188 research outputs found

    MIMODog: How to solve the problem of selfish misbehavior detection mechanism in MANETs using MIMO Technology

    Get PDF
    International audienceMobile Ad-hoc Networks (MANETs) are based on a fundamental aspect, which is the cooperative parameter. This parameter may compromise the networks. The selfish misbehaving nodes can seriously affect the network performance. Moreover, the existing mechanisms based on the monitoring process to detect the misbehaving nodes are not efficient and suffer from an important false alarm rate. These weaknesses are mainly due to the interferences and the costs of the monitoring process. In MANET based on SISOSISO (Single-Input Single-Output) technology, the interferences at the monitor node compromise the observation and the accuracy of the cooperation report. That is why in this paper, we focus on the MIMO (Multi-Input and Multi-Output) technology to overcome these drawbacks and to significantly improve the monitoring process. We propose a new MAC protocol called MIMODog-SPACE-MAC based on the well-known SPACE-MAC protocol. It allows the monitor node to avoid the collision during the monitoring process by adjusting the antennas weights in order to nullify the signal coming from other nodes than the monitored one. Therefore, the proposed solution contributes to significantly enhance the accuracy of the monitoring process. We show that for a MIMO network with randomly located nodes nn, each equipped with MM antennas, the achievable number of monitor nodes is Θ(Mnln⁥n)\Theta(\frac{M}{\sqrt{n\ln n}}). Indeed, theoretical results show that by using MIMODog-SPACE-MAC, the network can have a constant improvement MM on an asymptotic number of monitor nodes compared to SISO 802.11 DCF MAC

    Smart attacks based on control packets vulnerabilities with IEEE 802.11 MAC

    Get PDF
    International audienceIn this paper, we show new smart attacks which were not dealt with in the solutions proposed recently. We focus on the Medium Access Control (MAC), particularly the IEEE 802.11 and we study some hidden vulnerabilities based on the control packets. The malicious nodes can exploit these vulnerabilities to reduce the network's performance, to disturb the monitoring, routing processes and to escape the Intrusion Detection System (IDS). Furthermore, we show how vulnerabilities can be exploited and how these attacks can be implemented by the attacker. Moreover, attacks' algorithms and the security analysis are presented. We investigate on the effect of these attacks with the simulations and the experimentations. The simulations' results and their analysis illustrate the negative impact of these attacks on the network. In addition, the experimentation results demonstrate the feasibility to real exploitation of these attacks and they confirm the simulation's results

    Security and pseudo-anonymity with a cluster-based approach for MANET

    Get PDF
    International audienceIn this paper, we propose an anonymous protocol to secure nodes which have important roles in the network. We focus in the clustering approach to secure the mobile ad hoc networks (MANETs). In each cluster, a confident node is selected to ensure the certification authority (CA) roles; however, the cluster security depends in the security of the CA node. Therefore, we present an anonymous dynamic demilitarized zone (ADDMZ) to protect the CA node identity and to avoid the single point of failure in the cluster. ADDMZ is formed by a set of confident nodes which have a high trust level between them and their goal is to filter the communication between the cluster member node and the CA node. Moreover, we draw one's inspiration from military defence mechanisms such as: camouflage and identity change mechanisms. We present protocol to realize these mechanisms by using the identity based cryptographic from bilinear maps. The security analysis is proposed to discuss the proposed protocols

    A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology

    Get PDF
    International audienceMobility has the advantage of enlarging WSN applications. However, proposing a mobility support protocol in Wireless Sensor Networks (WSNs) represents a significant challenge. In this paper, we propose a survey on the mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology. This technology enables to connect IP sensor devices to other IP networks without any need for gateways. We highlight the advantages and drawbacks with performances issues of each studied solution. Then, in order to select a typical classification of mobility management protocols in WSNs, we provide some classification criteria and approaches on which these protocols are based. Finally, we present a comparative study of the existing protocols in terms of the required performances for this network type

    Contributions to Wireless multi-hop networks : Quality of Services and Security concerns

    Get PDF
    Ce document rĂ©sume mes travaux de recherche conduits au cours de ces 6 derniĂšres annĂ©es. Le principal sujet de recherche de mes contributions est la conception et l’évaluation des solutions pour les rĂ©seaux sans fil multi-sauts en particulier les rĂ©seaux mobiles adhoc (MANETs), les rĂ©seaux vĂ©hiculaires ad hoc (VANETs), et les rĂ©seaux de capteurs sans fil (WSNs). La question clĂ© de mes travaux de recherche est la suivante : « comment assurer un transport des donnĂ©es e cace en termes de qualitĂ© de services (QoS), de ressources Ă©nergĂ©tiques, et de sĂ©curitĂ© dans les rĂ©seaux sans fil multi-sauts? » Pour rĂ©pondre Ă  cette question, j’ai travaillĂ© en particulier sur les couches MAC et rĂ©seau et utilisĂ© une approche inter-couches.Les rĂ©seaux sans fil multi-sauts prĂ©sentent plusieurs problĂšmes liĂ©s Ă  la gestion des ressources et au transport des donnĂ©es capable de supporter un grand nombre de nƓuds, et d’assurer un haut niveau de qualitĂ© de service et de sĂ©curitĂ©.Dans les rĂ©seaux MANETs, l’absence d’infrastructure ne permet pas d’utiliser l’approche centralisĂ©e pour gĂ©rer le partage des ressources, comme l’accĂšs au canal.Contrairement au WLAN (rĂ©seau sans fil avec infrastructure), dans les rĂ©seaux Ad hoc les nƓuds voisins deviennent concurrents et il est di cile d’assurer l’équitĂ© et l’optimisation du dĂ©bit. La norme IEEE802.11 ne prend pas en compte l’équitĂ© entre les nƓuds dans le contexte des MANETs. Bien que cette norme propose di Ă©rents niveaux de transmission, elle ne prĂ©cise pas comment allouer ces dĂ©bits de maniĂšre e cace. En outre, les MANETs sont basĂ©s sur le concept de la coopĂ©ration entre les nƓuds pour former et gĂ©rer un rĂ©seau. Le manque de coopĂ©ration entre les nƓuds signifie l’absence de tout le rĂ©seau. C’est pourquoi, il est primordial de trouver des solutions pour les nƓuds non-coopĂ©ratifs ou Ă©goĂŻstes. Enfin, la communication sans fil multi-sauts peut participer Ă  l’augmentation de la couverture radio. Les nƓuds de bordure doivent coopĂ©rer pour transmettre les paquets des nƓuds voisins qui se trouvent en dehors de la zone de couverture de la station de base.Dans les rĂ©seaux VANETs, la dissĂ©mination des donnĂ©es pour les applications de suretĂ© est un vrai dĂ©fi. Pour assurer une distribution rapide et globale des informations, la mĂ©thode de transmission utilisĂ©e est la di usion. Cette mĂ©thode prĂ©sente plusieurs inconvĂ©nients : perte massive des donnĂ©es due aux collisions, absence de confirmation de rĂ©ception des paquets, non maĂźtrise du dĂ©lai de transmission, et redondance de l’information. De plus, les applications de suretĂ© transmettent des informations critiques, dont la fiabilitĂ© et l’authenticitĂ© doivent ĂȘtre assurĂ©es.Dans les rĂ©seaux WSNs, la limitation des ressources (bande passante, mĂ©moire, Ă©nergie, et capacitĂ© de calcul), ainsi que le lien sans fil et la mobilitĂ© rendent la conception d’un protocole de communication e cace di cile. Certaines applications nĂ©cessitent un taux important de ressources (dĂ©bit, Ă©nergie, etc) ainsi que des services de sĂ©curitĂ©, comme la confidentialitĂ© et l’intĂ©gritĂ© des donnĂ©es et l’authentification mutuelle. Ces paramĂštres sont opposĂ©s et leur conciliation est un vĂ©ritable dĂ©fi. De plus, pour transmettre de l’information, certaines applications ont besoin de connaĂźtre la position des nƓuds dans le rĂ©seau. Les techniques de localisation sou rent d’un manque de prĂ©cision en particulier dans un environnement fermĂ© (indoor), et ne permettent pas de localiser les nƓuds dans un intervalle de temps limitĂ©. Enfin, la localisation des nƓuds est nĂ©cessaire pour assurer le suivi d’objet communicant ou non. Le suivi d’objet est un processus gourmand en Ă©nergie, et requiert de la prĂ©cision.Pour rĂ©pondre Ă  ces dĂ©fis, nous avons proposĂ© et Ă©valuĂ© des solutions, prĂ©sentĂ©es de la maniĂšre suivante : l’ensemble des contributions dĂ©diĂ©es aux rĂ©seaux MANETs est prĂ©sentĂ© dans le deuxiĂšme chapitre. Le troisiĂšme chapitre dĂ©crit les solutions apportĂ©es dans le cadre des rĂ©seaux VANETs. Enfin, les contributions liĂ©es aux rĂ©seaux WSNs sont prĂ©sentĂ©es dans le quatriĂšme chapitre

    A Study of Mobility Support in Wearable Health Monitoring Systems: Design Framework

    Get PDF
    International audienceThe aim of this work is to investigate main techniques and technologies enabling user's mobility in wearable health monitoring systems. For this, design requirements for key enabling mechanisms are pointed out, and a number of conceptual and technological recommendations are presented. The whole is schematized and presented into the form of a design framework covering design layers and taking in consideration patient context constraints. This work aspires to bring a further contribution for the conception and possibly the evaluation of health monitoring systems with full support of mobility offering freedom to users while enhancing their life qualit

    RSSI-based Localization Algorithms using Spatial Diversity in Wireless Sensor Networks

