Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

Emergence in the security of protocols for mobile ad-hoc networks

Tools
- Tools
+ Tools

Pavlosoglou, Ioannis (2005) Emergence in the security of protocols for mobile ad-hoc networks. PhD thesis, University of Warwick.

[img]
Preview
PDF
WRAP_THESIS_Pavlosoglou_2005.pdf - Requires a PDF viewer.

Download (41Mb)
Official URL: http://webcat.warwick.ac.uk/record=b2091422~S15

Request Changes to record.

Abstract

This thesis is concerned with the study of secure wireless routing protocols, which have been deployed for the purpose of exchanging information in an adhoc networking enviromnent.
A discrete event simulator is developed, utilising an adaptive systems modelling approach and emergence that aims to assess networking protocols in the presence of adversarial behaviour. The model is used in conjunction with the characteristics that routing protocols have and also a number of cryptographic primitives that can be deployed in order to safeguard the information being exchanged. It is shown that both adversarial behaviour, as well as protocol descriptions can be described in a way that allows for them to be treated as input on the machine level.
Within the system, the output generated selects the fittest protocol design capable of withstanding one or more particular type of attacks. As a result, a number of new and improved protocol specifications are presented and benchmarked against conventional metrics, such as throughput, latency and delivery criteria. From this process, an architecture for designing wireless routing protocols based on a number of security criteria is presented, whereupon the decision of using particular characteristics in a specification has been passed onto the machine level.

Item Type: Thesis or Dissertation (PhD)
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering
Library of Congress Subject Headings (LCSH): Ad hoc networks (Computer networks), Wireless communication systems -- Management, Computer networks -- Security measures, Computer security -- Research
Official Date: July 2005
Dates:
DateEvent
July 2005Submitted
Institution: University of Warwick
Theses Department: School of Engineering
Thesis Type: PhD
Publication Status: Unpublished
Supervisor(s)/Advisor: Green, R. J. (Roger J.) ; Leeson, Mark
Format of File: pdf
Extent: 254 leaves : ill., charts
Language: eng

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

twitter

Email us: wrap@warwick.ac.uk
Contact Details
About Us