International Conference Papers

Permanent URI for this collectionhttp://dl.cerist.dz/handle/CERIST/4

Browse

Search Results

Now showing 1 - 10 of 21
  • Thumbnail Image
    Item
    A Novel Approach for Selfish Nodes Detection in MANETs: Proposal and Petri Nets Based Modeling
    (IEEE, 2005-06) Djenouri, Djamel; Badache, Nadjib
    The resource limitation of nodes used in selforganized ad hoc networks, along with the multi-hop nature of these networks, may cause a new behavioral phenomena which does not exist in traditional infrastructured environments. To save its energy, a node may behave sel shly, then it would not forward packets for other nodes while using their resources to forward its own packets. This deviation from the normal behavior is a potential threat against the service availability, one of the most important security requirements. Resolving this problem is challenging, due to the self-organization and the infrastructureless features of these networks. Recently, some solutions have been proposed, but almost all these solutions rely on the watchdog technique [1], which suffers from many problems. Especially when using the power control technique, employed by some new poweraware routing protocols following the watchdog's proposal. To overcome this problem, we propose in this paper a new approach we call two hops ACK (acknowledgment). Using petri nets we model and analyze our solution based on this novel approach.
  • Thumbnail Image
    Item
    New Approach for Selfish Nodes Detection in Mobile Ad hoc Networks
    (IEEE, 2005-09) Djenouri, Djamel; Badache, Nadjib
    A mobile ad hoc network (MANET) is a temporary infrastructureless network, formed by a set of mobile hosts that dynamically establish their own network on the fly without relying on any central administration. Mobile hosts used in MANET have to ensure the services that were ensured by the powerful fixed infrastructure in traditional networks, the packet forwarding is one of these services. The resource limitation of nodes used in MANET, particularly in energy supply, along with the multi-hop nature of this network may cause new phenomena which do not exist in traditional networks. To save its energy a node may behave selfishly and uses the forwarding service of other nodes without correctly forwarding packets for them. This deviation from the correct behavior represents a potential threat against the quality of service (QoS), as well as the service availability, one of the most important security requirements. Some solutions have been recently proposed, but almost all these solutions rely on the watchdog technique as stated in S. Marti et al. (2000) in their monitoring components, which suffers from many problems. In this paper we propose an approach to mitigate some of these problems, and we assess its performance by simulation.
  • Thumbnail Image
    Item
    Mobility and MAC protocols in MANETs
    (2005-12) Djenouri, Djamel; Bouznada, Mohamed; Khiyat, Faten
    The emergence of lightweight wireless mobile de-vices, like laptops, PDAs, and sensors makes mo-bile ad hoc networks (MANETs) an exciting and important research area in recent years. The MANET community have been concentrating on some problems related to the network layer, es-pecially on the routing protocols. But regarding the MAC level, little has been done. No novel protocol has been proposed but traditional wire¬less MAC protocols have been largely adopted. Our contribution in this paper is the deep inves¬tigation of the mobility impacts on MAC proto¬cols in MANETs, using the GloMoSim simula¬tion tool. We think we are the first who consider nodes' mobility when analyzing MAC protocols in MANETs.
  • Thumbnail Image
    Item
    Random Feedbacks for Selfish Nodes Detection in Mobile Ad Hoc Networks
    (Springer, 2005-10) Djenouri, Djamel; Ouali, Nabil; Mahmoudi, Ahmed; Badache, Nadjib
    A mobile ad hoc network (MANET) is a temporary infrastructureless network, formed by a set of mobile hosts that dynamically establish their own network on the fly without relying on any central administration. Mobile hosts used in MANET have to ensure the services ensured by the powerful fixed infrastructure in traditional networks, the packet forwarding is one of these services. Resource limitation of MANET’s nodes, particulary in energy supply, along with the multi-hop nature of these networks may cause a new problem that does not exist in traditional networks. To save its energy a node may behave selfishly(no-cooperatively), thus it misbehaves by not forwarding packets originated from other nodes, while using their resources to forward its own packets to remote recipients. Such a behavior hugely threatens the QoS (Quality of Service), and particulary the packet forwarding service availability. Some solutions for selfish nodes detection have been recently proposed, but almost all these solutions rely on the monitoring in the promiscuous mode technique of the watchdog [1], which suffers from many problems especially when using the power control technique. In this paper we propose a new approach to detect selfish nodes unwilling to participate in packet forwarding, that mitigates some watchdog’s problems. We also assess the performance of our solution by simulation.
  • Thumbnail Image
    Item
    Scalability of Wireless MAC Protocols in Mobile Ad hoc Networks
