Academic & Scientific Articles

Permanent URI for this communityhttp://dl.cerist.dz/handle/CERIST/3

Browse

Search Results

Now showing 1 - 10 of 10
  • Thumbnail Image
    Item
    A distributed mutual exclusion algorithm over multi-routing protocol for mobile ad hoc networks
    (Taylor et Francis, 2008-04-15) Derhab, Abdelouahid; Badache, Nadjib
    In this paper, we propose a new architecture to solve the problem of mutual exclusion in mobile ad hoc networks (MANET). The architecture is composed of two layers: (i) a middleware layer that contains a token-based distributed mutual exclusion algorithm (DMEA) and (ii) a network layer that includes two routing forwarding strategies: one to route request messages and the other to route the token message. We also propose a request ordering policy that ensures the usual mutual exclusion properties and reduces the number of hops traversed per critical section (CS) access. The paper also addresses the problem of network partitioning and unreachable nodes. The proposed mutual exclusion algorithm is further enhanced to provide fault tolerance by preventing the loss of the token and generating a new token if the token loss event occurs. The performance complexity as well as the experimental results show that the proposed algorithm experiences low number of hops per CS access.
  • Thumbnail Image
    Item
    A Novel Approach for Selfish Nodes Detection in MANETs: Proposal and Petri Nets Based Modeling
    (IEEE, 2005-06) Djenouri, Djamel; Badache, Nadjib
    The resource limitation of nodes used in selforganized ad hoc networks, along with the multi-hop nature of these networks, may cause a new behavioral phenomena which does not exist in traditional infrastructured environments. To save its energy, a node may behave sel shly, then it would not forward packets for other nodes while using their resources to forward its own packets. This deviation from the normal behavior is a potential threat against the service availability, one of the most important security requirements. Resolving this problem is challenging, due to the self-organization and the infrastructureless features of these networks. Recently, some solutions have been proposed, but almost all these solutions rely on the watchdog technique [1], which suffers from many problems. Especially when using the power control technique, employed by some new poweraware routing protocols following the watchdog's proposal. To overcome this problem, we propose in this paper a new approach we call two hops ACK (acknowledgment). Using petri nets we model and analyze our solution based on this novel approach.
  • Thumbnail Image
    Item
    New Approach for Selfish Nodes Detection in Mobile Ad hoc Networks
    (IEEE, 2005-09) Djenouri, Djamel; Badache, Nadjib
    A mobile ad hoc network (MANET) is a temporary infrastructureless network, formed by a set of mobile hosts that dynamically establish their own network on the fly without relying on any central administration. Mobile hosts used in MANET have to ensure the services that were ensured by the powerful fixed infrastructure in traditional networks, the packet forwarding is one of these services. The resource limitation of nodes used in MANET, particularly in energy supply, along with the multi-hop nature of this network may cause new phenomena which do not exist in traditional networks. To save its energy a node may behave selfishly and uses the forwarding service of other nodes without correctly forwarding packets for them. This deviation from the correct behavior represents a potential threat against the quality of service (QoS), as well as the service availability, one of the most important security requirements. Some solutions have been recently proposed, but almost all these solutions rely on the watchdog technique as stated in S. Marti et al. (2000) in their monitoring components, which suffers from many problems. In this paper we propose an approach to mitigate some of these problems, and we assess its performance by simulation.
  • Thumbnail Image
    Item
    Mobility and MAC protocols in MANETs
    (2005-12) Djenouri, Djamel; Bouznada, Mohamed; Khiyat, Faten
    The emergence of lightweight wireless mobile de-vices, like laptops, PDAs, and sensors makes mo-bile ad hoc networks (MANETs) an exciting and important research area in recent years. The MANET community have been concentrating on some problems related to the network layer, es-pecially on the routing protocols. But regarding the MAC level, little has been done. No novel protocol has been proposed but traditional wire¬less MAC protocols have been largely adopted. Our contribution in this paper is the deep inves¬tigation of the mobility impacts on MAC proto¬cols in MANETs, using the GloMoSim simula¬tion tool. We think we are the first who consider nodes' mobility when analyzing MAC protocols in MANETs.
  • Thumbnail Image
    Item
    Random Feedbacks for Selfish Nodes Detection in Mobile Ad Hoc Networks
    (Springer, 2005-10) Djenouri, Djamel; Ouali, Nabil; Mahmoudi, Ahmed; Badache, Nadjib
    A mobile ad hoc network (MANET) is a temporary infrastructureless network, formed by a set of mobile hosts that dynamically establish their own network on the fly without relying on any central administration. Mobile hosts used in MANET have to ensure the services ensured by the powerful fixed infrastructure in traditional networks, the packet forwarding is one of these services. Resource limitation of MANET’s nodes, particulary in energy supply, along with the multi-hop nature of these networks may cause a new problem that does not exist in traditional networks. To save its energy a node may behave selfishly(no-cooperatively), thus it misbehaves by not forwarding packets originated from other nodes, while using their resources to forward its own packets to remote recipients. Such a behavior hugely threatens the QoS (Quality of Service), and particulary the packet forwarding service availability. Some solutions for selfish nodes detection have been recently proposed, but almost all these solutions rely on the monitoring in the promiscuous mode technique of the watchdog [1], which suffers from many problems especially when using the power control technique. In this paper we propose a new approach to detect selfish nodes unwilling to participate in packet forwarding, that mitigates some watchdog’s problems. We also assess the performance of our solution by simulation.
