Search In this Thesis
   Search In this Thesis  
العنوان
Computer and Systems Engineering Department Agent-Based Trusted Routing Protocols for Wireless Ad-hoc and Sensor Networks/
الناشر
Ain Shams university.
المؤلف
Abdel-Alim, Islam Tharwat Abdel-Halim.
هيئة الاعداد
مشرف / Ayman Mohamed Bahaa Eldin
مشرف / Mohamed Hassan El-Shafey
مشرف / Hossam Mahmoud Ahmed Fahmy
باحث / Islam Tharwat Abdel-Halim Abdel-Alim
الموضوع
Wireless networks. Routing Protocols. Trust. Agent. Security.
تاريخ النشر
2011
عدد الصفحات
p.:155
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
الهندسة الكهربائية والالكترونية
تاريخ الإجازة
1/1/2011
مكان الإجازة
جامعة عين شمس - كلية الهندسة - Electrical Engineering
الفهرس
Only 14 pages are availabe for public view

from 155

from 155

Abstract

The routing performance in Mobile Ad-hoc Networks (MANETs) relies on the co-operation of the individual nodes that constitute the network. The existence of misbehaving nodes may paralyze the routing operation in MANETs. To overcome this behavior, the trustworthiness of the network nodes should be considered in the route selection process combined with the hop count. The trustworthiness is achieved by measuring the trust value for each node in the network.
In this thesis, a new protocol based on self monitoring (agent-based) and following the dynamic source routing (DSR) algorithm is presented. This protocol is called Agent-Based Trusted Dynamic Source Routing (ATDSR) Protocol for MANETs. The objective of this protocol is to manage the trust information locally with minimal overhead in terms of extra messages and time delay. This objective is achieved through installing in each participating node in the network a multi-agent system (MAS). MAS consists of two types of agents: monitoring agent (MOA) and routing agent (ROA). A new mathematical and more realistic objective model for measuring the trust value is introduced. This model is weighted by both number and size of routed packets to reflect the “selective forwarding” behavior of a node. The evaluation of the routing performance via simulation shows that our protocol is better than standard and trusted DSR. The simulation is done over a variety of environmental conditions such as the number of malicious nodes, host density and movement rates.