International Conference Papers
Permanent URI for this collectionhttp://dl.cerist.dz/handle/CERIST/4
Browse
12 results
Search Results
Item A review on Privacy and Anonymity in electronic communications(Conference Procedings, 2006-10-25) Benmeziane, Souad; Badache, NadjibCurrent Internet networking protocols provide no support to ensure the privacy of communication endpoints. An adversary can determine which addresses have asked for which services. Anonymity is now increasingly important for networked applications. This paper overviews the concept of anonymity in electronic communications, vectors for a privacy invasion, and proposed solutions. Solutions are examined from the perspective of attacks which can be reasonably expected against these systems. Particular attention is paid to mobile agents systems and how to hide the itinerary of the agent.Item A causal multicast protocol for dynamic groups in cellular networks(ACM, 2008-09-10) Benzaid, Chafika; Badache, NadjibGroup communication is an abstraction which deals with multicasting a message from a source process to a group of processes. In Group Communication Systems (GCS), causal message ordering is an essential tool to ensure interaction among group members in a consistent way. In this paper, we propose a simple and optimal causal multicast protocol which copes with the dynamically changing groups in mobile environments. The protocol presents an optimal communication overhead without causing inhibition effect in the delivery of messages. The group membership management depends on a simple, yet powerful idea. This original idea consists in considering the join and leave requests as data messages, and then will be ordered with other messages. This makes no need to a coordination phase in the installation of a new view. Our protocol requires minimal resources on mobile hosts and wireless links and scales well with large groups.Item BMobi_Causal: a causal broadcast protocol in mobile dynamic groups(ACM, 2008-08) Benzaid, Chafika; Badache, NadjibIn this paper, we propose a simple and optimal causal broadcast protocol which copes with the dynamically changing groups in mobile environments. The protocol depends on two simples, yet powerful ideas. The first consists in the use of the immediate dependency relationship (IDR) in the construction of control information (CI), resulting in O(1) message overhead. When the second original idea consists in considering the join/leave requests as data messages. This ensures a consistent perception within a group and makes no need to a coordination phase in the installation of a view.Item A Novel Approach for Selfish Nodes Detection in MANETs: Proposal and Petri Nets Based Modeling(IEEE, 2005-06) Djenouri, Djamel; Badache, NadjibThe resource limitation of nodes used in selforganized ad hoc networks, along with the multi-hop nature of these networks, may cause a new behavioral phenomena which does not exist in traditional infrastructured environments. To save its energy, a node may behave sel shly, then it would not forward packets for other nodes while using their resources to forward its own packets. This deviation from the normal behavior is a potential threat against the service availability, one of the most important security requirements. Resolving this problem is challenging, due to the self-organization and the infrastructureless features of these networks. Recently, some solutions have been proposed, but almost all these solutions rely on the watchdog technique [1], which suffers from many problems. Especially when using the power control technique, employed by some new poweraware routing protocols following the watchdog's proposal. To overcome this problem, we propose in this paper a new approach we call two hops ACK (acknowledgment). Using petri nets we model and analyze our solution based on this novel approach.Item New Approach for Selfish Nodes Detection in Mobile Ad hoc Networks(IEEE, 2005-09) Djenouri, Djamel; Badache, NadjibA mobile ad hoc network (MANET) is a temporary infrastructureless network, formed by a set of mobile hosts that dynamically establish their own network on the fly without relying on any central administration. Mobile hosts used in MANET have to ensure the services that were ensured by the powerful fixed infrastructure in traditional networks, the packet forwarding is one of these services. The resource limitation of nodes used in MANET, particularly in energy supply, along with the multi-hop nature of this network may cause new phenomena which do not exist in traditional networks. To save its energy a node may behave selfishly and uses the forwarding service of other nodes without correctly forwarding packets for them. This deviation from the correct behavior represents a potential threat against the quality of service (QoS), as well as the service availability, one of the most important security requirements. Some solutions have been recently proposed, but almost all these solutions rely on the watchdog technique as stated in S. Marti et al. (2000) in their monitoring