Show simple item record

Secure Routing in Intelligent Device-to-Device Communications

dc.contributor.advisorHogrefe, Dieter Prof. Dr.
dc.contributor.authorElsemary, Hadeer
dc.date.accessioned2016-12-02T10:46:57Z
dc.date.available2016-12-02T10:46:57Z
dc.date.issued2016-12-02
dc.identifier.urihttp://hdl.handle.net/11858/00-1735-0000-002B-7CC7-3
dc.identifier.urihttp://dx.doi.org/10.53846/goediss-6011
dc.language.isoengde
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subject.ddc510de
dc.titleSecure Routing in Intelligent Device-to-Device Communicationsde
dc.typedoctoralThesisde
dc.contributor.refereeHogrefe, Dieter Prof. Dr.
dc.date.examination2016-09-16
dc.description.abstractengDevice-to-Device (D2D) communications have received exceptional attention nowadays due to the overabundance number of applications and services. Therefore, D2D is expected to be a vital technical component in Internet of Things and to play a significant role with the next generation 5G. On the other hand, due to the growth demand of D2D, it becomes an ideal target for attackers. Moreover, the rapid rise in mobile capabilities opens the door to the cyber criminals that explore new avenues for malware attacks. In spite of the fact that the literature proposed security schemes for malware attacks. However, the research field is still immature and unexplored in depth due to the fast evolution of malware. Accordingly, malware attacks formalize security risk that threatens the mobile network. A noteworthy concern is that the malware attacks are going on at a rate far surpassing the development of safety techniques. The fundamental goal of our thesis is to propose a novel secure, energy-aware stochastic routing protocol based on a game-theoretic approach for security improvement against malware attacks in Device-to- Device network. The proposed protocol considers for the security requirement, as well as the energy system constraints. As a first step toward thwarting the success of the malware attacks, we try to hinder the malware infection by detecting the malware before it infects the targeted devices. Moreover, the proposed routing protocol considers the attacker’s behavior and the computation of decision makers’ strategies. The effectiveness of the proposed routing protocol has been evaluated using network simulator. Through extensive simulations, we have validated the effectiveness of proposed protocol by comparing its performance with the traditional routing protocols and with another strategic customized protocol. Results are presented to illustrate the efficiency of the proposed routing protocol regarding the detection rate and overall expected payoff compared with traditional routing protocols and another strategic customized protocol in case of three different attacks Distribution.de
dc.contributor.coRefereeFu, Xiaoming Prof. Dr.
dc.subject.engDevice-to-Device (D2D) communicationsde
dc.subject.engMalware detectionde
dc.subject.engGame theoryde
dc.subject.engSecure Routingde
dc.subject.engEnergy Efficient Routingde
dc.identifier.urnurn:nbn:de:gbv:7-11858/00-1735-0000-002B-7CC7-3-3
dc.affiliation.instituteFakultät für Mathematik und Informatikde
dc.subject.gokfullMathematics (PPN61756535X)de
dc.identifier.ppn873727223


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record