Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Air Force Institute of Technology

Computer network protocols

Articles 1 - 12 of 12

Full-Text Articles in Physical Sciences and Mathematics

A Black Hole Attack Model For Reactive Ad-Hoc Protocols, Christopher W. Badenhop Mar 2012

A Black Hole Attack Model For Reactive Ad-Hoc Protocols, Christopher W. Badenhop

Theses and Dissertations

Net-Centric Warfare places the network in the center of all operations, making it a critical resource to attack and defend during wartime. This thesis examines one particular network attack, the Black Hole attack, to determine if an analytical model can be used to predict the impact of this attack on ad-hoc networks. An analytical Black Hole attack model is developed for reactive ad-hoc network protocols DSR and AODV. To simplify topology analysis, a hypercube topology is used to approximate ad-hoc topologies that have the same average node degree. An experiment is conducted to compare the predicted results of the analytical …


Dynamic Protocol Reverse Engineering A Grammatical Inference Approach, Mark E. Deyoung Mar 2008

Dynamic Protocol Reverse Engineering A Grammatical Inference Approach, Mark E. Deyoung

Theses and Dissertations

Round trip engineering of software from source code and reverse engineering of software from binary files have both been extensively studied and the state-of-practice have documented tools and techniques. Forward engineering of protocols has also been extensively studied and there are firmly established techniques for generating correct protocols. While observation of protocol behavior for performance testing has been studied and techniques established, reverse engineering of protocol control flow from observations of protocol behavior has not received the same level of attention. State-of-practice in reverse engineering the control flow of computer network protocols is comprised of mostly ad hoc approaches. We …


A Novel Communications Protocol Using Geographic Routing For Swarming Uavs Performing A Search Mission, Robert L. Lidowski Mar 2008

A Novel Communications Protocol Using Geographic Routing For Swarming Uavs Performing A Search Mission, Robert L. Lidowski

Theses and Dissertations

This research develops the UAV Search Mission Protocol (USMP) for swarming UAVs and determines the protocol's effect on search mission performance. It is hypothesized that geographically routing USMP messages improves search performance by providing geography-dependent data to locations where it impacts search decisions. It is also proposed that the swarm can use data collected by the geographic routing protocol to accurately determine UAV locations and avoid sending explicit location updates. The hypothesis is tested by developing several USMP designs that are combined with the Greedy Perimeter Stateless Routing (GPSR) protocol and a search mission swarm logic into a single network …


Collaborative, Trust-Based Security Mechanisms For A National Utility Intranet, Gregory M. Coates Sep 2007

Collaborative, Trust-Based Security Mechanisms For A National Utility Intranet, Gregory M. Coates

Theses and Dissertations

This thesis investigates security mechanisms for utility control and protection networks using IP-based protocol interaction. It proposes flexible, cost-effective solutions in strategic locations to protect transitioning legacy and full IP-standards architectures. It also demonstrates how operational signatures can be defined to enact organizationally-unique standard operating procedures for zero failure in environments with varying levels of uncertainty and trust. The research evaluates layering encryption, authentication, traffic filtering, content checks, and event correlation mechanisms over time-critical primary and backup control/protection signaling to prevent disruption by internal and external malicious activity or errors. Finally, it shows how a regional/national implementation can protect private …


Adaptive Gravitational Gossip In Monitoring The Joint Battlespace Infosphere, Edmund Descartes Aban Mar 2007

Adaptive Gravitational Gossip In Monitoring The Joint Battlespace Infosphere, Edmund Descartes Aban

Theses and Dissertations

Future USAF operations will be heavily dependent on having the "right information" at the "right time," and Joint Battlespace Infospheres (JBIs) are poised to fill that role. To do this, JBIs must be ubiquitous -- always accessible, secure and responsive. Of all the literature written regarding JBIs, the most important problem to solve in order to make JBIs work in mobile scenarios are scalability, reliability and adaptability to changing battlefield conditions. This paper explores the use of SBCast, a novel adaptive probabilistic protocol and a delivery mechanism for JBI updates and as a possible solution towards guaranteeing these qualities. It …


A Real-Time Wireless Sensor Media Access Control (Mac) Protocol, Barry W. Park Mar 2006

A Real-Time Wireless Sensor Media Access Control (Mac) Protocol, Barry W. Park

Theses and Dissertations

Wireless sensor networks are rapidly becoming a platform for applications such as battlefield monitoring, intelligence gathering, environmental monitoring, and emergency response. Inherent in these applications is a priority and urgency of the information or messages. This means the messages must be delivered in a timely manner for them to be useful. This research assigns a message priority level and provides high-priority messages quicker access to the channel. Using MICA2 sensors and a modified Media Access Control (MAC) layer, real-time message End-to-End (ETE) delay was reduced by 50 percent. Coupled with this decrease in delay, these same real-time messages also had …


