Naval Postgraduate School
Dudley Knox Library
NPS Dudley Knox Library
View Item 
  •   Calhoun Home
  • Theses and Dissertations
  • 1. Thesis and Dissertation Collection, all items
  • View Item
  •   Calhoun Home
  • Theses and Dissertations
  • 1. Thesis and Dissertation Collection, all items
  • View Item
  • How to search in Calhoun
  • My Accounts
  • Ask a Librarian
JavaScript is disabled for your browser. Some features of this site may not work without it.

Browse

All of CalhounCollectionsThis Collection

My Account

LoginRegister

Statistics

Most Popular ItemsStatistics by CountryMost Popular Authors

Secure routing protocol over mobile Internet of Things wireless sensor networks

Thumbnail
Download
Icon18Mar_Wang_Yizhong.pdf (3.154Mb)
Download Record
Download to EndNote/RefMan (RIS)
Download to BibTex
Author
Wang, Yizhong
Date
2018-03
Advisor
Thulasiraman, Preetha
Second Reader
Tummala, Murali
Metadata
Show full item record
Abstract
A wireless Internet of Things (IoT) network is used for military operations due to its low cost and ease of deployment; however, one of the primary challenges with IoT networks is their lack of cohesive security and privacy protocols. For this thesis research, we successfully designed and developed a lightweight trust-based security algorithm to support routing in a mobile IoT wireless sensor network. The standard routing protocol for IoT, known as routing protocol for low power and lossy networks (RPL), was modified to include common security techniques, including a nonce identity, timestamp, and network whitelist, to ensure appropriate node authentication and to protect against Denial-of-Service- and Sybil-based identity attacks. In addition, our algorithm allows RPL to select a routing path over a mobile IoT wireless network based on a computed node trust value and average received signal-strength indicator (RSSI) value across network members. We conducted simulations using the Cooja network simulator to validate the algorithm against stipulated threat models. In addition, Wireshark was used for further packet analysis and inspection. We also analyzed the performance of the network when the trust algorithm is executed. The performance metrics studied include control overhead, packet delivery rate, and network latency.
Rights
Copyright is reserved by the copyright owner.
URI
http://hdl.handle.net/10945/58273
Collections
  • 1. Thesis and Dissertation Collection, all items

Related items

Showing items related by title, author, creator and subject.

  • Thumbnail

    On Static Reachability Analysis of IP Networks 

    Zhan, J.; Maltz, D.; Zhang, H.; Greenberg, A.; Hjalmtysson, G.; Rexford, J.; Xie, Geoffrey (2005-03);
    The primary purpose of a network is to provide reachability between applications running on end hosts. In this paper, we describe how to compute the reachability a network provides from a snapshot of the configuration state ...
  • Thumbnail

    Performance evaluation of a routing protocol in wireless sensor network 

    Teo, Cheng Kiat Amos (Monterey California. Naval Postgraduate School, 2005-12);
    The ability to sense and monitor a variety of environmental conditions using un-tethered sensors offers a significant change over traditional sensing systems that need to be strategically positioned and have topologies ...
  • Thumbnail

    A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks 

    Thulasiraman, Preetha; Wang, Yizhong (IEEE, 2018);
    Military communities have come to rely heavily on commercial off the shelf (COTS) standards and technologies for Internet of Things (IoT) operations. One of the major obstacles to military use of COTS IoT devices is the ...
NPS Dudley Knox LibraryDUDLEY KNOX LIBRARY
Feedback

411 Dyer Rd. Bldg. 339
Monterey, CA 93943
circdesk@nps.edu
(831) 656-2947
DSN 756-2947

    Federal Depository Library      


Start Your Research

Research Guides
Academic Writing
Ask a Librarian
Copyright at NPS
Graduate Writing Center
How to Cite
Library Liaisons
Research Tools
Thesis Processing Office

Find & Download

Databases List
Articles, Books & More
NPS Theses
NPS Faculty Publications: Calhoun
Journal Titles
Course Reserves

Use the Library

My Accounts
Request Article or Book
Borrow, Renew, Return
Tech Help
Remote Access
Workshops & Tours

For Faculty & Researchers
For International Students
For Alumni

Print, Copy, Scan, Fax
Rooms & Study Spaces
Floor Map
Computers & Software
Adapters, Lockers & More

Collections

NPS Archive: Calhoun
Restricted Resources
Special Collections & Archives
Federal Depository
Homeland Security Digital Library

About

Hours
Library Staff
About Us
Special Exhibits
Policies
Our Affiliates
Visit Us

NPS-Licensed Resources—Terms & Conditions
Copyright Notice

Naval Postgraduate School

Naval Postgraduate School
1 University Circle, Monterey, CA 93943
Driving Directions | Campus Map

This is an official U.S. Navy Website |  Please read our Privacy Policy Notice  |  FOIA |  Section 508 |  No FEAR Act |  Whistleblower Protection |  Copyright and Accessibility |  Contact Webmaster

Export search results

The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

A logged-in user can export up to 15000 items. If you're not logged in, you can export no more than 500 items.

To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.