Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Wireless sensor networks are undoubtedly one of the largest growing types of networks today. Much research has been done to make these networks operate more efficiently including the application of data aggregation. Recently, more...
Mobile ad hoc networks, or MANETs, are wireless networks that do not depend on a fixed infrastructure. The wide array of uses for ad hoc networks creates many different levels of security requirements. This work begins by exploring...
In this paper we show that botnets and specifically peer-to-peer botnets, pose a considerable threat to our national security. We examine the rise of the botnet threat and the technology that makes this threat possible. We also examine...
Mobile agent systems provide a new method for computer communication. A mobile agent can migrate from platform to platform, performing a task or computation for its originator. Mobile agents are a promising new technology; however, there...
Most algorithms for Group Key distribution were not created with ad hoc networks in mind. In a wired network with a distinct infrastructure, generating a key distribution algorithm is based on a static environment and, therefore, more...
Since the growth of electronic voting systems in the United States after the year 2000, electronic voting products have received significant scrutiny and examination. Subsequently, studies and reports have identified vulnerabilities as...
An Analysis of the Secure Routing Protocol for Mobile Ad Hoc Network Route Discovery: Using Intuitive Reasoning and Formal Verification to Identify Flaws
With this work we analyze the Secure Routing Protocol (SRP) proposed by Papadimitratos and Haas as a means for securing source-driven route discovery in ad hoc networks. We discuss aws in SRP's design and expose SRP's shortcomings with...
Routing in mobile ad hoc networks presents many challenging problems not faced when routing in static networks with infrastructure. While much research has been done in this area, there is still much progress left to make before routing...
The Cryptographic Protocol Analysis Language Evaluation System (CPAL-ES) is a tool used to analyze protocols with formal methods. In this thesis, we exercise CPAL-ES against two security protocols, the Secure Protocol of Aziz & Diffie, ...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.