Secure Routing in Intelligent Device-to-Device Communications
von Hadeer Elsemary
Datum der mündl. Prüfung:2016-09-16
Erschienen:2016-12-02
Betreuer:Prof. Dr. Dieter Hogrefe
Gutachter:Prof. Dr. Dieter Hogrefe
Gutachter:Prof. Dr. Xiaoming Fu
Dateien
Name:Final_version_12.pdf
Size:1.23Mb
Format:PDF
Description:Secure Routing in Intelligent Device-to-Device Communications
Zusammenfassung
Englisch
Device-to-Device (D2D) communications have received exceptional attention nowadays due to the overabundance number of applications and services. Therefore, D2D is expected to be a vital technical component in Internet of Things and to play a significant role with the next generation 5G. On the other hand, due to the growth demand of D2D, it becomes an ideal target for attackers. Moreover, the rapid rise in mobile capabilities opens the door to the cyber criminals that explore new avenues for malware attacks. In spite of the fact that the literature proposed security schemes for malware attacks. However, the research field is still immature and unexplored in depth due to the fast evolution of malware. Accordingly, malware attacks formalize security risk that threatens the mobile network. A noteworthy concern is that the malware attacks are going on at a rate far surpassing the development of safety techniques. The fundamental goal of our thesis is to propose a novel secure, energy-aware stochastic routing protocol based on a game-theoretic approach for security improvement against malware attacks in Device-to- Device network. The proposed protocol considers for the security requirement, as well as the energy system constraints. As a first step toward thwarting the success of the malware attacks, we try to hinder the malware infection by detecting the malware before it infects the targeted devices. Moreover, the proposed routing protocol considers the attacker’s behavior and the computation of decision makers’ strategies. The effectiveness of the proposed routing protocol has been evaluated using network simulator. Through extensive simulations, we have validated the effectiveness of proposed protocol by comparing its performance with the traditional routing protocols and with another strategic customized protocol. Results are presented to illustrate the efficiency of the proposed routing protocol regarding the detection rate and overall expected payoff compared with traditional routing protocols and another strategic customized protocol in case of three different attacks Distribution.
Keywords: Device-to-Device (D2D) communications; Malware detection; Game theory; Secure Routing; Energy Efficient Routing