components, which suffers from many problems. In this paper we propose an approach to mitigate some of these problems, and we assess its performance by simulation.Item Random Feedbacks for Selfish Nodes Detection in Mobile Ad Hoc Networks(Springer, 2005-10) Djenouri, Djamel; Ouali, Nabil; Mahmoudi, Ahmed; Badache, NadjibA mobile ad hoc network (MANET) is a temporary infrastructureless network, formed by a set of mobile hosts that dynamically establish their own network on the fly without relying on any central administration. Mobile hosts used in MANET have to ensure the services ensured by the powerful fixed infrastructure in traditional networks, the packet forwarding is one of these services. Resource limitation of MANET’s nodes, particulary in energy supply, along with the multi-hop nature of these networks may cause a new problem that does not exist in traditional networks. To save its energy a node may behave selfishly(no-cooperatively), thus it misbehaves by not forwarding packets originated from other nodes, while using their resources to forward its own packets to remote recipients. Such a behavior hugely threatens the QoS (Quality of Service), and particulary the packet forwarding service availability. Some solutions for selfish nodes detection have been recently proposed, but almost all these solutions rely on the monitoring in the promiscuous mode technique of the watchdog [1], which suffers from many problems especially when using the power control technique. In this paper we propose a new approach to detect selfish nodes unwilling to participate in packet forwarding, that mitigates some watchdog’s problems. We also assess the performance of our solution by simulation.Item Simulation evaluation of an energy efficient routing protocol for mobile ad hoc networks(IEEE Computer Society, 2004-07) Djenouri, Djamel; Badache, NadjibEnergy conservation is one of the most important issues in ad hoc networks, where computers used are usually supplied with limited autonomous resources. Recent studies show that the energy consumed for routing data-packets in wireless ad hoc networks can be significantly reduced compared with the current min-hop max-power routing protocols. But designing a power efficient routing protocol is one of the most challenging issues. In this work, we have conducted a detailed simulation to evaluate the performance of our energy efficient routing protocol [An energy efficient routing protocol for mobile ad hoc network] derived from DSR, in this simulation we have compared our protocol with the standard DSR considered as benchmark.Item Mobility Impact on Mobile Ad hoc Routing Protocols(IEEE Computer Society, 2003) Djenouri, Djamel; Derhab, Abdelouahid; Badache, NadjibAn ad hoc network is a set of mobile units connected by wireless technologies, making an infrastructureless temporary network. without turning to a central administration. The network topology is unpredictable, dynamic, it may change any time. These topology changes make ad hoc networks challenging to implement routing protocols. In this paper, we study mobility effects on the performance of several mobile ad hoc routing protocols.Item A Study on the Energy Consumption Minimisation in Mobile Ad Hoc Networks(2003-12) Djenouri, Djamel; Badache, NadjibThe emergence of lightweight wireless mobile devices, like laptops, PDAs, and sensors makes mobile ad hoc networks (MANETs) an exciting and important research area in recent years. The MANET community have been concentrating on some problems related to the network layer, especially on the routing protocols. But regarding the MAC level, little has been done. No novel protocol has been proposed but traditional wireless MAC protocols have been largely adopted. Our contribution in this paper is the deep investigation of the mobility impacts on MAC protocols in MANETs, using the GloMoSim simulation tool. We think we are the first who consider nodes’ mobility when analyzing MAC protocols in MANETs.Item An Energy Efficient routing protocol for mobile ad hoc networks(IFIP, 2003-06) Djenouri, Djamel; Badache, Nadjibpower consumed for routing data-packets in wireless ad hoc networks can be significantly reduced compared with the current min-hop max-power routing protocols. One of promising mechanisms proposed to reduce energy consumption is power control. Doshi & Timothy [7] have presented an implementation of this mechanism, and defined a new minimum energy routing scheme. We think that the aim of an efficient routing protocol is not only to minimize energy consumption to route packets, but also to ensure a long life to all nodes. In order to avoid the network partition as long as possible. In this paper, we define new metrics to resolve the tradeoff between: minimising energy consumption to route packets, on the one hand, and ensuring a long life to all nodes’ batteries, on the other hand. We also define a new technique which allows the distribution of the routing task over nodes then we modify DSR protocol, to improve it and to make a new power-aware and power efficient protocol.