Theses and Dissertations
Issuing Body
Mississippi State University
Advisor
Bullington, Stanley F.
Committee Member
Zhou, Qian
Committee Member
Medal, Hugh R.
Committee Member
Marufuzzaman, Mohammad
Committee Member
Young, Maxwell
Date of Degree
12-11-2019
Document Type
Dissertation - Open Access
Major
Industrial Engineering
Degree Name
Doctor of Philosophy
College
James Worth Bagley College of Engineering
Department
Department of Industrial and Systems Engineering
Abstract
Cybersecurity has become an increasingly important concern for both military and civilian infrastructure globally. Because of the complexity that comes with wireless networks, adversaries have many means of infiltration and disruption of wireless networks. While there is much research done in defending these networks, understanding the robustness of these networks is tantamount for both designing new networks and examining possible security deficiencies in preexisting networks. This dissertation proposes to examine the robustness of wireless networks on three major fronts: the physical layer, the data-link layer, and the network layer. At the physical layer, denial-of-service jamming attacks are considered, and both additive interference and no interference are modeled in an optimal configuration and five common network topologies. At the data-link layer, data transmission efficacy and denial-of-sleep attacks are considered with the goal of maximizing throughput under a constrained lifetime. At the network layer, valid and anomalous communications are considered with the goal of classifying those anomalous communications apart from valid ones. This dissertation proposes that a thorough analysis of the aforementioned three layers provides valuable insights to robustness on general wireless networks.
URI
https://hdl.handle.net/11668/14836
Recommended Citation
Schweitzer, David, "A three-layered robustness analysis of cybersecurity: Attacks and insights" (2019). Theses and Dissertations. 331.
https://scholarsjunction.msstate.edu/td/331
Comments
Jamming attacks, denial-of-service attacks, denial-of-sleep attacks, botnet detection