Evaluation Of The Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Networks, Amber J. Rickmon Mar 2005

Evaluation Of The Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Networks, Amber J. Rickmon

Theses and Dissertations

Routing protocols designed for wired networks cannot be used in mobile ad hoc networks (MANETs) due to the dynamic topology, limited throughput, and energy constraints. New routing protocols have been designed for use in MANETs, but have not been thoroughly tested under realistic conditions such as node movement, number of sources, the presence of obstacles, and node speed. This research evaluates the performance of ad hoc on-demand distance vector routing with respect to throughput, goodput ratio, end-to-end (ETE) delay, node pair packet delivery rate, and node pair end-to-end delay. It shows these performance metrics vary significantly according to the choice …


Analysis Of Effects Of Bgp Black Hole Routing On A Network Like The Niprnet, Michael D. Kleffman Mar 2005

Analysis Of Effects Of Bgp Black Hole Routing On A Network Like The Niprnet, Michael D. Kleffman

Theses and Dissertations

The Department of Defense (DoD) relies heavily on the Non-secure Internet Protocol Router Network (NIPRNET) to exchange information freely between departments, services, bases, posts, and ships. The NIPRNET is vulnerable to various attacks, to include physical and cyber attacks. One of the most frequently used cyber attacks by criminally motivated hackers is a Distributed Denial of Service (DDoS) attack. DDoS attacks can be used to exhaust network bandwidth and router processing capabilities, and as a leveraging tool for extortion. Border Gateway Protocol (BGP) black hole routing is a responsive defensive network technique for mitigating DDoS attacks. BGP black hole routing …


An Analysis Of The Performance And Security Of J2sdk 1.4 Jsse Implementation Of Ssl/Tls, Danny R. Bias Mar 2004

An Analysis Of The Performance And Security Of J2sdk 1.4 Jsse Implementation Of Ssl/Tls, Danny R. Bias

Theses and Dissertations

The Java SSL/TLS package distributed with the J2SE 1.4.2 runtime is a Java implementation of the SSLv3 and TLSv1 protocols. Java-based web services and other systems deployed by the DoD will depend on this implementation to provide confidentiality, integrity, and authentication. Security and performance assessment of this implementation is critical given the proliferation of web services within DoD channels. This research assessed the performance of the J2SE 1.4.2 SSL and TLS implementations, paying particular attention to identifying performance limitations given a very secure configuration. The performance metrics of this research were CPU utilization, network bandwidth, memory, and maximum number of …


Throughput Performance Evaluation And Analysis Of Unmodified Bluetooth Devices, Steven J. Taylor Mar 2004

Throughput Performance Evaluation And Analysis Of Unmodified Bluetooth Devices, Steven J. Taylor

Theses and Dissertations

The Air Force relies on the application of new technologies to support and execute its mission. As new technologies develop, the integration of that technology is studied to determine the costs and benefits it may provide to the war fighter. One such emergent technology is the Bluetooth wireless protocol, used to connect a small number of devices over a short distance. The short distance is a feature that makes using the protocol desirable. However short, there is still a vulnerability to interception. This research identifies ranges at which several commercially available Bluetooth devices are usable. Various combinations of both distance …


Reverse Geographic Location Of A Computer Node, Clinton G. Carr Iii Mar 2003

Reverse Geographic Location Of A Computer Node, Clinton G. Carr Iii

Theses and Dissertations

The determination of methods by which a user is able to locate his computer when that user does not know his current location, termed "homestation", will provide the Air Force an advantage over its adversaries. The methods are a combination of different mathematical techniques that enable the user to manipulate data to minimize the effects of delay caused by various factors on the network. The techniques use the smallest round trip time obtained from the ping utility. This time is then converted into miles and plotted on a map of the United States. The methods used to solve this problem …


Adjusting Sensing Range To Maximize Throughput On Ad-Hoc Multi-Hop Wireless Networks, Christopher K. Roberts Mar 2003

Adjusting Sensing Range To Maximize Throughput On Ad-Hoc Multi-Hop Wireless Networks, Christopher K. Roberts

Theses and Dissertations

The use of ad-hoc wireless networks is becoming common within the United States Air Force. Such networks are able to be implemented where traditional wired networks are either impractical or too expensive. As the miniaturization of communication devices continues, it is becoming increasingly common for mobile devices to communicate directly with each other, eliminating the need for center access points. Such a network is referred to as a multi-hop ad-hoc network, or simply a multi-hop network. Most multi-hop network protocols use some form of carrier sensing to determine if the wireless channel is in use. A large sensing range can …