Skip to Main content Skip to Navigation

Contributions à la sécurité dans les réseaux mobiles ad Hoc

Abderrezak Rachedi 1 
LIA - Laboratoire Informatique d'Avignon
Abstract : The thesis focuses on security in Mobile Ad hoc Networks (MANETs) [RFC 2501]. The lack of any central management of the network functions make MANETs more vulnerable to attacks than wireless (WLANs) and wired networks (LANs). Unfortunately, security protocols that currently exist are not designed to adapt MANETs characteristics. They do not take into account the resource limits, while the environment is dynamic and the resources are limited (memory storage, computation power and energy), and this complicates the problem, because, as we know, security solutions require a high amount of resources. However, we have to face the challenge, because the application fields of MANETs, such as military and emergency operations, are so numerous that it is necessary to design a robust security mechanism for Mobile Ad hoc Networks. The main goal of my thesis consists in examining the solutions that are likely to insure security in MANETs, and in proposing a hierachical distributed architecture that enables to implement a dynamic public key infrastructure. This solution must be adapted to MANETs characteristics (no control central unit, dynamic network topology, etc.). With this aim in view, a trust model adapted to the dynamic environment to insure the nodes trust level updating must be designed. Moreover, the certification authority vulnerabilities must be taken into account in the new DDMZ concept (dynamic dmilitarized zone), that we propose. In order to increase the security level of the important nodes in the network, their identity must be hidden. That is why we introduced the anonymity concept. We also proposed an anonymous authentication protocol. Moreover, we drew our inspiration from the military model in order to implement a camouflage mechanism that hides the important nodes' roles. In order to maintain the trust model, a monitoring mechanism is necessary. It must be adapted to dynamic wireless environment constraints and must reduce the rate of false positives (false alarms). It is based on a cross-layer approach and a probabilistic model to improve the monitor node's observation. In order to face smart attacks, such as cross-layer attacks, we must study the vulnerabilities located at the lower layers, such as the MAC layer. Then, prevention and detection mechanisms are analysed and assessed. In order to assess the performance of these mechanisms, we take into account the main metrics of Mobile Ad hoc Networks, such as energy consumption, mobility, nodes' density, traffic rate, etc.
Complete list of metadata

Cited literature [83 references]  Display  Hide  Download
Contributor : Abderrezak Rachedi Connect in order to contact the contributor
Submitted on : Thursday, March 29, 2012 - 12:53:18 PM
Last modification on : Tuesday, January 14, 2020 - 10:38:15 AM
Long-term archiving on: : Saturday, June 30, 2012 - 2:26:41 AM


  • HAL Id : tel-00683602, version 1



Abderrezak Rachedi. Contributions à la sécurité dans les réseaux mobiles ad Hoc. Réseaux et télécommunications [cs.NI]. Université d'Avignon, 2008. Français. ⟨tel-00683602⟩



Record views


Files downloads