ASROP: AD HOC Secure Routing Protocol
ASROP: AD HOC Secure Routing Protocol
5, October 2012
ABSTRACT
Mobile ad hoc networks (MANETs) are a new concept of wireless communications for mobile devices, which offer communications over a shared wireless channel without any pre-existing infrastructure. Their wireless nature and self-organizing capabilities are some of MANET's biggest advantages, as well as their biggest security restrictions. Forming end-to-end secure paths in such MANETs is more challenging than in conventional wireless cellular/wired networks due to the lack of central authorities. An attacker can easily disrupt the routing process by injecting false control messages, changing the paths of packets or simply by blocking the packets of other nodes. In this paper, we propose a novel efficient secure routing protocol, named ASRoP, to effectively secure the routing discovery process in ad hoc networks. ASRoP provides powerful security extensions to the reactive AODV protocol, based on Diffie-Hellman (DH) algorithms and our modified secure remote password protocol. The simulation results show the efficiency of the proposed ASRoP protocol, and its cost towards both the users and the network. ASRoP promises to offer a real opportunity to prevent attacks related to lack of authentication without degrading routing performance.
KEYWORDS
Wireless Network, Ad hoc Network, Security, Wireless Routing Protocol
1. INTRODUCTION
In recent years, wireless ad hoc networks (MANETs) have received tremendous attention because of their self-maintenance and self-configuration capabilities. A MANET is a set of autonomous wireless mobile devices that communicate with each other over wireless links. Such networks do not require the deployment of any infrastructure for their operation; thus, it is expected that they will play a vital role in future civilian and military settings, being useful to provide communication support where the deployment of a fixed infrastructure is not possible or economically profitable. The topology of MANETs is in general dynamic, because the connectivity among the nodes may change with time due to the dynamics of nodes or churn. Communication is performed by relaying data packets along suitable routes, which are dynamically discovered and maintained through cooperation between the nodes; thus, any routing protocol design must consider the limitations and constraints of MANETs. Several routing schemes have been proposed in the literature (e.g. AoDV [1], DSR [2], etc.). These schemes focus mainly on finding routes between sources and destinations nodes, and on efficiency issues such as scalability with respect to network size and traffic load [3]. Usually, the length of routes is the main metric used in these schemes. It is observed that most of these routing schemes have ignored the aspect of network security; thus, they are vulnerable to attacks since they do not consider a secure path during the route discovery process. To alleviate this limitation, several approaches have been proposed to secure ad hoc routing. Some of these approaches employ mechanisms used to protect routing protocols in wired networks based on the presence of a centralized infrastructure; however, these solutions may not be appropriate for a decentralized environment such as ad hoc network.
DOI : 10.5121/ijwmn.2012.4501 1
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012
In this paper, we propose a novel secure routing scheme for mobile ad hoc networks based on AODV on-demand protocol, named ASRoP. It is specifically designed to an open wireless ad hoc network where each node should verify the identity of the node with which it communicates. On the contrary to the classical use of remote secure routing protocol which is actually employed in "client-server" context; our contribution proposes to use a modified version of this protocol in distributed ad hoc mobile environment. This allows nodes to be authenticated before considering any information during the route discovery phase. In our ASRoP, we focus on attacks carried out by traditional external illegitimate nodes which do not have the access rights to the ad hoc network. Our protocol considers also some other attacks that may be carried out by internal malicious nodes that inject false information about the network topology. Moreover, the proposed protocol ensures the reliability of the route (s) obtained during the route discovery phase. The contributions of this paper can be summarized as follows: a new security protocol based on AODV that ensures the establishment of a secured routes between source and destination nodes, while it reduces the load of cryptographic functions conventionally used a new way of detecting and rejecting forged or replayed messages a new key exchange method achieved in a fully distributed fashion without any need for a permanent or temporary infrastructure
The rest of the paper is organized as follows. Section 2 highlights some vulnerabilities of MANETs and presents a brief state of the art of some secure routing solutions. In Section 3, we detail our proposed secure routing protocol ASRoP. The performance evaluation of ASRoP are presented in Section 4. Finally, Section 5 concludes this paper. This document describes, and is written to conform to, author guidelines for the journals of AIRCC series. It is prepared in Microsoft Word as a .doc document. Although other means of preparation are acceptable, final, camera-ready versions must conform to this layout. Microsoft Word terminology is used where appropriate in this document. Although formatting instructions may often appear daunting, the simplest approach is to use this template and insert headings and text into it as appropriate.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012
