Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks

Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks
Author :
Publisher : GRIN Verlag
Total Pages : 170
Release :
ISBN-10 : 9783656041023
ISBN-13 : 3656041024
Rating : 4/5 (23 Downloads)

Book Synopsis Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks by : Soufiene Djahel

Download or read book Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks written by Soufiene Djahel and published by GRIN Verlag. This book was released on 2011-10-28 with total page 170 pages. Available in PDF, EPUB and Kindle. Book excerpt: Doctoral Thesis / Dissertation from the year 2011 in the subject Computer Science - Internet, New Technologies, Lille 1 University (Laboratoire d'Informatique Fondamentale de Lille), course: Security in Wireless Multi-hop Networks, language: English, abstract: While the rapid proliferation of mobile devices along with the tremendous growth of various applications using wireless multi-hop networks have significantly facilitate our human life, securing and ensuring high quality services of these networks are still a primary concern. In particular, anomalous protocol operation in wireless multi-hop networks has recently received considerable attention in the research community. These relevant security issues are fundamentally different from those of wireline networks due to the special characteristics of wireless multi-hop networks, such as the limited energy resources and the lack of centralized control. These issues are extremely hard to cope with due to the absence of trust relationships between the nodes. To enhance security in wireless multi-hop networks, this dissertation addresses both MAC and routing layers misbehaviors issues, with main focuses on thwarting black hole attack in proactive routing protocols like OLSR, and greedy behavior in IEEE 802.11 MAC protocol. Our contributions are briefly summarized as follows. As for black hole attack, we analyze two types of attack scenarios: one is launched at routing layer, and the other is cross layer. We then provide comprehensive analysis on the consequences of this attack and propose effective countermeasures. As for MAC layer misbehavior, we particularly study the adaptive greedy behavior in the context of Wireless Mesh Networks (WMNs) and propose FLSAC (Fuzzy Logic based scheme to Struggle against Adaptive Cheaters) to cope with it. A new characterization of the greedy behavior in Mobile Ad Hoc Networks (MANETs) is also introduced. Finally, we design a new backoff scheme to quickly detect the greedy nodes that do not comply with IEEE 802.11 MAC protocol, together with a reaction scheme that encourages the greedy nodes to become honest rather than punishing them.


Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks Related Books

Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks
Language: en
Pages: 170
Authors: Soufiene Djahel
Categories: Computers
Type: BOOK - Published: 2011-10-28 - Publisher: GRIN Verlag

DOWNLOAD EBOOK

Doctoral Thesis / Dissertation from the year 2011 in the subject Computer Science - Internet, New Technologies, Lille 1 University (Laboratoire d'Informatique F
Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks
Language: en
Pages: 173
Authors: Soufiene Djahel
Categories: Computers
Type: BOOK - Published: 2011-12 - Publisher: GRIN Verlag

DOWNLOAD EBOOK

Doctoral Thesis / Dissertation from the year 2011 in the subject Computer Science - Internet, New Technologies, Lille 1 University (Laboratoire d'Informatique F
MAC and Routing Protocols for Multi-hop Wireless Networks
Language: en
Pages: 51
Authors: Chih-Yuan Liao
Categories: Computer network protocols
Type: BOOK - Published: 2004 - Publisher:

DOWNLOAD EBOOK

Abstract: "Wireless systems for industry have mostly used cellular-phone-style radio links, using point-to-point or point-to-multipoint transmission. Past resea
Security for Multihop Wireless Networks
Language: en
Pages: 540
Authors: Shafiullah Khan
Categories: Computers
Type: BOOK - Published: 2014-04-15 - Publisher: CRC Press

DOWNLOAD EBOOK

Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different gro
AD HOC NETWORKS
Language: en
Pages: 287
Authors: Prasant Mohapatra
Categories: Technology & Engineering
Type: BOOK - Published: 2006-01-16 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

AD HOC NETWORKS: Technologies and Protocols is a concise in-depth treatment of various constituent components of ad hoc network protocols. It reviews issues rel