dc.contributor.author |
Khalil, Hassan Souhiel |
dc.date.accessioned |
2020-03-27T22:52:15Z |
dc.date.available |
2020-03-27T22:52:15Z |
dc.date.issued |
2019 |
dc.date.submitted |
2019 |
dc.identifier.other |
b23507421 |
dc.identifier.uri |
http://hdl.handle.net/10938/21674 |
dc.description |
Thesis. M.S. American University of Beirut. Department of Computer Science, 2019. T:6977. |
dc.description |
Advisor : Dr. Haidar Safa, Professor, Computer Science ; Members of Committee : Dr. Mohamed Nassar, Associate Professor, Computer Science ; Dr. Wassim El Hajj, Associate Professor, Computer Science. |
dc.description |
Includes bibliographical references (leaves 91-95) |
dc.description.abstract |
RPL, routing protocol for low power and lossy network is considered as the de-facto routing protocol for the internet of things (IoT). IoT is characterized by diverse devices that interconnect with each other on a cooperative basis in order to achieve certain objectives. IoT devices are constrained in terms of memory usage, processing and power consumption. Moreover, Security in IoT networks is a challenging task that is hard to achieve because the RPL routing protocol is subject to several internal and external attacks such as dropping messages, misleading the requesting nodes, behaving inaccurately, etc. Therefore, detecting and isolating these malicious nodes leads to more reliable and secure network. In this thesis, we propose a trust aware routing protocol for low power and lossy network by adding new trustworthiness metrics during the construction and maintenance of RPL network topology. Each node updates dynamically the trust metrics of its neighbors based on its observations and its neighbors’ recommendations. We have evaluated the performance of the proposed approach through simulations. Obtained results showed that the proposed approach outperformed the existing ones when measuring parameters such as remaining energy in the network, delay, throughput, and percentage of malicious nodes detected while securing and protecting the network from attacks. |
dc.format.extent |
1 online resource (viii, 95 leaves) : illustrations |
dc.language.iso |
eng |
dc.subject.classification |
T:006977 |
dc.subject.lcsh |
Internet of things -- Security measures. |
dc.subject.lcsh |
Routing protocols (Computer network protocols) -- Security measures. |
dc.title |
Trust aware routing protocol for low power and lossy network. |
dc.type |
Thesis |
dc.contributor.department |
Department of Computer Science |
dc.contributor.faculty |
Faculty of Arts and Sciences |
dc.contributor.institution |
American University of Beirut |