routes, and more generally to corrupt the network topology [6][7]. Routing attacks can be classified into two categories: incorrect traffic generation and incorrect traffic relay. 2.1.1 Incorrect traffic generation This category includes attacks that involve sending false messages. For example, control messages sent on behalf of another node (spoofing), or control messages containing incorrect or outdated routing information. The network can present a Byzantine behavior [8] [9], i.e. contradictory information sent from different parts of the network. The consequences of this attack are the degradation in network communications, isolated nodes and routing loops [10] [11]. Cache Poisoning and DoS (Denial of Service) are examples of incorrect traffic generation in routing schemes. Cache Poisoning: in the distance vector routing protocol, an example of incorrect traffic generation is that an attacker may announce a metric of 0 for all destinations, which will induce all nodes send their packets through this node. Then the node deletes all packets which will cause a significant loss of exchanged communications. DoS: an attacker can perform a denial of service in the network by saturating the wireless medium with broadcast messages, which will reduce the rate of transmission of nodes and prevent communications. An attacker can send invalid messages just to paralyze nodes, overload their CPU and consume their energy resource. In this case, the attack aims not to change the network topology, but rather to disrupt network functionality and communications.
2.1.2 Incorrect traffic routing Information sent from a legitimate node can be corrupted by another node [12] [13]. Examples of this category are: Black hole attack: malicious nodes falsely claim a fresh route to the destination to absorb transmitted packets from source to that destination and drop them instead of forwarding. Green Hole: the attacker distributes a portion of the received messages and blocks the others. For example, it filters the data packets to be hidden and passes the control packets. Message tampering: an attacker can also modify messages before forwarding them. This is may be happen only if no mechanism is used to ensure the integrity of data packets. Replay attack: as the topology is dynamic, an attacker can produce replay attacks, using control messages already recorded and transferred to other nodes in order to modify the nodes routing tables with false information. Rushing attack: this attack can be launched against reactive protocols. In these protocols, nodes only rebroadcast the first request received for each route discovery and ignore others. When a route discovery is initiated, the attacker floods the network by request messages. If the attacker's messages arrive firstly, the attacker will be involved in the route discovery process [14]. Wormhole Attack: two malicious nodes cooperate and falsify the number of hops by announcing a short cut between two imaginary parts of the network. In the Figure 1, the source S chooses to route the data packets by {S, M1, M2, D} instead of {S, A, B, C, D} because it is the shorter route but in reality, attackers use a longer route {S, M1, A, B, C, M2, D} since that the link between M1 and M2 is unreal.}
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012
According to the authors of [12] [15] [10] [6] [16], attacks are classified according to several criteria: internal or external attack: if the attacker compromises an existing node, the attack is considered as internal. Otherwise, it is an external attack. active or passive attack: the purpose of an active attack is to modify the protocol so that traffic packets passes through a node which is controlled by an attacker. A passive attack takes control over a corrupted node to eavesdrop the traffic. This does not jeopardize the functionality of the network, but affects the anonymity of the exchanged messages. This attack allows the attacker to analyse data packets that can be used later. single or distributed attack: In a single attack, a single entity is used. More sophisticated attacks, called distributed attacks, compromise several nodes and are generated from various sources. This kind of attack is more dangerous and difficult to detect.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012
2.2.2 Solutions based on symmetric cryptography This set of solutions is built on symmetric cryptography, hash functions, and hash chains. SRP: Secure Routing Protocol [18]. It was designed to provide trust routing information by securing the route discovery step. SRP requires private keys shared by the hosts. The destination checks the integrity and authenticity of routing messages using a hash function then broadcasts its reply by different routes. This later technique permits an additional protection against malicious nodes that attempt to alter route replay messages. The weakness of this protocol is at the route discovery: an adversary can produce Route Error message to invalidate routes that are still available. SEAD: Secure Efficient Ad hoc Distance vector routing protocol [19]. It is a proactive protocol developed for securing DSDV protocol. SEAD authenticates the sender and provides protection against the tampering of mutable fields (e.g., the number of hops, sequence number). By applying a hash function repeatedly on a random value, a chain of hash is obtained. Then, the elements of this chain are used by the nodes in the authentication procedure without a need for public key encryption. This avoids the costly cryptographic operations. To authenticate the source of an update, a shared secret key between each pair of node is required.
