Grin logo
en de es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - Internet, New Technologies

Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks

Title: Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks

Doctoral Thesis / Dissertation , 2011 , 164 Pages

Autor:in: Docteur Soufiene Djahel (Author)

Computer Science - Internet, New Technologies
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

While the rapid proliferation of mobile devices along with the tremendous growth of various applications using wireless multi-hop networks have significantly facilitate our human life, securing and ensuring high quality services of these networks are still a primary concern. In particular, anomalous protocol operation in wireless multi-hop networks has recently received considerable attention in the research community. These relevant security issues are fundamentally different from those of wireline networks due to the special characteristics of wireless multi-hop networks, such as the limited energy resources and the lack of centralized control. These issues are extremely hard to cope with due to the absence of trust relationships between the nodes.

To enhance security in wireless multi-hop networks, this dissertation addresses both MAC and routing layers misbehaviors issues, with main focuses on thwarting black hole attack in proactive routing protocols like OLSR, and greedy behavior in IEEE 802.11 MAC protocol. Our contributions are briefly summarized as follows.

As for black hole attack, we analyze two types of attack scenarios: one is launched at routing layer, and the other is cross layer. We then provide comprehensive analysis on the consequences of this attack and propose effective countermeasures. As for MAC layer misbehavior, we particularly study the adaptive greedy behavior in the context of Wireless Mesh Networks (WMNs) and propose FLSAC (Fuzzy Logic based scheme to Struggle against Adaptive Cheaters) to cope with it. A new characterization of the greedy behavior in Mobile Ad Hoc Networks (MANETs) is also introduced. Finally, we design a new backoff scheme to quickly detect the greedy nodes that do not comply with IEEE 802.11 MAC protocol, together with a reaction scheme that encourages the greedy nodes to become honest rather than punishing them.

Excerpt


Inhaltsverzeichnis (Table of Contents)

  • Declaration of Authorship

Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)

This PhD thesis examines the security of routing and medium access protocols in wireless multi-hop networks. The main objective is to provide an in-depth study of misbehaviors at the routing and MAC layers.

  • Security of routing protocols in wireless multi-hop networks
  • Security of medium access control (MAC) protocols
  • Analysis of misbehaviors at the routing and MAC layers
  • Secure communication in wireless multi-hop networks

Zusammenfassung der Kapitel (Chapter Summaries)

The provided text only contains a title page, committee information, and a declaration of authorship. Therefore, chapter summaries are not possible.

Schlüsselwörter (Keywords)

Wireless multi-hop networks, routing protocols, MAC protocols, security, misbehaviors, secure communication.

Excerpt out of 164 pages  - scroll top

Details

Title
Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks
College
Lille 1 University  (Laboratoire d'Informatique Fondamentale de Lille)
Course
Security in Wireless Multi-hop Networks
Author
Docteur Soufiene Djahel (Author)
Publication Year
2011
Pages
164
Catalog Number
V181080
ISBN (eBook)
9783656041023
ISBN (Book)
9783656041443
Language
English
Tags
MAC layer misbehavior Black hole attack OLSR MANETs IEEE 802.11 Routing Security in MANETs
Product Safety
GRIN Publishing GmbH
Quote paper
Docteur Soufiene Djahel (Author), 2011, Secure Routing and Medium Access Protocols in Wireless Multi-hop Networks, Munich, GRIN Verlag, https://www.grin.com/document/181080
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • https://cdn.openpublishing.com/images/brand/1/preview_popup_advertising.jpg
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  164  pages
Grin logo
  • Grin.com
  • Payment & Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint