.

Detecting attacks in a cluster based QOS-OLSR protocol. (c2014)

LAUR Repository

Show simple item record

dc.contributor.author Sanadiki, Hiba
dc.date.accessioned 2015-02-18T07:42:56Z
dc.date.available 2015-02-18T07:42:56Z
dc.date.issued 2016-01-28
dc.date.submitted 2014-05-05
dc.identifier.uri http://hdl.handle.net/10725/1953
dc.description Includes bibliographical references (leaves 60-64). en_US
dc.description.abstract In this thesis, we detect attacks targeting the cluster based QOLSR model in Mobile Ad Hoc Networks (MANETs). The QOLSR is a multimedia protocol that was designed on top of the Optimized Link State Routing (OLSR), where the Quality of Service (QoS) of the nodes is considered during the selection of the Multi-Point Relay (MPRs) nodes. One of the drawbacks of this protocol is network lifetime where nodes with limited energy and high bandwidth may be selected to serve as MPRs, which drain nodes’ residual energy and shorten the network lifetime. Thus, in this thesis, we consider the trade-off between extending the lifetime of ad hoc network and QoS assurance based on QOLSR routing protocol. We can accomplish the following by (1) decreasing the number of Multi-Point Relay (MPR) nodes without sacrificing the QoS and (2) observing the energy level, connectivity index, and bandwidth of the MPR nodes. We can reach these goals by deploying the clustering model to QOLSR. Therefore, a new clustering approach and MPR selection process are proposed relying on different combinations of metrics, such as connectivity, residual energy, and bandwidth. Four clustered-based models are derived. Moreover, the cluster-based models are highly vulnerable to security attacks. Two attacks that can be launched against the QoS-OLSR protocol where identified: Identity spoofing and wormhole attacks. Watchdogs are used to detect the attacks performed by malicious nodes. As a solution, we propose to improve the watchdogs’ detection by (1) using cooperative watch-dog model and (2) adding the posterior belief function using Bayes’ rule to the watchdog model. Simulation results are generated in order to evaluate the efficiency of our proposed approaches. en_US
dc.language.iso en en_US
dc.subject Computer networks -- Security measures en_US
dc.subject Computer security en_US
dc.subject Quality of service (Computer networks) en_US
dc.subject Ad hoc networks (Computer networks) -- Security measures en_US
dc.subject Computer network protocols en_US
dc.subject Lebanese American University -- Dissertations en_US
dc.subject Dissertations, Academic en_US
dc.title Detecting attacks in a cluster based QOS-OLSR protocol. (c2014) en_US
dc.type Thesis en_US
dc.term.submitted Spring en_US
dc.author.degree MS in Computer Science en_US
dc.author.school Arts and Sciences en_US
dc.author.idnumber 200602556 en_US
dc.author.commembers Dr. Hadi Otrok
dc.author.commembers Dr. Ramzi Haraty
dc.author.woa OA en_US
dc.description.physdesc 1 hard copy: x, 64 leaves; ill.; 30 cm. available at RNL. en_US
dc.author.division Computer Science en_US
dc.author.advisor Dr. Azzam Mourad
dc.keywords Quality of Service (QoS) en_US
dc.keywords Head Election en_US
dc.keywords MPR Selection en_US
dc.keywords Ad Hoc Networks en_US
dc.keywords Mobility en_US
dc.identifier.doi https://doi.org/10.26756/th.2014.30 en_US
dc.publisher.institution Lebanese American University en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account