    Get PDF
    Accepted for publication in International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC)International audienceMany localization algorithms in Wireless Sensor Networks (WSNs) are based on received signal strength indication (RSSI). Although they present some advantages in terms of complexity and energy consumption, RSSI values, especially in indoor environments, are very unstable due to fading induced by shadowing effect and multipath propagation. In this paper, we propose a comparative study of RSSI-based localization algorithms using spatial diversity in WSNs. We consider different kinds of single / multiple antenna systems: Single Input Single Output (SISO) system, Single Input Multiple Output (SIMO) system, Multiple Input Single Output (MISO) system and Multiple Input Multiple Output (MIMO) system. We focus on the well known trilateration and multilateration localization algorithms to evaluate and compare different antenna systems. Exploiting spatial diversity by using multiple antenna systems improve significantly the accuracy of the location estimation. We use three diversity combining techniques at the receiver: Maximal Ratio Combiner (MRC), Equal Gain Combining (EGC) and Selection Combining (SC). The obtained results show that the localization performance in terms of position accuracy is improved when using multiple antennas. Specifically, using multiple antennas at the both sides present better performance than using multiple antennas at the transmitter as well as the receiver side. We also conclude that MRC diversity combining technique outperforms EGC that as well outperforms SC

    Relative fairness and optimized throughput for mobile ad hoc networks

    Get PDF
    International audienceAlthough IEEE 802.11 provides several transmission rates, a suitable rate adaptation taking into account the relative fairness among all competitive stations, according to the underlying channel quality remains a challenge in Mobile Ad hoc Networks (MANETs). The absence of any fixed infrastructure and any centralized control makes the existing solutions for WLANs like CARA (collision-aware rate adaptation) [4] not appropriate for MANETs. In this paper, we propose a new analytical model with a suitable approach to ensure a relative fairness among all competitive nodes of a particular channel. Our model deals with the channel quality while respecting the nodes, based on transmission successes and failures in a mobility context. Finally, each node calculates its own probability to access the channel in a distributed manner. We evaluate the performance of our scheme with others in the context of MANET via extensive and detailed simulations. The performance differentials are analysed using varying network load and transmission range. The simulation results illustrate that our proposed approach ensures a better tradeoff between fairness and throughput

    How MIMO cross-layer design enables QoS while detecting non-cooperative nodes in wireless multi-hop networks

    Get PDF
    In Journal of Network and Computer Applications (JNCA). DOI: 10.1016/j.jnca.2014.07.011International audienceWireless Multi-hop Networks (WMNs) are based on the cooperation between nodes. The non-cooperative (selfish) nodes can affect the quality of services (QoS) delivered by the network. The solutions proposed in literature are based on the monitoring mechanism to detect non-cooperative nodes. However, the monitoring mechanism has to tackle a significant false alarm rate. The origin of these issues is mainly related to the interferences and the costs of the monitoring mechanism. In WMNs based on Single-Input Single-Output (SISO) technology, the interferences at the monitor (detector) node can affect the assessment and the accuracy of the monitor node's observation. In this paper, we use Multi-Input and Multi-Output (MIMO) technology to tackle these drawbacks and to perform the monitoring mechanism without affecting the QoS. We propose a new MAC protocol based on the well-known SPACE-MAC protocol, named MIMODog. The collision at the monitor node can be avoided by tuning the antennas' weights. Therefore, the signal coming from other nodes than the monitored one can be nullified. Thus, this solution allows an important improvement of the accuracy of the monitor node's observation. Moreover, we propose a monitoring capacity analysis using graph theory particularly Conflict Graph (CG), and asymptotic study. We illustrate that the capacity consumed in the case of MIMODog is costly compared to SPACE-MAC, but the accuracy of the observation is better. We demonstrate that the number of monitor nodes is Θ(Mnln⁥n)\Theta(\frac{M}{\sqrt{n\ln n}}) for a MIMO network with randomly located nodes n, each equipped with M antennas. Indeed, numerical results nlnn illustrate that by using MIMODog, the network can have a constant improvement M on an asymptotic number of monitor nodes compared to SISO 802.11 DCF MAC

    A Job Market Signaling Scheme for Incentive and Trust Management in Vehicular Ad Hoc Networks

    Get PDF
    International audienceIn collaborative wireless networks with a low infrastructure, the presence of misbehaving nodes can have a negative impact on network performance. In particular, we are interested in dealing with this nasty presence in road safety applications, based on vehicular ad hoc networks (VANETs). In this work, we consider as harmful the presence of malicious nodes, which spread false and forged data; and selfish nodes, which cooperate only for their own benefit. To deal with this, we propose a Distributed Trust Model (DTM2), adapted from the job market signaling model. DTM2 is based on allocating credits to nodes and securely managing these credits. To motivate selfish nodes to cooperate more, our solution establishes the cost of reception to access data, forcing them to earn credits. Moreover, to detect and exclude malicious nodes, DTM2 requires the cost of sending, using signaling values inspired form economics and based on the node's behavior, so that the more a node is malicious, the higher its sending cost, thus limiting their participation in the network. Similarly, rewards are given to nodes whose sent messages are considered as truthful, and that paid a sending cost considered as correct. The latter is a guarantee for the receivers about the truthfulness of the message since, in case of message refusal, the source node is not rewarded despite its payment. We validated DTM2 via a theoretical study using Markov chains; and with a set of simulations, in both urban and highway scenarios. Both theoretical and simulation results show that DTM2 excludes from the network 100% of malicious nodes, without causing any false positive detection. Moreover, our solution guarantees a good ratio of reception even in the presence of selfish nodes
    • 

    corecore