Show simple item record

dc.rights.licenseRestricted to current Rensselaer faculty, staff and students. Access inquiries may be directed to the Rensselaer Libraries.
dc.contributorKar, Koushik
dc.contributorAbouzeid, Alhussein A.
dc.contributorWang, Meng
dc.contributorCarothers, Christopher D.
dc.contributor.authorSingh, Prateek Kumar
dc.date.accessioned2021-11-03T09:16:11Z
dc.date.available2021-11-03T09:16:11Z
dc.date.created2020-08-10T12:02:54Z
dc.date.issued2019-12
dc.identifier.urihttps://hdl.handle.net/20.500.13015/2502
dc.descriptionDecember 2019
dc.descriptionSchool of Engineering
dc.description.abstractIn chapter 7, we quantify the performance of IoT devices in an edge network through real world experiments when they adopt an application level protocol (CoAP), and different security primitives (DTLS, AES). We conduct indoor and outdoor experiments measuring the overhead, execution time and energy/power consumed by multiple IoT devices, and quantitatively evaluate the impact that distance, varying network conditions (loss, delay, disruption) and protocol stack complexity have on performance. We add a simple (AES) and a complex (DTLS) security mechanism to CoAP with RaspberryPi and ESP32 devices as end-points for the energy experiments. Our experiments with the CoAP reveals a strong dependency of energy consumed with distance. In addition, we show that complex security protocols such as DTLS add a significant amount of power consumption to CoAP, at all distances when compared with simpler encryption methods such as AES128. We also show the performance limitation of non-confirmable CoAP under different network conditions.
dc.description.abstractIn chapter 5 and 6, we perform a comprehensive analysis on different types of blackhole attacks on MANETs and investigate the impact of these attacks on both Data and Control planes of the OLSR routing protocol. Our proposed models, Reputation Routing Model (RRM), Neighbor Watch Model (NWM) and Inconsistency Measurement Model (IMM), empowers each node to depend on itself to identify and isolate malicious nodes. We introduced trust metric in MANET for RRM, utilized the concept of passive neighbor watching (local vigilance) for NWM and introduced inconsistency identification mechanism for IMM. We design two different versions of NWM/IMM model, namely Local-NWM/IMM and Global-NWM/IMM, and utilize them against five major blackhole attack scenarios possible in a MANET with OLSR as the routing protocol. Our models reduces the impact of malicious nodes in the network and identifies/isolates such nodes by feeding correct link state information to OLSR continuously, without introducing any redundancy. We evaluate the performance of our models by emulating network scenarios in Common Open Research Emulator (CORE) for static as well as dynamic topologies. From our findings, it is observed that our proposed models greatly mitigate the impact of data and control blackhole attacks under all attack scenarios and improves the packet delivery performance of OLSR. Global-NWM/IMM performs much better than Local-NWM/IMM, but requires some modifications to OLSR.
dc.description.abstractIn chapter 3 and 4, we focus on a specific application of packet routing to all nodes in MANETs; 'Mass Configuration Roll-Out'. We provide the design and evaluation of: a) S-MCONF and E-MCONF, two high performance mass configuration protocols without confirmation, focusing on efficiency and reliability utilizing an Efficient Broadcast Module (EBM), b) m-DODAG-cMCONF, s-DODAG-cMCONF and Unicast-cMCONF, three efficient and reliable confirmation-based mass configuration protocols (cMCONF), for wireless Mobile Ad-hoc Networks (MANETs). MCONF, which was developed in an earlier work, enables mass configuration changes in a MANET using a classic flooding approach. Performance is measured in terms of reliability and message redundancy. We observed that S-MCONF is very well suited for low node mobility scenarios in the MANETs while E-MCONF provides reliability of message delivery in MANETs even for high node mobility scenarios. For MCONF with confirmation, m-DODAG-cMCONF provides an excellent tradeoff between reliability and message complexity across different network sizes and mobility scenarios.
dc.description.abstractReal-world network like MANETs and IoT Edge Networks suffer from serious routing and networking challenges. Reliable implementation of routing messages to all nodes in a MANET is difficult in general. They do not have central base station and each device operates as a router. In certain critical applications, MANET must be able to reliably route messages to all nodes in the network, along with an additional capacity to track execution. Use of flooding approach causes redundancy in the network and is highly inefficient. Furthermore, MANETs have high risk of attacks as node generally lack adequate knowledge about other nodes and therefore, can easily be compromised. Malicious nodes are major security concern as they can enter the network and deliberately drop the packets to slow down the network. Therefore, a MANET must be able to 1) reliably and efficiently execute the routing process for all nodes in a tactical scenario with an additional capability to track and engage isolated nodes quickly, 2) identify and isolate malicious nodes in the network and select the most trusted path to route packets. This can not be achieved by a simple flooding approach and requires more advance protocols. Over last five years, we have seen extensive growth in the use of IoT devices and the edge networks typically suffers from resource constraints like packet overhead, energy, security etc. It is critical to understand and address these challenges for efficient utilization of edge networks in the real world applications. Therefore, in this thesis we aim to address some core routing and networking challenges in ad hoc and edge networks.
dc.language.isoENG
dc.publisherRensselaer Polytechnic Institute, Troy, NY
dc.relation.ispartofRensselaer Theses and Dissertations Online Collection
dc.subjectElectrical engineering
dc.titleReliable and trustworthy networking in ad hoc and edge networks
dc.typeElectronic thesis
dc.typeThesis
dc.digitool.pid179981
dc.digitool.pid179982
dc.digitool.pid179983
dc.rights.holderThis electronic version is a licensed copy owned by Rensselaer Polytechnic Institute, Troy, NY. Copyright of original work retained by author.
dc.description.degreePhD
dc.relation.departmentDept. of Electrical, Computer, and Systems Engineering


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record