Faraoun kamel Mohamed

Work place: Department of Computer science, Djillali Liabes University of Sidi Bel Abbes, Algeria



Research Interests: Information Security, Network Security, Information Systems, Data Structures and Algorithms, Automata Theory, Cellular Automata


Faraoun Kamel Mohammed received his M.S. degree in computer science from Djillali Liabes University (UDL) of SidiBel-abbes, Algeria in 2002, and his Ph.D degree in computer science, in 2006, and his Habilitation a Diriger des Recherches (HDR) degree, in 2009, at the same university. His current research areas include computer security systems, cryptography, multimedia communications, genetic algorithms, cellular automata, evolutionary programming and information theory. He is currently Full Professor at computer science department of UDL University. Dr. Faraoun is a member of the Evolutionary Engineering and Distributed Information Systems Laboratory (EEDIS).

Author Articles
A Cross Layer for Detection and Ignoring Black Hole Attack in MANET

By Azza Mohammed Boukli Hacene Sofiane Faraoun kamel Mohamed

DOI: https://doi.org/10.5815/ijcnis.2015.10.05, Pub. Date: 8 Sep. 2015

MANET Mobile Ad hoc Network are evolved through various characteristics such as shared media, this property make a routing protocols vulnerable. AODV is a reactive routing where each intermediate node cooperates in the process of route discovery. In this case, the node that behaves as malicious exploit the malfunction of specified service. The black hole attack uses the sequence number that is used to select the freshest route and attract all exchanged data packets to destroy them. Many researchers have dealt with this attack and many solutions have been proposed. These solutions target the network layer only. In this paper, we present our approach to counter black hole attack. This approach is entitled CrossAODV and it is based on verification and validation process. The key point of our approach is the use of the inter layer interaction between networks layer and medium access within the distributed coordination function (DCF) to efficiently detect and isolate malicious nodes. During the route discovery, the verification process uses the RTS / CTS frame that contains information about the requested path. The validation process consists of comparing the routing information with the result of verification phase. Our Approach have been implemented, simulated and compared to two related studies using the well know NS2 Simulator. The obtained results show the efficacy our proposal in term of packet delivery with a neglected additional delay.

[...] Read more.
Other Articles