International Journal Papers
Permanent URI for this collectionhttp://dl.cerist.dz/handle/CERIST/17
Browse
8 results
Search Results
Item Security Issues of Mobile Ad hoc and Sensor Networks(IEEE Communications Society, 2005-12) Djenouri, Djamel; Khelladi, Lyes; Badache, NadjibSecurity in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability of wireless links, the limited physical protection of nodes, the dynamically changing topology, the absence of a certification authority, and the lack of a centralized monitoring or management point. Earlier studies on mobile ad hoc networks (MANETs) aimed at proposing protocols for some fundamental problems, such as routing, and tried to cope with the challenges imposed by the new environment. These protocols, however, fully trust all nodes and do not consider the security aspect. They are consequently vulnerable to attacks and misbehavior. More recent studies focused on security problems in MANETs, and proposed mechanisms to secure protocols and applications. This article surveys these studies. It presents and discusses several security problems along with the currently proposed solutions (as of July 2005) at different network layers of MANETs. Security issues involved in this article include routing and data forwarding, medium access, key management and intrusion detection systems (IDSs). This survey also includes an overview of security in a particular type of MANET, namely, wireless sensor networks (WSNs).Item On Eliminating Packet Droppers in MANET: A Modular Solution(Elsevier, 2009-08) Djenouri, Djamel; Badache, NadjibIn this paper we deal with misbehaving nodes in mobile ad hoc networks (MANETs) that drop packets supposed to be relayed, whose purpose may be either saving their resources or launching a DoS attack. We propose a new solution to monitor, detect, and safely isolate such misbehaving nodes, structured around five modules: (i) The monitor, responsible for controlling the forwarding of packets, (ii) the detector, which is in charge of detecting the misbehaving of monitored nodes, (iii) the isolator, basically responsible for isolating misbehaving nodes detected by the detector, (iv) the investigator, which investigates accusations before testifying when the node has not enough experience with the accused, and (v) finally the witness module that responds to witness requests of the isolator. These modules are based on new approaches, aiming at improving the efficiency in detecting and isolating misbehaving nodes with a minimum overhead. We describe these modules in details, and their interactions as well. We also mathematically analyze our solution and assess its performance by simulation, and compare it with the watchdog, which is a monitoring technique employed by almost all the current solutions.Item Struggling against selfishness and black hole attacks in MANETs(John Wiley & Sons, 2008-08) Djenouri, Djamel; Badache, NadjibSince mobile ad hoc networks (MANETs) are infrastructureless and multi-hop by nature, transmitting packets from any node to another usually relies on services provided by intermediate nodes. This reliance introduces a new vulnerability; one node could launch a Black Hole DoS attack by participating in the routing protocol and including itself in routes, then simply dropping packets it receives to forward. Another motivation for dropping packets in self-organized MANETs is resource preservation. Some solutions for detecting and isolating packet droppers have been recently proposed, but almost all of them employ the promiscuous mode monitoring approach (watchdog (WD)) which suffers from many problems, especially when employing the power control technique. In this paper we propose a novel monitoring approach that overcomes some WD's shortcomings, and improves the efficiency in detection. To overcome false detections due to nodes mobility and channel conditions we propose a Bayesian technique for the judgment, allowing node redemption before judgment. Finally, we suggest a social-based approach for the detection approval and isolation of guilty nodes. We analyze our solution and asses its performance by simulation. The results illustrate a large improvement of our monitoring solution in detection versus the WD, and an efficiency through our judgment and isolation techniques as wellItem Towards Immunizing MANET’s Source Routing Protocols Against Packet Droppers(World Scientific, 2009-03) Djenouri, Djamel; Mahmoudi, Othmane; Bouamama, MohamedThis paper deals with security of routing protocols of Mobile Ad hoc Networks (MANETs), and proposes a solution to immunize such protocols against packet dropping misbehavior. Most of the current secure protocols are vulnerable to packet dropping misbehavior, which can be exploited by selfish nodes and malicious ones as well. For example, simply by dropping RREQ (Route Request) packets a selfish node can exclude itself from routes and thereby avoid receiving data packets to forward. On the other hand, a malicious node can drop RERR (Route Error) packets to keep the use of failed routes, possibly resulting