Repository logo

Trust Management and Security Analysis of Opportunistic Routing Protocols in Multihop Wireless Networks

dc.contributor.authorSalehi, Mahmood
dc.contributor.supervisorAzzedine, Boukerche
dc.date.accessioned2017-01-25T20:47:45Z
dc.date.available2017-01-25T20:47:45Z
dc.date.issued2017
dc.description.abstractRouting in wireless sensor, mobile ad-hoc, and vehicular networks is a crucial operation having significantly attracted scientists' attention during the past years. Opportunistic routing, however, is a novel and promising approach, which is still an ongoing research paradigm. The purpose of opportunistic routing protocols is to increase the reliability of delivering data packets to their destination by utilizing the broadcast nature of wireless networks and selecting a set of nodes, instead of only one, as potential next-hop candidates. Apart from the reliability, security and trustworthiness of communications is also a challenging task. More specifically, almost all traditional and opportunistic routing protocols require cooperation of all network nodes to complete the routing process. However, some nodes in the network may be compromised and avoid collaboration with others due to various selfish or malicious motivations. The focus of this thesis is on modeling security challenges and developing trust-based opportunistic routing protocols. This way, communication between nodes will not only benefit from the reliability of opportunistic routing methods, but also from the security of trust and reputation management schemes. For this purpose, a novel trust-based opportunistic routing protocol is proposed that introduces three different candidate selection metrics known as RTOR, TORDP, and GEOTOR. Such metrics have been designed to address specific characteristics of opportunistic routing protocols. In continue, a watchdog mechanism is proposed to assist nodes in monitoring their candidates, recalculating their trust value, and finally replacing malicious candidates with benign ones. Afterwards, an analytical approach is introduced using Discrete-Time Markov Chain to demonstrate the effect of malicious nodes on different parameters of a wireless network that uses opportunistic routing. In this model, a new method of calculating packet drop ratio is introduced to represent the effect of attackers. The model is then applied on different well-known opportunistic routing protocols and results of the model are verified by simulation. Finally, the proposed analytical model is extended to include a defensive mechanism against adversary nodes. In fact, a packet salvaging mechanism is developed through which backup candidates attempt to save some of the maliciously dropped data packets. Different related network parameters such as delivery ratio, salvage ratio, direct-delivery ratio, etc. are then introduced, calculated, and reported using the introduced model.en
dc.identifier.urihttp://hdl.handle.net/10393/35761
dc.identifier.urihttp://dx.doi.org/10.20381/ruor-718
dc.language.isoenen
dc.publisherUniversité d'Ottawa / University of Ottawaen
dc.titleTrust Management and Security Analysis of Opportunistic Routing Protocols in Multihop Wireless Networksen
dc.typeThesisen
thesis.degree.disciplineGénie / Engineeringen
thesis.degree.levelDoctoralen
thesis.degree.namePhDen
uottawa.departmentScience informatique et génie électrique / Electrical Engineering and Computer Scienceen

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail ImageThumbnail Image
Name:
Salehi_Mahmood_2017_thesis.pdf
Size:
3.09 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail ImageThumbnail Image
Name:
license.txt
Size:
6.65 KB
Format:
Item-specific license agreed upon to submission
Description: