Show simple item record

dc.contributor.advisorThomas, Johnson
dc.contributor.authorNarayanam, Swathi
dc.date.accessioned2014-04-15T18:33:04Z
dc.date.available2014-04-15T18:33:04Z
dc.date.issued2008-05-01
dc.identifier.urihttps://hdl.handle.net/11244/8210
dc.description.abstractThis thesis proposes a trust based security model suitable for content-basedrouting in Ad-hoc networks. The trust model is developed by listening to incoming and outgoing messages in passive mode. Knowledge of how these messages are modified is used to update trust tables. This work looks at a number of attacks in such network, for example, predicate modification and proximity modification. For message forwarding these trust tables are used to decide which messages need to be ignored or forwarded depending on threshold trust levels in the tables, thus developing a trust mechanism. The main finding for the research shows that all nodes which are malicious are identified over time; however, there is a high number of false positives for predicate modifications. This is an area for future research.
dc.formatapplication/pdf
dc.languageen_US
dc.publisherOklahoma State University
dc.rightsCopyright is held by the author who has granted the Oklahoma State University Library the non-exclusive right to share this material in its institutional repository. Contact Digital Library Services at lib-dls@okstate.edu or 405-744-9161 for the permission policy on the use, reproduction or distribution of this material.
dc.titleTrust Worthy Content Based Routing in Mobile Ad-hoc Networks
dc.typetext
dc.contributor.committeeMemberHedrick, George
dc.contributor.committeeMemberJonyer, Istvan
osu.filenameNarayanam_okstate_0664M_2698.pdf
osu.collegeArts and Sciences
osu.accesstypeOpen Access
dc.description.departmentComputer Science Department
dc.type.genreThesis


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record