in a denial of service. To mitigate this vulnerability we propose a hybrid solution that secures routing protocols against the dropping of both directed and broadcast control packets, in which a different approach is adapted for each kind of packets. Dealing with control packets represents the main contribution in this manuscript, as all the current proposals in the context of selfish nodes only consider data packets. Our solution can be integrated with any source routing protocol. In this work it was implemented with one of the most secure protocols, namely ENDAIR. The resulting new extended secure protocol was assessed and analyzed through an extensive simulation study.Item Mobility Models in Vehicular Ad hoc Networks: The Overtaking Impact(SoftMotor Ltd, 2008) Djenouri, Djamel; Soualhi, Wassim; Nekka, ElmalikVehicular Ad hoc Networks (VANETs) are basically characterized by the high mobility of nodes, making the mobility model one of the most important parameters that should be carefully selected when evaluating any protocol. To get accurate results, the model should be as realistic as possible, and involve road-maps with all the constraints and facilities related to the vehicular movement. In this paper we first survey some mobility models that are relevant to VANETs, then we present our vehicular mobility simulator that allows to generate mobility trace files for both GloMoSim and ns2. Finally, we use our simulator together with GloMoSim to investigate the effect of some realistic parameters, namely the usage of a road map vs. movement in an open area, and especially the effect of the overtaking, one of the facilities enabled by many roads that has never been considered in literature.Item Session-Based Misbehaviour Detection Framework for Wireless Ad hoc Network(Dynamic Publishers, Inc, 2007-09) Djenouri, Djamel; Fahad, Tarek; Askwith, Robert; Merabti, MadjidAbstract: Data packet dropping misbehaviour is a serious threat in ad hoc networks. The motivation of such behaviour is either to take illegal advantage and preserve resources (selfish) or to intentionally cause harm (malicious) to some victims. Most of the existing solutions to solve such misbehaviour rely on the watchdog technique, which suffers from many drawbacks, particularly when using the power control technique. To overcome this problem with a moderate communication overhead, this paper introduces a new Sessions-based Misbehaviour Detection Framework (SMDF) for detecting misbehaving nodes that drop data packets in stationary wireless ad hoc network. It consists of three components, the detection component in which each node monitors its direct neighbours with respect to forwarding data packets of a traffic session in the network, and the Decision component, in which direct neighbouring nodes decide whether the monitored node misbehaved or not and finally the isolation component where the guilty node will be penalized. Simulations results show that SMDF is scalable and able to detect the misbehaviour with high accuracy at low communication overhead and low energy consumption compared to the existing approaches.Item New power-aware routing for mobile ad hoc networks(Inderscience, 2006) Djenouri, Djamel; Badache, NadjibSince devices used in wireless mobile ad hoc networks are generally supplied with limited autonomous resources, energy conservation is one of the most significant aspects in these networks. Recent studies show that the energy consumed for routing data-packets in mobile ad hoc networks can be significantly reduced compared with the min-hop full-power routing protocols. One of the promising mechanisms proposed in literature to reduce the energy consumption is the transmission power control. In this paper, we define new routing metrics to strike a balance between the required power minimisation and batteries freshness consideration. We also define a new technique which allows the distribution of the routing task over nodes. Using these metrics and techniques we derive from DSR [2] a new power-aware and power-efficient routing protocol, whose performance is analysed by simulation in different situations of mobility and network load.Item Ad hoc networks routing protocols and mobility(2006-04) Djenouri, Djamel; Derhab, Abdelouahid; Badache, NadjibAn ad hoc network is a temporary infrastructureless network, formed dynamically by mobile devices without turning to any existing centralized administration. To send packets to remote nodes, a node uses other intermediate nodes as relays, and ask them to forward its packets. For this purpose, a distributed routing protocol is required. Because the devices used are mobile, the network topology is unpredictable, and it may change at any time. These topology changes along with other intrinsic features related to mobile devices, such as the energy resource limitation, make ad hoc networks challenging to implement efficient routing protocols. In this paper, we drive a GloMoSim based simulation study, to investigate the mobility effects on the performance of several mobile ad hoc routing protocols.