  • Thumbnail Image
    Item
    Scalability of Wireless MAC Protocols in Mobile Ad hoc Networks
    (IEEE, 2005-07) Djenouri, Djamel; Bouznada, Mohamed; Khiyat, Faten; Khelladi, Lyes
    The rapid proliferation of lightweight wireless mobile devices, such as laptops, PDAs, and sensors makes mobile ad hoc networks (MANETs) an exciting and important research area nowadays. The MANET community have been concentrating on some problems related to the network layer, especially on the routing protocols. But regarding the MAC layer, little has been done. Our contri- bution in this paper is the deep investigation of the MAC protocols scalability in MANETs, using the GloMoSim simulation tool. We think we are the first who consider the scalability factor when analyzing MAC protocols in MANETs.
  • Thumbnail Image
    Item
    Cross-Layer Approach to Detect Data Packet Droppers in Mobile Ad-Hoc Networks
    (Springer, 2006-09) Djenouri, Djamel; Badache, Nadjib
    Mobile ad hoc networks (MANETs) are dynamic infrastructureless networks whose routing protocols are fully based on node cooperation, and where each mobile node relies on other intermediate mobile nodes to send packets towards remote ones. Being anxious about its battery shortage, a node participating in the network and using the forwarding service provided by other nodes might behave selfishly and drop packets originated from others. Such a behavior hugely threatens the QoS (Quality of Service), and particulary the packet forwarding service availability. Another motivation to drop data packets is to launch a DoS (Denial of Service) attack. To do so, a node participates in the routing protocol and includes itself in routes then simply drops data packet it receives to forward. We propose in this paper a novel cross-layer based approach to detect data packet droppers, that we optimize and decrease its overhead. Contrary to all the current detective solutions, ours is applicable regardless of the power control technique employment.
  • Thumbnail Image
    Item
    Testimony-Based Isolation: New Approach to Overcome packet Dropping Attacks in MANET
    (John Moors University, 2006-06) Djenouri, Djamel; Badache, Nadjib
    Attackers could take advantage of the cooperative nature of MANET’s routing protocols, by participating in the route discovery procedure to include themselves in routes, then simply drop data packets during the forwarding phase, aiming at a DoS (Denial of Service) attack. In this paper we deal with the detection and isolation of such malicious nodes. We first propose a monitoring technique different from the promiscuous overhearing (watchdog) used by almost all the current solutions, that overcomes many watchdog’s shortcomes. After that we propose a testimony-based isolation protocols basing on our monitoring technique.
  • Thumbnail Image
    Item
    Security Issues of Mobile Ad hoc and Sensor Networks
    (IEEE Communications Society, 2005-12) Djenouri, Djamel; Khelladi, Lyes; Badache, Nadjib
    Security in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability of wireless links, the limited physical protection of nodes, the dynamically changing topology, the absence of a certification authority, and the lack of a centralized monitoring or management point. Earlier studies on mobile ad hoc networks (MANETs) aimed at proposing protocols for some fundamental problems, such as routing, and tried to cope with the challenges imposed by the new environment. These protocols, however, fully trust all nodes and do not consider the security aspect. They are consequently vulnerable to attacks and misbehavior. More recent studies focused on security problems in MANETs, and proposed mechanisms to secure protocols and applications. This article surveys these studies. It presents and discusses several security problems along with the currently proposed solutions (as of July 2005) at different network layers of MANETs. Security issues involved in this article include routing and data forwarding, medium access, key management and intrusion detection systems (IDSs). This survey also includes an overview of security in a particular type of MANET, namely, wireless sensor networks (WSNs).
  • Thumbnail Image
    Item
    New power-aware routing for mobile ad hoc networks
    (Inderscience, 2006) Djenouri, Djamel; Badache, Nadjib
    Since devices used in wireless mobile ad hoc networks are generally supplied with limited autonomous resources, energy conservation is one of the most significant aspects in these networks. Recent studies show that the energy consumed for routing data-packets in mobile ad hoc networks can be significantly reduced compared with the min-hop full-power routing protocols. One of the promising mechanisms proposed in literature to reduce the energy consumption is the transmission power control. In this paper, we define new routing metrics to strike a balance between the required power minimisation and batteries freshness consideration. We also define a new technique which allows the distribution of the routing task over nodes. Using these metrics and techniques we derive from DSR [2] a new power-aware and power-efficient routing protocol, whose performance is analysed by simulation in different situations of mobility and network load.