Boukli Hacene Sofiane

Work place: Department of Computer science, Djillali Liabes University of Sidi Bel Abbes, Algeria

E-mail:

Website:

Research Interests: Information Security, Network Architecture, Network Security

Biography

Boukli Hacene Sofiane Associated Professor at Computer Science Department of the Djillali Liabes University (U.D.L) of Sidi Bel Abbes (Algeria). He received an Engineering degree (first class honors) from U.D.L in 2002, the M.S. degree from Al Al Bayt University at Mafraq (Jordan) in 2005, PhD from U.D.L in 2012 and the habilitation to supervise research (HDR) in 2014. He is a member of the Advanced Networks research team of “Evolutionary Engineering and Distributed Information Systems laboratory” at the U.D.L. His research interests are in networking, including wireless ad-hoc, sensor network, vehicular network and network security.

Author Articles
A Cross Layer for Detection and Ignoring Black Hole Attack in MANET

By Azza Mohammed Boukli Hacene Sofiane Faraoun kamel Mohamed

DOI: https://doi.org/10.5815/ijcnis.2015.10.05, Pub. Date: 8 Sep. 2015

MANET Mobile Ad hoc Network are evolved through various characteristics such as shared media, this property make a routing protocols vulnerable. AODV is a reactive routing where each intermediate node cooperates in the process of route discovery. In this case, the node that behaves as malicious exploit the malfunction of specified service. The black hole attack uses the sequence number that is used to select the freshest route and attract all exchanged data packets to destroy them. Many researchers have dealt with this attack and many solutions have been proposed. These solutions target the network layer only. In this paper, we present our approach to counter black hole attack. This approach is entitled CrossAODV and it is based on verification and validation process. The key point of our approach is the use of the inter layer interaction between networks layer and medium access within the distributed coordination function (DCF) to efficiently detect and isolate malicious nodes. During the route discovery, the verification process uses the RTS / CTS frame that contains information about the requested path. The validation process consists of comparing the routing information with the result of verification phase. Our Approach have been implemented, simulated and compared to two related studies using the well know NS2 Simulator. The obtained results show the efficacy our proposal in term of packet delivery with a neglected additional delay.

[...] Read more.
Other Articles