    (IEEE, 2005-07) Djenouri, Djamel; Bouznada, Mohamed; Khiyat, Faten; Khelladi, Lyes
    The rapid proliferation of lightweight wireless mobile devices, such as laptops, PDAs, and sensors makes mobile ad hoc networks (MANETs) an exciting and important research area nowadays. The MANET community have been concentrating on some problems related to the network layer, especially on the routing protocols. But regarding the MAC layer, little has been done. Our contri- bution in this paper is the deep investigation of the MAC protocols scalability in MANETs, using the GloMoSim simulation tool. We think we are the first who consider the scalability factor when analyzing MAC protocols in MANETs.
  • Thumbnail Image
    Item
    Simulation evaluation of an energy efficient routing protocol for mobile ad hoc networks
    (IEEE Computer Society, 2004-07) Djenouri, Djamel; Badache, Nadjib
    Energy conservation is one of the most important issues in ad hoc networks, where computers used are usually supplied with limited autonomous resources. Recent studies show that the energy consumed for routing data-packets in wireless ad hoc networks can be significantly reduced compared with the current min-hop max-power routing protocols. But designing a power efficient routing protocol is one of the most challenging issues. In this work, we have conducted a detailed simulation to evaluate the performance of our energy efficient routing protocol [An energy efficient routing protocol for mobile ad hoc network] derived from DSR, in this simulation we have compared our protocol with the standard DSR considered as benchmark.
  • Thumbnail Image
    Item
    Mobility Impact on Mobile Ad hoc Routing Protocols
    (IEEE Computer Society, 2003) Djenouri, Djamel; Derhab, Abdelouahid; Badache, Nadjib
    An ad hoc network is a set of mobile units connected by wireless technologies, making an infrastructureless temporary network. without turning to a central administration. The network topology is unpredictable, dynamic, it may change any time. These topology changes make ad hoc networks challenging to implement routing protocols. In this paper, we study mobility effects on the performance of several mobile ad hoc routing protocols.
  • Thumbnail Image
    Item
    A Study on the Energy Consumption Minimisation in Mobile Ad Hoc Networks
    (2003-12) Djenouri, Djamel; Badache, Nadjib
    The emergence of lightweight wireless mobile devices, like laptops, PDAs, and sensors makes mobile ad hoc networks (MANETs) an exciting and important research area in recent years. The MANET community have been concentrating on some problems related to the network layer, especially on the routing protocols. But regarding the MAC level, little has been done. No novel protocol has been proposed but traditional wireless MAC protocols have been largely adopted. Our contribution in this paper is the deep investigation of the mobility impacts on MAC protocols in MANETs, using the GloMoSim simulation tool. We think we are the first who consider nodes’ mobility when analyzing MAC protocols in MANETs.
  • Thumbnail Image
    Item
    An Energy Efficient routing protocol for mobile ad hoc networks
    (IFIP, 2003-06) Djenouri, Djamel; Badache, Nadjib
    power consumed for routing data-packets in wireless ad hoc networks can be significantly reduced compared with the current min-hop max-power routing protocols. One of promising mechanisms proposed to reduce energy consumption is power control. Doshi & Timothy [7] have presented an implementation of this mechanism, and defined a new minimum energy routing scheme. We think that the aim of an efficient routing protocol is not only to minimize energy consumption to route packets, but also to ensure a long life to all nodes. In order to avoid the network partition as long as possible. In this paper, we define new metrics to resolve the tradeoff between: minimising energy consumption to route packets, on the one hand, and ensuring a long life to all nodes’ batteries, on the other hand. We also define a new technique which allows the distribution of the routing task over nodes then we modify DSR protocol, to improve it and to make a new power-aware and power efficient protocol.
  • Thumbnail Image
    Item
    Cross-Layer Approach to Detect Data Packet Droppers in Mobile Ad-Hoc Networks
    (Springer, 2006-09) Djenouri, Djamel; Badache, Nadjib
    Mobile ad hoc networks (MANETs) are dynamic infrastructureless networks whose routing protocols are fully based on node cooperation, and where each mobile node relies on other intermediate mobile nodes to send packets towards remote ones. Being anxious about its battery shortage, a node participating in the network and using the forwarding service provided by other nodes might behave selfishly and drop packets originated from others. Such a behavior hugely threatens the QoS (Quality of Service), and particulary the packet forwarding service availability. Another motivation to drop data packets is to launch a DoS (Denial of Service) attack. To do so, a node participates in the routing protocol and includes itself in routes then simply drops data packet it receives to forward. We propose in this paper a novel cross-layer based approach to detect data packet droppers, that we optimize and decrease its overhead. Contrary to all the current detective solutions, ours is applicable regardless of the power control technique employment.