.

Cluster formation in wireless content distribution networks with security considerations. (c2014)

LAUR Repository

Show simple item record

dc.contributor.author Jurdi, Ghenwa Al
dc.date.accessioned 2016-03-03T10:50:25Z
dc.date.available 2016-03-03T10:50:25Z
dc.date.copyright 6/4/2014 en_US
dc.date.issued 2016-03-03
dc.identifier.uri http://hdl.handle.net/10725/3255
dc.description.abstract Cooperation in wireless content distribution networks has been proposed as an effective approach to improve system performance in terms of bit rate enhancement and energy consumption reduction. To enable such cooperation, wireless nodes need to be grouped into clusters; in each cluster, a node is selected as a cluster head and acts as a relay between the access point and other nodes. In this thesis, we address the problem of clustering in wireless content distribution networks with intelligent cooperation among nodes. We propose and analyze three clustering methods based on practical system parameters such as estimated signal strength levels among the nodes and the number of neighbors in the vicinity of each node. Simulation results are presented for various network scenarios to demonstrate the characteristics of the proposed approaches and compare their performance gains. In addition, we present and analyze via simulations a practical approach to detect a class of spoofing attacks on the proposed cluster formation methods in wireless content distribution networks. en_US
dc.language.iso en en_US
dc.subject Wireless sensor networks en_US
dc.subject Computer networks -- Security measures en_US
dc.subject Distributed operating systems (Computers) en_US
dc.subject Computer simulation en_US
dc.title Cluster formation in wireless content distribution networks with security considerations. (c2014) en_US
dc.type Thesis en_US
dc.term.submitted Spring en_US
dc.author.degree MS in Computer Science en_US
dc.author.school SAS en_US
dc.author.idnumber 200601517 en_US
dc.author.commembers Mourad, Azzam
dc.author.commembers Haraty, Ramzi
dc.author.woa OA en_US
dc.author.department Computer Science and Mathematics en_US
dc.description.embargo N/A en_US
dc.description.physdesc 1 hard copy: x, 59 leaves; ill.; 30 cm. available at RNL. en_US
dc.author.advisor Sharafeddine, Sanaa
dc.keywords Cooperative Networks en_US
dc.keywords Clusters en_US
dc.keywords Cluster Heads en_US
dc.keywords Received Signal Strength (RSS) en_US
dc.keywords Spoofing Attacks en_US
dc.description.bibliographiccitations Includes bibliographical references (leaves 56-59). en_US
dc.identifier.doi https://doi.org/10.26756/th.2014.59 en_US
dc.publisher.institution Lebanese American University en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account