2.2.3 Solutions based on reputation This solution addresses the selfish behavior problem which considerably disrupts the routing process. The main goal of a reputation system is to make decisions about the reliability of entities and improve trust within the network by encouraging the participation in routing. To make such decisions, a reputation system analyzes ancient interactions and exchanges between nodes. Each scheme discussed above has its own requirements and constraints to achieve the desired security. Protocols based on the cryptographic mechanism require key management. Protocols based on reputation include a new metric (reliability of the path) to select a route to a destination. Intermediate nodes are limited to route packets in some protocols while in others they are permitted to respond to the source if they know the path. While many theoretical studies have been proposed in the literature, the satisfaction of safety constraints inherent in ad hoc infrastructure still need more investigation.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012
1. The two entities choose two distinct numbers g and N. N is a prime number and g is a primitive root modulo N. 2. The client calculates x=hash(s || hash(UserName || ":" || Password)) where s is a random string used as the user's salt. Salt is known by both user and server. 3. The client sends its username to the server. 4. The server checks the password entry, calculates a verifier v=g^x mod N. 5. The client generates a random number a which is a private key generated randomly and not publicly revealed, calculates A and sends A to the server. 6. The server generates its own random number b which is a private key generated randomly and not publicly revealed, calculates B and generates another random parameter u and sends it with B to client. u is random scrambling parameter obtained from B (the MSB 32 bits of hash(B)). 7. Both Client and server compute the same value S using the available values but with different operations. 8. If the password P of client entered in step 2 corresponds to that used in the calculation of v, the two S will match.
6
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012
9. Both entities hash S to create a session key cryptographically strong. 10. The client sends M1 to the server as proof that it has the right session key. The server computes M1 and verifies that it corresponds to that sent by the client. 11. The server sends M2 to the client as proof that it has the right session key. The client computes M2 and verifies that it corresponds to that sent by the server. In ASRoP, the authentication process is performed during the route discovery phase, and specifically when a destination node sends response message to a source node. During this step, each node involved in the creation of the route does not exploit any information from a node only if this later is authenticated. The authentication is ensured by the modified SRP protocol using the shared key obtained in the first step. Upon receiving the route request, the intermediate node has two possibilities: either it responds to the source if it is the destination or it has a valid route to reach the destination. In the first case, the intermediate node initiates an authentication process with the next hop. The authentication is performed hop by hop along the path.
Upon receiving a Hello message that reveals a neighbor, the node decides whether to reply or not, the decision is taken based on the identifier (ID) of the neighbor. Only the nodes having an ID greater than their neighbors can initiate a key exchange request (Figure 4). Following this step, each pair of nodes shares a secret which can only be known by these nodes; thus, all nodes share secret keys with their neighbors.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012
3.3.2 Authentication packet: AUTH This packet (Figure 6) is used to exchange useful parameters to perform a mutual authentication between two nodes that share the same secret according to the principle of SRP. AUTH packet includes the following information: IP@_D, @IP_S: destination and source IP addresses; Reply_Dest: destination IP address of the reply packet route; Type: authentication packet type (authentication request, authentication response, request for verification or authentication success); Parameters: values used in the calculation and verification of authentication.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012
The simulations are done on NS-2 version 2.34 in a Linux environment. The used models in the simulation are standard and have the following properties:
Antenna Model
We used an omnidirectional antenna that broadcasts to 360 around it. With this model a node can communicate with all its neighbors in any direction, unlike the type of directional antenna that requires that the transmitter antenna is pointing in the direction of the receiving antenna. The radio range is fixed at 250 m, which is a realistic value considered by existing wireless cards.
