Defending against malicious nodes in closed MANETs through packet authentication and a hybrid trust management system
dc.contributor.advisor | Korkmaz, Turgay | |
dc.contributor.author | Akbani, Rehan | |
dc.contributor.committeeMember | Tosun, Ali S. | |
dc.contributor.committeeMember | White, Greg | |
dc.contributor.committeeMember | Winsborough, William | |
dc.contributor.committeeMember | Raju, G.V.S. | |
dc.date.accessioned | 2024-01-25T19:32:11Z | |
dc.date.available | 2024-01-25T19:32:11Z | |
dc.date.issued | 2009 | |
dc.description | This item is available only to currently enrolled UTSA students, faculty or staff. To download, navigate to Log In in the top right-hand corner of this screen, then select Log in with my UTSA ID. | |
dc.description.abstract | Wireless links and lack of central administration make MANETs far more susceptible to attacks than conventional networks. MANETs must provide various levels of security guarantees to different applications for their successful deployment and usage. Their security requirements depend greatly on their architecture. In this dissertation we are focusing on closed MANETs where only designated nodes are supposed to access the network (e.g., in a military or corporate setting). We define "outsider" nodes as those nodes that are not authorized to access the network, and " insider" nodes as those that are allowed to access the network. The objective of this research is to develop mechanisms that protect a closed MANET against malicious behavior from outsider nodes as well as insider nodes through packet authentication and a Hybrid Trust Management System, respectively. To defend against outsider nodes, we present a new Hop-by-hop, Efficient Authentication Protocol, called HEAP, which is suitable for unicast or multicast applications. HEAP is independent of the routing protocol used and it is based on a modified HMAC algorithm that uses two keys and is very efficient. We compare the performance of HEAP against other algorithms and provide proofs of its security. To combat against insider attacks, we propose a new hybrid trust management system that is based on Reputation Systems (RS) and Role Based Trust Management (RBTM). We develop a novel Machine Learning based RS, called EMLTrust and delineate its advantages. We compare its performance against other RSs and demonstrate the improvements in performance. We also highlight the challenges associated with using RBTMs in MANETs and offer some solutions. Finally, we propose a hybrid TM system that combines EMLTrust with RBTM, and evaluate it to illustrate its efficacy in thwarting insider attacks. | |
dc.description.department | Computer Science | |
dc.format.extent | 157 pages | |
dc.format.mimetype | application/pdf | |
dc.identifier.isbn | 9781109297171 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12588/2377 | |
dc.language | en | |
dc.subject | Hybrid trust management | |
dc.subject | MANET | |
dc.subject | Packet Authentication | |
dc.subject | Reputation System | |
dc.subject | Role based trust management | |
dc.subject | SVM | |
dc.subject.classification | Computer science | |
dc.subject.lcsh | Ad hoc networks (Computer networks) -- Security measures | |
dc.subject.lcsh | Computer security -- Management | |
dc.subject.lcsh | Computers -- Access control | |
dc.title | Defending against malicious nodes in closed MANETs through packet authentication and a hybrid trust management system | |
dc.type | Thesis | |
dc.type.dcmi | Text | |
dcterms.accessRights | pq_closed | |
thesis.degree.department | Computer Science | |
thesis.degree.grantor | University of Texas at San Antonio | |
thesis.degree.level | Doctoral | |
thesis.degree.name | Doctor of Philosophy |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Akbani_utsa_1283D_10153.pdf
- Size:
- 2.61 MB
- Format:
- Adobe Portable Document Format