Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Mobile Ad Hoc Networks (MANETs) are a collection of wireless mobile nodes with links that are made and broken arbitrarily. They have limited resources in power, computation, broadcast range, and a dynamic topology with no fixed infrastructure. Communication is accomplished by routes where individual nodes relay packets between a source and destination. A lot of work has been done in this area since 1998 focusing mainly on availability, reliability, or efficiency of routing algorithms. Little thought has gone into security as part of the protocol development process. In many instances, MANET security has been built-in as an afterthought. Before MANETs become a mainstay in computing applications, many security issues need to be addressed. One such issue is the insider threat. How does one find and effectively neutralize a malicious node? It has been recently shown how to do this with digital signatures; however, this may not always be possible because of the computational cost of digital signatures. CONTRIBUTION OF THESIS: The main contribution of this thesis is to present the following: • An approach for dealing with malicious faults in MANETs • A forward and reverse symmetric key authentication chain for MANETs • A malicious fault tracing algorithm for communication routing protocols in ad hoc networks with constrained resources
A Thesis submitted to the Department of Computer Science in partial fulfillment of the requirements for the degree of Master of Science.
Includes bibliographical references.
Mike Burmester, Professor Directing Thesis; Breno de Medeiros, Committee Member; Alec Yasinsac, Committee Member.
Florida State University
Use and Reproduction
This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s). The copyright in theses and dissertations completed at Florida State University is held by the students who author them.