Mohammed Azza

Work place: Department of Computer science, Djillali Liabes University of Sidi Bel Abbes, Algeria

E-mail: azza.mohammed.amine@gmail.com

Website:

Research Interests: Computer Science & Information Technology, Information Security, Network Security, Information-Theoretic Security

Biography

Mohammed AZZA received M.Sc in computer science departement from Djilali Liabes University. He is pursuing PhD in Computer Science and Engineering from Djilali Liabes University. His main research area includes Mobile Ad hoc Networks, Wireless Sensor Network. His subjects of interest include Analysis of Cryptographic Protocols, Network Security and Information Security. He is a life member of EEDIS laboratory.

Author Articles
An Enhanced Reputation-based for Detecting Misbehaving Nodes in MANET

By Mohammed Azza Sofiane Boukli Hacene

DOI: https://doi.org/10.5815/ijwmt.2017.04.03, Pub. Date: 8 Jul. 2017

In this paper, we propose an enhanced approach based on first-hand reputation with allows to detected misbehavior node in Manet. The network's security is an important challenge in this kind of networks. The main objective of the misbehaving nodes in AODV routing protocol deletes all data packets that received thus, don’t transmit to their destination. In a reputation-based system, each node overhears the activity of its neighbors (transmit and receive) in first-hand or combined with second-hand. Our approach is composed of three-phase directly monitoring, calculating reputation value and node isolation. The reputation value is enhanced by the packet dropped due to other events such as overloading of queue and node availability. The node with a negative reputation will be isolated, and an alert packet will be distributed to neighboring nodes to inform, afterwards an improved local repair is started. The simulation results show that the proposed approach can detect and isolate a malicious node, which improves the packet delivery ratio and lowest increasing in the throughput, while reducing the success rate of the misbehaving nodes.

[...] Read more.
Other Articles