Propagation model
The propagation model informs us about how the signals will be attenuated according to distance. For example, the free space model considers the ideal case where there is only one propagation path between transmitter and receiver and it is in direct view, while the Two-ray ground model considers both the direct path and a reflection on the ground.
Traffic model
Usually, a generated traffic in network has to consider several parameters. We set our parameters as follows: the size of a packet is equal to 512 bytes and the sending frequency is 4 packets per second; thus, the flow rate of each source is equal to 4*512*8 bit/sec = 16 kbits/sec. The number of connections is set to 5 to avoid overloading the network. Since the purpose of our simulations is to analyze the properties of the proposed solution, traffic sources generate a constant rate CBR (constant bit rate).
10
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012
Mobility Model
Varying the characteristics of mobility conveys a significant impact on routing performance. In our simulated network, mobile nodes move according to the RWP model (Random Waypoint Model). This model is widely used in research in mobile wireless networks. It provides scenarios where all mobile nodes move randomly during simulation.
Parameters Antenna Number of Nodes Mobility MAC layer type Radio propagation model Mobility model CBR traffic Packets size Pause time Network dimension Transmission range Simulation time
Values OmniAntenna 10-100 nodes 1 m/s IEEE 802.11 Two ray ground Random way point 4 packets/s 512 bits 10 sec 1000 * 1000 250 m 250 sec
4.1.1.1 End to end delay and route discovery time Figure 7 shows an increasing trend in the average time from start to finish depending on the number of nodes. We can observe that the average time of ASRP protocol is significantly higher than that of AODV protocol. This is due to the time required by the ASRP operations used for authentication which makes the route discovery process slower than in AODV. However, this is not dramatic because it does not impact the protocol performance.
11
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012
We notice the same trend in Figure 8 which illustrates the evolution of the route discovery time based on the number of nodes. The figure shows that the route discovery in ASRP requires more time than in AODV. In the case of 50 nodes, the route discovery time is 0.49 ms using AODV and 1.26 ms using ASRP. In the case of 100 nodes, the route discovery time is 3.19 ms using AODV and 4.56 ms using ASRP. However, this time is in milliseconds, we can say that ASRP allows route discovery in a reasonable time.
12
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012
13
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012
We remark also that small performance degradation occurs by increasing the number of nodes: the scaling leads to an increase of exchanged messages, which causes an increase in the number of lost packets. This is often due to collisions between packets.
Figure 12 shows the number of control packets in function of the number of nodes. This parameter let us observe the cost of a protocol in terms of resource consumption and enable to understand the resistance of the protocol in case of congestion. In both protocols the variations of the number of nodes has a direct influence on the number of exchanged packets; this is due to the diffusion of various control messages. However, the number of exchanged control packets is greater in ASRP that in AODV. This is mainly due to the new extension realized in ASRP, which requires in the first step to share the keys and in the second one to run the authentication process.
14
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012
Parameters Antenna Number of Nodes Mobility MAC layer type Radio propagation model Mobility model CBR traffic Packets size Pause time Network dimension Transmission range Simulation time 4.1.2.1 End to end delay and route discovery time
Values OmniAntenna 25 nodes 1-25 m/s IEEE 802.11 Two ray ground Random way point 4 packets/s 512 bits 10 sec 1000 * 1000 250 m 250 sec
Figure 13 shows an increasing trend in the average end-to-end delay depending on the mobility of nodes. We can observe that the average delay in ASRoP is significantly higher than that in AODV. This is due to the time required by the cryptographic procedures and messages exchanged making the route discovery process slow.
