{"id":43354,"updated":"2025-01-22T11:01:08.132732+00:00","links":{},"created":"2025-01-18T23:09:46.841930+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00043354","sets":["1164:3865:3866:3869"]},"path":["3869"],"owner":"1","recid":"43354","title":["ビザンチン攻撃の検出と回避を考慮したHop By Hop ベースルーティングプロトコルの提案と実装・評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2008-05-15"},"_buckets":{"deposit":"0c185756-1716-4f0c-85ec-0732ce364897"},"_deposit":{"id":"43354","pid":{"type":"depid","value":"43354","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"ビザンチン攻撃の検出と回避を考慮したHop By Hop ベースルーティングプロトコルの提案と実装・評価","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ビザンチン攻撃の検出と回避を考慮したHop By Hop ベースルーティングプロトコルの提案と実装・評価"},{"subitem_title":"AODV-BDA : AODV with Byzantine attacks Detection and Avoidance","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2008-05-15","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"公立はこだて未来大学大学院システム情報科学研究科"},{"subitem_text_value":"公立はこだて未来大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Future University-Hakodate, Systems Information Science","subitem_text_language":"en"},{"subitem_text_value":"Future University-Hakodate","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/43354/files/IPSJ-MBL08045024.pdf"},"date":[{"dateType":"Available","dateValue":"2010-05-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-MBL08045024.pdf","filesize":[{"value":"1.1 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"35"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"3210bc7f-2d80-4ad9-a394-1956f9a7f064","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2008 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"森, 郁海"},{"creatorName":"高橋, 修"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Ikumi, Mori","creatorNameLang":"en"},{"creatorName":"Osamu, Takahashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA11851388","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Mobile Ad-hoc NETwork (MANET) は、無線技術を用いたマルチホップ通信により固定インフラが存在しない状況でもネットワークを構築することが可能である.一方で,第三者ノードを中継する可能性を持つためエンド間,リンク間のセキュリティを確保することが重要である.MANETではアドホックルーティングプロトコルを用いることでネットワークを構築するが,悪意のあるノードはルーティングメカニズムに干渉し,攻撃を行うことができる.この種の攻撃で最も強力であるとされるビザンチン攻撃は,攻撃者自身が経路に入り込み特定のパケットやデータパケットの全てあるいは大部分を破棄するものである.この攻撃の検出する場合 MANET が持つ本来の輻輳や無線リンクの使用によって自然発生するパケットドロップ,プロトコル自体のバグ,ハードウェアの構成ミスなどによって誤認が発生する.本稿ではこの誤認を軽減するために,単位時間内のリンク間のデータパケットの送受信数の整合性を確かめる過程で厳密に一致させるのではなく許容を持たせる手法を提案し,AODV 上に実装し評価する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Mobile Ad-hoc NETwork (MANET) that is multi-hop communication using radio link can build a network in the situation that there is not fixed infrastructure. However, in order to relay packets by intermediate node, a secure communication of end to end and between the nodes is needed. MANET builds a network using Ad-hoc Routing Protocol, but malicious node can attack it interfering routing mechanism. The Byzantine attack that is the strongest attack against routing get into a route that is used in order to relay data packets, and drop a specific packet or all / almost of the data packet. When detecting this malicious node, misconception occurs by naturally occurring packet drop is caused by a congestion of MANET, the use of radio link, the bug of the protocol and a hardware configuration mistake. In this paper, in order to reduce this misconception, we suggest a technique that allows the consistency of the number of send and receive data packet of link until predetermined threshold. And then we implement it on AODV and evaluate it. ","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"140","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告モバイルコンピューティングとユビキタス通信(MBL)"}],"bibliographicPageStart":"135","bibliographicIssueDates":{"bibliographicIssueDate":"2008-05-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"44(2008-MBL-045)","bibliographicVolumeNumber":"2008"}]},"relation_version_is_last":true,"weko_creator_id":"1"}}