dc.contributor.author |
Jurdi, Ghenwa Al |
|
dc.date.accessioned |
2016-03-03T10:50:25Z |
|
dc.date.available |
2016-03-03T10:50:25Z |
|
dc.date.copyright |
6/4/2014 |
en_US |
dc.date.issued |
2016-03-03 |
|
dc.identifier.uri |
http://hdl.handle.net/10725/3255 |
|
dc.description.abstract |
Cooperation in wireless content distribution networks has been proposed as an effective approach to improve system performance in terms of bit rate enhancement and energy consumption reduction. To enable such cooperation, wireless nodes need to be grouped into clusters; in each cluster, a node is selected as a cluster head and acts as a relay between the access point and other nodes. In this thesis, we address the problem of clustering in wireless content distribution networks with intelligent cooperation among nodes. We propose and analyze three clustering methods based on practical system parameters such as estimated signal strength levels among the nodes and the number of neighbors in the vicinity of each node. Simulation results are presented for various network scenarios to demonstrate the characteristics of the proposed approaches and compare their performance gains. In addition, we present and analyze via simulations a practical approach to detect a class of spoofing attacks on the proposed cluster formation methods in wireless content distribution networks. |
en_US |
dc.language.iso |
en |
en_US |
dc.subject |
Wireless sensor networks |
en_US |
dc.subject |
Computer networks -- Security measures |
en_US |
dc.subject |
Distributed operating systems (Computers) |
en_US |
dc.subject |
Computer simulation |
en_US |
dc.title |
Cluster formation in wireless content distribution networks with security considerations. (c2014) |
en_US |
dc.type |
Thesis |
en_US |
dc.term.submitted |
Spring |
en_US |
dc.author.degree |
MS in Computer Science |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
200601517 |
en_US |
dc.author.commembers |
Mourad, Azzam |
|
dc.author.commembers |
Haraty, Ramzi |
|
dc.author.woa |
OA |
en_US |
dc.author.department |
Computer Science and Mathematics |
en_US |
dc.description.embargo |
N/A |
en_US |
dc.description.physdesc |
1 hard copy: x, 59 leaves; ill.; 30 cm. available at RNL. |
en_US |
dc.author.advisor |
Sharafeddine, Sanaa |
|
dc.keywords |
Cooperative Networks |
en_US |
dc.keywords |
Clusters |
en_US |
dc.keywords |
Cluster Heads |
en_US |
dc.keywords |
Received Signal Strength (RSS) |
en_US |
dc.keywords |
Spoofing Attacks |
en_US |
dc.description.bibliographiccitations |
Includes bibliographical references (leaves 56-59). |
en_US |
dc.identifier.doi |
https://doi.org/10.26756/th.2014.59 |
en_US |
dc.publisher.institution |
Lebanese American University |
en_US |