Entity

Time filter

Source Type

Batna, Algeria

Hafi H.,University of Ouargla | Bilami A.,LaSTIC Laboratory
Studies in Computational Intelligence | Year: 2013

Mobile peer-to-peer networking (MP2P) is a relatively new paradigm compared to other wireless networks. In the last years, it has gained popularity because of its practice in applications such as file sharing over Internet in a decentralized manner. Security of mobile P2P networks represents an open research topic and a main challenge regarding to their vulnerability and convenience to different security attacks, such as black hole, Sybil...etc. In this paper, we analyze the black hole attack in mobile wireless P2P networks using AODV as routing protocol. In a black hole attack, a malicious node assumes the identity of a legitimate node, by creating forged answers with a higher sequence number, and thus forces the victim node to choose it as relay. We propose a solution based on a modification of the well-known AODV routing protocol and taking into account the behavior of each node participating in the network. Performances of our proposal are evaluated by simulation. © Springer International Publishing Switzerland 2013.


Boubiche D.E.,LaSTIC Laboratory | Bilami A.,LaSTIC Laboratory
Journal of Emerging Technologies in Web Intelligence | Year: 2013

One of the most challenging issues in wireless sensor networks is resilience against malicious attacks. Since energy is the most precious resource for these networks, Denial of sleep attacks is recognized as one of the most serious threats. Such attacks exhaust power supply of sensor nodes and can reduce the sensor lifetime from years to days. Authentication and encryption solutions have been proposed to protect the network from denial of sleep attacks. Though, the resources constraint motivates the use of simpler solutions to the same security challenges. In this paper, we survey different types of denial of sleep attacks and we propose a cross layer energy efficient security mechanism to protect the network from these attacks. The cross layer interaction between network Mac and physical layers is mainly exploited to identify the intruders' nodes and prevent sensor nodes from energy exhaust attacks. Simulation results indicate that our proposal is energy efficient and can significantly reduce the effect of denial of sleep attacks. © 2013 ACADEMY PUBLISHER.


Bensari M.,LaSTIC Laboratory | Bilami A.,LaSTIC Laboratory
Studies in Computational Intelligence | Year: 2013

The growing area of lightweight devices, such as mobile cell phones, PDA conduct to the rapid growth of mobile networks, they are playing important role in everyone's day. Mobile Networks offer unrestricted mobility and tender important services like M-business, M-Learning, where, such services need to keep security of data as a top concern. The root cause behind the eavesdroppers in these networks is the un-authentication. Designing authentication protocol for mobile networks is a challenging task, because, mobile device's memory, processing power, bandwidths are limited and constrained. Cryptography is the important technique to identify the authenticity in mobile networks. The authentication schemes for this networks use symmetric or asymmetric mechanisms. In this paper, we propose a hybrid authentication protocol that is based on Elliptic Curve Cryptography which is, actually, the suitable technique for mobile devices because of its small key size and high security. © Springer International Publishing Switzerland 2013.


Athmani S.,University of Batna | Boubiche D.E.,LaSTIC Laboratory | Bilami A.,LaSTIC Laboratory
2013 World Congress on Computer and Information Technology, WCCIT 2013 | Year: 2013

Due to their particular characteristics, wireless sensor networks (WSN) are severely vulnerable to malicious attacks. Black hole is one of the most malicious attacks that target sensors routing protocols. This kind of attacks can have devastating impact on hierarchical routing protocols. Several security solutions have been proposed to secure WSNs from black hole attacks. However, most of these solutions are complex and energy inefficient. In this paper we propose a hierarchical energy efficient intrusion detection system, to protect sensor network from black hole attacks. Our approach is simple and based on control packets exchange between sensor node and base station. We have experimentally evaluated our system using the NS simulator to demonstrate its effectiveness in detecting and preventing efficiently the black hole attacks. © 2013 IEEE.


Boubiche D.E.,LaSTIC Laboratory | Bilami A.,LaSTIC Laboratory | Athmani S.,LaSTIC Laboratory
Communications in Computer and Information Science | Year: 2012

Wireless sensor networks are particularly exposed to several kinds of attacks. Due to resources constrained property in WSN, Denial of sleep attacks is recognized as one of the most serious threats. Attacks of this type exhaust power supply of sensor nodes and reduce the sensor lifetime. Most of existing researches propose authentication and encryption solutions to protect the network from denial of sleep attacks. However, it is more efficient to use simpler solutions to the same security challenges due to limited processing capability, memory storage, and energy capacity. In this paper we propose a cross layer energy-efficient security mechanism to protect the network from these attacks. Simulation reveals that our proposal is energy efficient and able to achieve significant performance in term of preventing network nodes from different denial of sleep attacks. © Springer-Verlag Berlin Heidelberg 2012.

Discover hidden collaborations