dc.contributor.advisor | Thomas, Johnson | |
dc.contributor.author | Narayanam, Swathi | |
dc.date.accessioned | 2014-04-15T18:33:04Z | |
dc.date.available | 2014-04-15T18:33:04Z | |
dc.date.issued | 2008-05-01 | |
dc.identifier.uri | https://hdl.handle.net/11244/8210 | |
dc.description.abstract | This thesis proposes a trust based security model suitable for content-basedrouting in Ad-hoc networks. The trust model is developed by listening to incoming and outgoing messages in passive mode. Knowledge of how these messages are modified is used to update trust tables. This work looks at a number of attacks in such network, for example, predicate modification and proximity modification. For message forwarding these trust tables are used to decide which messages need to be ignored or forwarded depending on threshold trust levels in the tables, thus developing a trust mechanism. The main finding for the research shows that all nodes which are malicious are identified over time; however, there is a high number of false positives for predicate modifications. This is an area for future research. | |
dc.format | application/pdf | |
dc.language | en_US | |
dc.publisher | Oklahoma State University | |
dc.rights | Copyright is held by the author who has granted the Oklahoma State University Library the non-exclusive right to share this material in its institutional repository. Contact Digital Library Services at lib-dls@okstate.edu or 405-744-9161 for the permission policy on the use, reproduction or distribution of this material. | |
dc.title | Trust Worthy Content Based Routing in Mobile Ad-hoc Networks | |
dc.type | text | |
dc.contributor.committeeMember | Hedrick, George | |
dc.contributor.committeeMember | Jonyer, Istvan | |
osu.filename | Narayanam_okstate_0664M_2698.pdf | |
osu.college | Arts and Sciences | |
osu.accesstype | Open Access | |
dc.description.department | Computer Science Department | |
dc.type.genre | Thesis | |