International Conference Papers
Permanent URI for this collectionhttp://dl.cerist.dz/handle/CERIST/4
Browse
7 results
Search Results
Item A Novel Approach for Selfish Nodes Detection in MANETs: Proposal and Petri Nets Based Modeling(IEEE, 2005-06) Djenouri, Djamel; Badache, NadjibThe resource limitation of nodes used in selforganized ad hoc networks, along with the multi-hop nature of these networks, may cause a new behavioral phenomena which does not exist in traditional infrastructured environments. To save its energy, a node may behave sel shly, then it would not forward packets for other nodes while using their resources to forward its own packets. This deviation from the normal behavior is a potential threat against the service availability, one of the most important security requirements. Resolving this problem is challenging, due to the self-organization and the infrastructureless features of these networks. Recently, some solutions have been proposed, but almost all these solutions rely on the watchdog technique [1], which suffers from many problems. Especially when using the power control technique, employed by some new poweraware routing protocols following the watchdog's proposal. To overcome this problem, we propose in this paper a new approach we call two hops ACK (acknowledgment). Using petri nets we model and analyze our solution based on this novel approach.Item New Approach for Selfish Nodes Detection in Mobile Ad hoc Networks(IEEE, 2005-09) Djenouri, Djamel; Badache, NadjibA mobile ad hoc network (MANET) is a temporary infrastructureless network, formed by a set of mobile hosts that dynamically establish their own network on the fly without relying on any central administration. Mobile hosts used in MANET have to ensure the services that were ensured by the powerful fixed infrastructure in traditional networks, the packet forwarding is one of these services. The resource limitation of nodes used in MANET, particularly in energy supply, along with the multi-hop nature of this network may cause new phenomena which do not exist in traditional networks. To save its energy a node may behave selfishly and uses the forwarding service of other nodes without correctly forwarding packets for them. This deviation from the correct behavior represents a potential threat against the quality of service (QoS), as well as the service availability, one of the most important security requirements. Some solutions have been recently proposed, but almost all these solutions rely on the watchdog technique as stated in S. Marti et al. (2000) in their monitoring components, which suffers from many problems. In this paper we propose an approach to mitigate some of these problems, and we assess its performance by simulation.Item Mobility and MAC protocols in MANETs(2005-12) Djenouri, Djamel; Bouznada, Mohamed; Khiyat, FatenThe emergence of lightweight wireless mobile de-vices, like laptops, PDAs, and sensors makes mo-bile ad hoc networks (MANETs) an exciting and important research area in recent years. The MANET community have been concentrating on some problems related to the network layer, es-pecially on the routing protocols. But regarding the MAC level, little has been done. No novel protocol has been proposed but traditional wire¬less MAC protocols have been largely adopted. Our contribution in this paper is the deep inves¬tigation of the mobility impacts on MAC proto¬cols in MANETs, using the GloMoSim simula¬tion tool. We think we are the first who consider nodes' mobility when analyzing MAC protocols in MANETs.Item Random Feedbacks for Selfish Nodes Detection in Mobile Ad Hoc Networks(Springer, 2005-10) Djenouri, Djamel; Ouali, Nabil; Mahmoudi, Ahmed; Badache, NadjibA mobile ad hoc network (MANET) is a temporary infrastructureless network, formed by a set of mobile hosts that dynamically establish their own network on the fly without relying on any central administration. Mobile hosts used in MANET have to ensure the services ensured by the powerful fixed infrastructure in traditional networks, the packet forwarding is one of these services. Resource limitation of MANET’s nodes, particulary in energy supply, along with the multi-hop nature of these networks may cause a new problem that does not exist in traditional networks. To save its energy a node may behave selfishly(no-cooperatively), thus it misbehaves by not forwarding packets originated from other nodes, while using their resources to forward its own packets to remote recipients. Such a behavior hugely threatens the QoS (Quality of Service), and particulary the packet forwarding service availability. Some solutions for selfish nodes detection have been recently proposed, but almost all these solutions rely on the monitoring in the promiscuous mode technique of the watchdog [1], which suffers from many problems especially when using the power control technique. In this paper we propose a new approach to detect selfish nodes unwilling to participate in packet forwarding, that mitigates some watchdog’s problems. We also assess the performance of our solution by simulation.Item Scalability of Wireless MAC Protocols in Mobile Ad hoc Networks(IEEE, 2005-07) Djenouri, Djamel; Bouznada, Mohamed; Khiyat, Faten; Khelladi, LyesThe rapid proliferation of lightweight wireless mobile devices, such as laptops, PDAs, and sensors makes mobile ad hoc networks (MANETs) an exciting and important research area nowadays. The MANET community have been concentrating on some problems related to the network layer, especially on the routing protocols. But regarding the MAC layer, little has been done. Our contri- bution in this paper is the deep investigation of the MAC protocols scalability in MANETs, using the GloMoSim simulation tool. We think we are the first who consider the scalability factor when analyzing MAC protocols in MANETs.Item Cross-Layer Approach to Detect Data Packet Droppers in Mobile Ad-Hoc Networks(Springer, 2006-09) Djenouri, Djamel; Badache, NadjibMobile ad hoc networks (MANETs) are dynamic infrastructureless networks whose routing protocols are fully based on node cooperation, and where each mobile node relies on other intermediate mobile nodes to send packets towards remote ones. Being anxious about its battery shortage, a node participating in the network and using the forwarding service provided by other nodes might behave selfishly and drop packets originated from others. Such a behavior hugely threatens the QoS (Quality of Service), and particulary the packet forwarding service availability. Another motivation to drop data packets is to launch a DoS (Denial of Service) attack. To do so, a node participates in the routing protocol and includes itself in routes then simply drops data packet it receives to forward. We propose in this paper a novel cross-layer based approach to detect data packet droppers, that we optimize and decrease its overhead. Contrary to all the current detective solutions, ours is applicable regardless of the power control technique employment.Item Testimony-Based Isolation: New Approach to Overcome packet Dropping Attacks in MANET(John Moors University, 2006-06) Djenouri, Djamel; Badache, NadjibAttackers could take advantage of the cooperative nature of MANET’s routing protocols, by participating in the route discovery procedure to include themselves in routes, then simply drop data packets during the forwarding phase, aiming at a DoS (Denial of Service) attack. In this paper we deal with the detection and isolation of such malicious nodes. We first propose a monitoring technique different from the promiscuous overhearing (watchdog) used by almost all the current solutions, that overcomes many watchdog’s shortcomes. After that we propose a testimony-based isolation protocols basing on our monitoring technique.