15
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012
We observe the same behavior in Figure 14 which represents the evolution of the route discovery time in function of nodes mobility. In this figure, we can observe that the route acquisition in ASRoP requires more time than in AODV. This figure illustrates the strong impact of mobility on ASRoP protocol: having high mobility leads to more control messages, since there is less connectivity (nodes can get away from each others). However, this time as it is in milliseconds, we can say that ASRoP allows getting a secure route in a reasonable time.
4.1.2.2 Packets loss By observing the two graphs in 15 and 16, we can say that these two metrics do not illustrate a difference between the two protocols; the two curves have almost the same trend. The rate of successfully delivered packets varies between 0.96 and 0.99. This high rate implies that the delivery of data packets is very successful, so the performance was not degraded even with the presence of security extensions.
16
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012
We observe that small performance degradation occurs when increasing the mobility of nodes: the node's mobility leads to augment the frequency of broken links, thereby to increase the number of lost packets. This loss is illustrated in Figure 16 but it is controlled by the routing algorithm that tries to adapt to mobility through a local repair of the broken paths.
4.1.2.3 Number of hops by route and routing overhead In Figure 17, we notice that the curves of the two protocols are very close. The obtained average number of hops proves that the length of routes established by ASRoP is not necessarily longer than that of AODV.
17
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012
In Figure 18, in both protocols the mobility has a direct influence on the number of exchanged packets. This is mainly due to the diffusion of various control messages; however, their number is greater in ASRoP than in AODV. This is due to the new extension which requires a first step to share the keys and a second to run the authentication process. The number of control messages decreases when the mobility increases, as we can observe by comparing the two Figures 18 and 12.
Through these results, we can clearly see the impact of mobility and variation of the number of nodes on the evaluated metrics. The simulations have shown that compared to AODV, our security solution consumes slightly more resources and that the delays are longer is ASRoP than in AODV. Indeed, in each hop, the exchange of messages, which ensures authentication increases the security cost of ASRoP.
18
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012
REFERENCES
[1] [2] Charles E. Perkins, Elizabeth M. Belding-Royer, and Samir R. Das. Ad hoc on-demand distance vector (aodv) routing. RFC Experimental 3561,Internet Engineering Task Force, July 2003. David B. Johnson and David A. Maltz. Dynamic source routing in ad hoc wireless networks. In Thomasz Imielinski and Hank Korth, editors, Mobile Computing, volume 353, chapter 5, pages 153_181. Kluwer Academic Publishers, 1996. Ha Duyen Trung, Watit Benjapolakul, and Phan Minh Duc. Performance evaluation and comparison of di_erent ad hoc routing protocols. Comput. Commun., 30:2478_2496, September 2007. L. Abusalah, A. Khokhar, and M. Guizani. A survey of secure mobile ad hoc routing protocols. Communications Surveys Tutorials, IEEE, 10(4):78_93, 2008. P. Sakarindr and N. Ansari. Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks. Wireless Communications, IEEE, 14(5):8 _20, october 2007. Dongbin Wang, Mingzeng Hu, and Hui Zhi. A survey of secure routing in ad hoc networks. In Proceedings of the 2008 The Ninth International Conference on Web-Age Information Management, WAIM '08, pages 482_486, Washington, DC, USA, 2008. IEEE Computer Society. G Xu, C Borcea, and L Iftode. A policy enforcing mechanism for trusted ad hoc networks. Dependable and Secure Computing, IEEE Transactions on, 2010. K. Driscoll, B. Hall, M. Paulitsch, P. Zumsteg, and H. Sivencrona. The real byzantine generals. In Digital Avionics Systems Conference, 2004. DASC 04. The 23rd, volume 2, pages 6.D.4 _ 61_11 Vol.2, 2004. Ming Yu, Mengchu Zhou, and Wei Su. A secure routing protocol against byzantine attacks for manets in adversarial environments. Vehicular Technology, IEEE Transactions on, 58(1):449_460, january 2009. Hakima Chaouchi and Maryline Laurent-Maknavicius. La scurit dans les rseaux sans fil et mobiles, Tome 2, Technologies du march. April 2007. M. Krasnovsky and V. Wieser. A performance of wireless ad-hoc network routing protocol. In Radioelektronika, 2007. 17th International Conference, pages 1 _3, 2007. Hu. Yih-Chun and A. Perrig. A survey of secure wireless ad hoc routing. Security Privacy, IEEE, 2(3):28 _39, 2004. 19
