®¿öÅ©ÀÇ Ä§ÀÔ Å½Áö´Â µ¿Àû°ú ÁýÁßÈ ºÎÁ·ÀÇ °ø°ÝÀ» ¹Þ±â ½±´Ù. Âü°¡ÇÏ°í ÀÖ´Â ³ëµå°¡ ¾ÕÀÇ º¸¾È ¿¬ÇÕÀ» °¡Áö°í ÀÖÁö ¾Ê°í ¿·Á ÀÖ´Â Ad-hoc ³×Æ®¿öÅ©ÀÇ ¾ÇÀÇÀûÀÎ ³ëµåÀÇ Å½Áö´Â ÀÌ ³í¹®¿¡¼ ¹¦»çÇÏ´Â ¼ýÀÚ¿¡ Á÷¸éÇÑ´Ù. ÀÌ ³í¹®ÀÌ ¸ð¹ÙÀÏ Ad-hoc ³×Æ®¿öÅ©ÀÇ Áß¿äÇÑ Á¶°Ç¿¡¼ ¾ÇÀÇÀûÀÎ ³ëµå¸¦ °áÁ¤ÇÏ´Â °Í¿¡ ´ëÇØ ÀÖ°í º¸¾È°ú ´õ ÁÁÀº ½ÇÇà°ú ħÀÔÀÇ Å½Áö·Î ³¡³ª´Â Ãë¾àÁ¡ À̽´¸¦ ´Ù·é´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
The intrusion detection system is one of the active fields of research in wireless networks. Intrusion detection in wireless mobile Ad hoc network is challenging because the network topologies are dynamic, lack centralization and are vulnerable to attacks. Detection of malicious nodes in an open ad-hoc network in which participating nodes do not have previous security association has to face number of challenges which is described in this paper. This paper is about determining the malicious nodes under critical conditions in the mobile ad-hoc network and deals with security and vulnerabilities issues which results in the better performance and detection of the intrusion.
|
Å°¿öµå(Keyword) |
Intrusion detection
Mobile ad-hoc network
IDS technique
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|