dc.contributor.advisor | Jensen, Christian | |
dc.contributor.author | Keane, John | |
dc.date.accessioned | 2006-08-02T14:41:11Z | |
dc.date.available | 2006-08-02T14:41:11Z | |
dc.date.issued | 2002-09 | |
dc.date.submitted | 2006-08-02T14:41:11Z | |
dc.identifier.uri | http://hdl.handle.net/2262/1198 | |
dc.description.abstract | The notion of an ad hoc network is a new paradigm that allows mobile hosts (called nodes) to communicate without relying on a predefined infrastructure to keep the network connected. Most nodes are assumed to be mobile and communication is generally assumed to be wireless. Ad hoc networks are collaborative in the sense that each node is assumed to relay packets for other nodes that will in return rlay their packets. Thus, all nodes in an ad hoc network form part of the network's routing infrastructure. The mobility of nodes in an ad hoc network means that both the population and the topology of the network are highly dynamic. | en |
dc.description.abstract | In traditional networks, the network infrastructure is provided by a few trusted operators. This is no longer the case in an ad hoc network where every mobile node becomes part of the network fabric. It is thus necessary to define new security mechanisms for the routing protocols in such networks. | en |
dc.description.abstract | This project involves the analysis, design, implementation, and evaluation of one such mechanism based on the notion of trust. Each node records their experience with routing through particular nodes. Nodes will be regarded as trustworthy, if the relayed packets reach their final destination. An evaluation of the trustworthiness of the other nodes allows the sending node to identify and use the route with the highest probability of packets reaching their destination. | en |
dc.description.abstract | The trust based route selection system developed is evaluated using the NS-2 network simulator. Results have proved that malfunctioning or malicious nodes can be clearly identified by other nodes in the network. However, the route selection algorithm that makes use of this identification information is only outperforming existing routing protocols in a restricted number of instances. | en |
dc.format.extent | 806829 bytes | |
dc.format.mimetype | application/pdf | |
dc.language.iso | en | en |
dc.relation.hasversion | TCD-CS-2002-54.pdf | en |
dc.subject | Computer Science | en |
dc.title | Trust Based Dynamic Source Routing in Mobile Ad-Hoc Networks | en |
dc.publisher.institution | Trinity College Dublin. Department of Computer Science | en |
dc.type.qualificationlevel | Masters (Taught) | en |
dc.type.qualificationname | Master of Science (M.Sc.) | en |