Academic & Scientific Articles
Permanent URI for this community
Browse
Browsing Academic & Scientific Articles by Subject "ad hoc networks"
Now showing 1 - 5 of 5
Results Per Page
Sort Options
- ItemA New Low Cost Sessions-Based Misbehaviour Detection Protocol (SMDP) for MANE(IEEE Computer Society, 2007-05) Djenouri, Djamel; Fahad, Tarek; Askwith, Robert; Merabti, MadjidThere is a strong motivation for a node to deny packet forwarding to others and being selfish in MANET. Recently, some solutions have been proposed, but almost all of these solutions rely on the watchdog technique, which suffers from many drawbacks, particularly when using the power control technique. To overcome this problem with a moderate communication overhead, this paper introduces a new approach for detecting misbehaving nodes that drop data packets in MANET. It consists of two stages: (i) the monitoring stage in which each node monitors its direct neighbours with respect to forwarding data packets of a traffic session in the network, and (ii) the decision stage, in which direct neighbouring nodes decide whether the monitored node misbehaves or not. Our new approach is able to detect the misbehaviour in case of power control employment, with a low communication overhead compared to the existing approaches.
- ItemOn Detecting Packets Droppers in MANET: A Novel Low Cost Approach(IEEE Computer Society, 2007-08) Djenouri, Djamel; Fahad, Tarek; Askwith, RobertOne of the commonest threats that mobile ad hoc networks are vulnerable to is data packet dropping, which is caused either by malicious or selfish nodes. Most of the existing solutions to solve such misbehaviour rely on the watchdog technique, which suffers from many drawbacks, particularly when using the power control technique. To overcome this problem with a moderate communication overhead, this paper introduces a new approach for detecting misbehaving nodes that drop data packets in MANET. It consists of two stages the monitoring stage in which each node monitors its direct neighbours with respect to forwarding data packets of a traffic session in the network, and the decision stage, in which direct neighbouring nodes decide whether the monitored node misbehave or not. Our new approach is able to detect the misbehaviour in case of power control employment, with a low communication overhead compared to the existing approaches.
- ItemOn Securing MANET Routing Protocol Against Control Packet Dropping(IEEE Computer Society, 2007-07) Djenouri, Djamel; Mahmoudi, Othmane; Bouamama, Mohamed; Liewellyn-Jones, David; Merabti, MadjidIn this manuscript we deal with securing routing protocols of mobile ad hoc networks (MANETs) against packet dropping misbehavior. More specifically, we propose a solution to protect control packets of reactive source routing protocols against. Most current proposals focus on data packets. Nonetheless, dropping control packets may be beneficial for selfish nodes and malicious ones as well. For example, simply by dropping RREQ (Route Request) packets a selfish node could exclude itself from routes and thereby avoid receiving data packets to forward. Similarly, a malicious could drop RERR (Route Error) packets to keep the use of failed routes, potentially resulting in a denial of service. Our solution could be intergraded with any source routing protocol. For the implementation in this work, we have chosen one of the most secure protocols, namely ENDAIRA. We assess our solution by an extensive simulation study.
- ItemSimulation evaluation of an energy efficient routing protocol for mobile ad hoc networks(IEEE Computer Society, 2004-07) Djenouri, Djamel; Badache, NadjibEnergy conservation is one of the most important issues in ad hoc networks, where computers used are usually supplied with limited autonomous resources. Recent studies show that the energy consumed for routing data-packets in wireless ad hoc networks can be significantly reduced compared with the current min-hop max-power routing protocols. But designing a power efficient routing protocol is one of the most challenging issues. In this work, we have conducted a detailed simulation to evaluate the performance of our energy efficient routing protocol [An energy efficient routing protocol for mobile ad hoc network] derived from DSR, in this simulation we have compared our protocol with the standard DSR considered as benchmark.
- ItemStruggling against selfishness and black hole attacks in MANETs(John Wiley & Sons, 2008-08) Djenouri, Djamel; Badache, NadjibSince mobile ad hoc networks (MANETs) are infrastructureless and multi-hop by nature, transmitting packets from any node to another usually relies on services provided by intermediate nodes. This reliance introduces a new vulnerability; one node could launch a Black Hole DoS attack by participating in the routing protocol and including itself in routes, then simply dropping packets it receives to forward. Another motivation for dropping packets in self-organized MANETs is resource preservation. Some solutions for detecting and isolating packet droppers have been recently proposed, but almost all of them employ the promiscuous mode monitoring approach (watchdog (WD)) which suffers from many problems, especially when employing the power control technique. In this paper we propose a novel monitoring approach that overcomes some WD's shortcomings, and improves the efficiency in detection. To overcome false detections due to nodes mobility and channel conditions we propose a Bayesian technique for the judgment, allowing node redemption before judgment. Finally, we suggest a social-based approach for the detection approval and isolation of guilty nodes. We analyze our solution and asses its performance by simulation. The results illustrate a large improvement of our monitoring solution in detection versus the WD, and an efficiency through our judgment and isolation techniques as well