While the rapid proliferation of mobile devices along with the tremendous growth of various applications using wireless multi-hop networks have significantly facilitate our human life, securing and ensuring high quality services of these networks are still a primary concern. In particular, anomalous protocol operation in wireless multi-hop networks has recently received considerable attention in the research community. These relevant security issues are fundamentally different from those of wireline networks due to the special characteristics of wireless multi-hop networks, such as the limited energy resources and the lack of centralized control. These issues are extremely hard to cope with due to the absence of trust relationships between the nodes.
To enhance security in wireless multi-hop networks, this dissertation addresses both MAC and routing layers misbehaviors issues, with main focuses on thwarting black hole attack in proactive routing protocols like OLSR, and greedy behavior in IEEE 802.11 MAC protocol. Our contributions are briefly summarized as follows.
As for black hole attack, we analyze two types of attack scenarios: one is launched at routing layer, and the other is cross layer. We then provide comprehensive analysis on the consequences of this attack and propose effective countermeasures. As for MAC layer misbehavior, we particularly study the adaptive greedy behavior in the context of Wireless Mesh Networks (WMNs) and propose FLSAC (Fuzzy Logic based scheme to Struggle against Adaptive Cheaters) to cope with it. A new characterization of the greedy behavior in Mobile Ad Hoc Networks (MANETs) is also introduced. Finally, we design a new backoff scheme to quickly detect the greedy nodes that do not comply with IEEE 802.11 MAC protocol, together with a reaction scheme that encourages the greedy nodes to become honest rather than punishing them.
Inhaltsverzeichnis (Table of Contents)
- Declaration of Authorship
Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)
This PhD thesis examines the security of routing and medium access protocols in wireless multi-hop networks. The main objective is to provide an in-depth study of misbehaviors at the routing and MAC layers.
- Security of routing protocols in wireless multi-hop networks
- Security of medium access control (MAC) protocols
- Analysis of misbehaviors at the routing and MAC layers
- Secure communication in wireless multi-hop networks
Zusammenfassung der Kapitel (Chapter Summaries)
The provided text only contains a title page, committee information, and a declaration of authorship. Therefore, chapter summaries are not possible.
Schlüsselwörter (Keywords)
Wireless multi-hop networks, routing protocols, MAC protocols, security, misbehaviors, secure communication.
Frequently Asked Questions
What are the primary security concerns in wireless multi-hop networks addressed in this thesis?
The dissertation focuses on misbehaviors at the MAC (Medium Access Control) and routing layers, specifically addressing black hole attacks and greedy node behavior.
What is a black hole attack in the context of routing protocols?
A black hole attack occurs when a malicious node falsely claims to have the shortest path to a destination and then drops the packets it receives instead of forwarding them.
How does the thesis address greedy behavior in MAC protocols?
The author proposes FLSAC (Fuzzy Logic based scheme to Struggle against Adaptive Cheaters) and designs a new backoff scheme to detect and encourage honest behavior in nodes using the IEEE 802.11 protocol.
Why is security in wireless multi-hop networks more difficult than in wireline networks?
Challenges include limited energy resources, the lack of centralized control, and the absence of pre-established trust relationships between nodes.
What specific network types are analyzed in the research?
The research covers Wireless Mesh Networks (WMNs) and Mobile Ad Hoc Networks (MANETs).
- Citar trabajo
- Docteur Soufiene Djahel (Autor), 2011, Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks, Múnich, GRIN Verlag, https://www.grin.com/document/181080