Azza Mohammed

Work place: Department of Computer science, Djillali Liabes University of Sidi Bel Abbes, Algeria

E-mail: azza.mohammed.amine@gmail.com

Website:

Research Interests: Information Security, Network Security, Information Systems, Multimedia Information System

Biography

AZZA Mohammed received M.Sc in computer science departement from Djilali Liabes University. He is pursuing PhD in Computer Science and Engineering from Djilali Liabes University. He is presently working as Research Scientist in Design and Analysis of Cryptographic Protocols, Network Security and Information Security. He is a life member of EEDIS laboratory.

Author Articles
A Cross Layer for Detection and Ignoring Black Hole Attack in MANET

By Azza Mohammed Boukli Hacene Sofiane Faraoun kamel Mohamed

DOI: https://doi.org/10.5815/ijcnis.2015.10.05, Pub. Date: 8 Sep. 2015

MANET Mobile Ad hoc Network are evolved through various characteristics such as shared media, this property make a routing protocols vulnerable. AODV is a reactive routing where each intermediate node cooperates in the process of route discovery. In this case, the node that behaves as malicious exploit the malfunction of specified service. The black hole attack uses the sequence number that is used to select the freshest route and attract all exchanged data packets to destroy them. Many researchers have dealt with this attack and many solutions have been proposed. These solutions target the network layer only. In this paper, we present our approach to counter black hole attack. This approach is entitled CrossAODV and it is based on verification and validation process. The key point of our approach is the use of the inter layer interaction between networks layer and medium access within the distributed coordination function (DCF) to efficiently detect and isolate malicious nodes. During the route discovery, the verification process uses the RTS / CTS frame that contains information about the requested path. The validation process consists of comparing the routing information with the result of verification phase. Our Approach have been implemented, simulated and compared to two related studies using the well know NS2 Simulator. The obtained results show the efficacy our proposal in term of packet delivery with a neglected additional delay.

[...] Read more.
Other Articles