A systematic security analysis of the AODV protocol

Thumbnail Image
Date
2003-01-01
Authors
Jones, Benjamin
Major Professor
Advisor
Committee Member
Journal Title
Journal ISSN
Volume Title
Publisher
Altmetrics
Authors
Research Projects
Organizational Units
Organizational Unit
Electrical and Computer Engineering

The Department of Electrical and Computer Engineering (ECpE) contains two focuses. The focus on Electrical Engineering teaches students in the fields of control systems, electromagnetics and non-destructive evaluation, microelectronics, electric power & energy systems, and the like. The Computer Engineering focus teaches in the fields of software systems, embedded systems, networking, information security, computer architecture, etc.

History
The Department of Electrical Engineering was formed in 1909 from the division of the Department of Physics and Electrical Engineering. In 1985 its name changed to Department of Electrical Engineering and Computer Engineering. In 1995 it became the Department of Electrical and Computer Engineering.

Dates of Existence
1909-present

Historical Names

  • Department of Electrical Engineering (1909-1985)
  • Department of Electrical Engineering and Computer Engineering (1985-1995)

Related Units

Journal Issue
Is Version Of
Versions
Series
Department
Electrical and Computer Engineering
Abstract

Wireless networks are becoming a pervasive element of today's computing. With this growth a new type of network is being researched, the ad-hoc network. Wireless ad-hoc networks bring the advantage of flexibility because of the dynamic way that they are formed and left. Looking at these networks, with scenarios such as a tactical battlefield in mind, gives rise to many security issues. Because of the relative newness of wireless ad-hoc networks there is no standard routing protocol for the network layer. Many protocols have been proposed, and this thesis will examine one of the more popular protocols, Ad-hoc On-Demand Distance Vector Routing. With the growing need for security in mind, an analysis of this protocol will be done with relation to the security threats that are prevalent on today's tactical wireless networks. This will then determine the usability of the protocol in such environments were security is a key factor.

Comments
Description
Keywords
Citation
Source
Copyright
Wed Jan 01 00:00:00 UTC 2003