[3]
[4] [5]
[6]
[7] [8]
[9]
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 5, October 2012 [13] [14] Sridhar Radhakrishnan, Gopal Racherla, and David Furuno. Mobile ad hoc networks: principles and practices, pages 381_405. CRC Press, Inc., Boca Raton, FL, USA, 2003. L. Tamilselvan and V. Sankaranarayanan. Solution to prevent rushing attack in wireless mobile ad hoc networks. In Ad Hoc and Ubiquitous Computing, 2006. ISAUHC '06. International Symposium on, pages 42 _47, 2006. Ashish Raniwala, Ashish Raniwala, and Ashish Raniwala. Architecture and protocols for a highperformance, secure ieee 802.11-based wireless mesh network, 2009. Youngho Park, Won-Young Lee, and Kyung-Hyune Rhee. Authenticated on-demand ad hoc routing protocol without pre-shared key distribution. In Proceedings of the 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, pages 41_46, Washington, DC, USA, 2007. IEEE Computer Society. K. Sanzgiri, D. LaFlamme, B. Dahill, B.N. Levine, C. Shields, and E.M. Belding-Royer. Authenticated routing for ad hoc networks. Selected Areas in Communications, IEEE Journal on, 23(3):598 _ 610, 2005. P. Papadimitratos and Z.J. Haas. Secure link state routing for mobile ad hoc networks. In Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on, pages 379 _ 383, 2003. Yih-Chun Hu, D.B. Johnson, and A. Perrig. Sead: secure e_cient distance vector routing for mobile wireless ad hoc networks. In Mobile Computing Systems and Applications, 2002. Proceedings Fourth IEEE Workshop on, 2002. ThomasWu. The secure remote password protocol. In In Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium, pages 97_111, 1998. D. Cerri and A. Ghioni. Securing aodv: the a-saodv secure routing prototype. Communications Magazine, IEEE, 46(2):120 _ 125, february 2008.
[15] [16]
[17]
[18]
[19]
[20] [21]
Authors Dr. Rida KHATOUN received the M. Sc in Computer Engineering and the Ph.D from the Universit de Technologie de Troyes in France in 2004 and 2008. He is currently an associate professor at the University of Technology in Troyes, a member of the Institute Charles Delaunay (ICD). His research interests include DDoS attacks detection and defense, intrusion detection system, wireless networks security and computer security infrastructure. Dr. Lyes Khoukhi is an associate professor at the University of Technology of Troyes (France), since 2009. In 2008, he was researcher at the Computer Sciences department of the University of Montreal (Canada). He received Ph.D degree in Electrical and Computer Engineering from the University of Sherbrooke (Canada) in 2007, and M.Sc degree in Computer Engineering from University of Versailles (France) in 2002. His research interests include wireless communications, mobile ad hoc networking, multimedia and quality of service, and intelligent systems. Ahmed Nabet received his MS degree in computer networks from the University of Pierre and Marie Curie (Paris 6) and his engineering degree in telecommunications from the Bejaia University in 2009. His research interests include computer security networks, security infrastructure, and mobile ad hoc networks. Professor Dominique GAITI received the Ph.D. and the "Habilitation diriger des recherches" degrees in Computer Science from the University of Paris VI and Paris IX on 1991 and 1995 respectively. She is currently a professor at the University of Technology in Troyes (France), a member of the Institute Charles Delaunay (ICD). She is the leader of the team "autonomic networking" in this institute. She was a research scientist at the University of Columbia (New York-USA), 1992-1994 and a researcher at the University of Paris 6, member of the LIP6 laboratory (Paris - France), 1996-1997. She is the chairman of the IFIP WG 6.7 on "smart networks". Her research interests include the smart networks, the intelligence in networks, and the control and management (through intelligent agents) in all types of networks. She is the author of one book and has edited several proceedings.
20