dc.contributor.advisor | Hogrefe, Dieter Prof. Dr. | |
dc.contributor.author | Elsemary, Hadeer | |
dc.date.accessioned | 2016-12-02T10:46:57Z | |
dc.date.available | 2016-12-02T10:46:57Z | |
dc.date.issued | 2016-12-02 | |
dc.identifier.uri | http://hdl.handle.net/11858/00-1735-0000-002B-7CC7-3 | |
dc.identifier.uri | http://dx.doi.org/10.53846/goediss-6011 | |
dc.language.iso | eng | de |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.subject.ddc | 510 | de |
dc.title | Secure Routing in Intelligent Device-to-Device Communications | de |
dc.type | doctoralThesis | de |
dc.contributor.referee | Hogrefe, Dieter Prof. Dr. | |
dc.date.examination | 2016-09-16 | |
dc.description.abstracteng | Device-to-Device (D2D) communications have received exceptional attention
nowadays due to the overabundance number of applications and services.
Therefore, D2D is expected to be a vital technical component in Internet
of Things and to play a significant role with the next generation 5G. On
the other hand, due to the growth demand of D2D, it becomes an ideal target
for attackers. Moreover, the rapid rise in mobile capabilities opens the
door to the cyber criminals that explore new avenues for malware attacks.
In spite of the fact that the literature proposed security schemes for malware
attacks. However, the research field is still immature and unexplored
in depth due to the fast evolution of malware. Accordingly, malware attacks
formalize security risk that threatens the mobile network. A noteworthy
concern is that the malware attacks are going on at a rate far surpassing
the development of safety techniques. The fundamental goal of our thesis is to propose a novel secure,
energy-aware stochastic routing protocol based on a game-theoretic approach
for security improvement against malware attacks in Device-to-
Device network. The proposed protocol considers for the security requirement,
as well as the energy system constraints. As a first step toward
thwarting the success of the malware attacks, we try to hinder the malware
infection by detecting the malware before it infects the targeted devices. Moreover, the proposed routing protocol considers the attacker’s behavior
and the computation of decision makers’ strategies.
The effectiveness of the proposed routing protocol has been evaluated
using network simulator. Through extensive simulations, we have
validated the effectiveness of proposed protocol by comparing its performance
with the traditional routing protocols and with another strategic
customized protocol. Results are presented to illustrate the efficiency of the
proposed routing protocol regarding the detection rate and overall expected
payoff compared with traditional routing protocols and another strategic
customized protocol in case of three different attacks Distribution. | de |
dc.contributor.coReferee | Fu, Xiaoming Prof. Dr. | |
dc.subject.eng | Device-to-Device (D2D) communications | de |
dc.subject.eng | Malware detection | de |
dc.subject.eng | Game theory | de |
dc.subject.eng | Secure Routing | de |
dc.subject.eng | Energy Efficient Routing | de |
dc.identifier.urn | urn:nbn:de:gbv:7-11858/00-1735-0000-002B-7CC7-3-3 | |
dc.affiliation.institute | Fakultät für Mathematik und Informatik | de |
dc.subject.gokfull | Mathematics (PPN61756535X) | de |
dc.identifier.ppn | 873727223 | |