Show simple item record

dc.contributor.authorSchlake, Farimehren_US
dc.date.accessioned2017-04-06T15:45:19Z
dc.date.available2017-04-06T15:45:19Z
dc.date.issued2012-04-10en_US
dc.identifier.otheretd-04122012-094602en_US
dc.identifier.urihttp://hdl.handle.net/10919/77362
dc.description.abstractThe main aspiration behind the contributions of this research work is the achievement of simultaneuos delay-efficiency, autonomy, and security through innovative protocol design to address complex real-life problems. To achieve this, we take a holistic approach. We apply theoretical mathematical modeling implementing implications of social-economic behavioral characteristics to propose a cross-layer network security protocol. We further complement this approach by a layer-specific focus with implementations at two lower OSI layers. For the cross-layer design, we suggest the use of game and mechanism design theories. We design a network-wide consumer-centric and delay-efficient security protocol, DSIC-S. It induces a Dominant Strategy Incentive Compatible equilibrium among all rational and selfish nodes. We prove it is network-wide socially desirable and Pareto optimal. We address resource management and delay-efficiency through synergy of several design aspects. We propose a scenario-based security model with different levels. Furthermore, we design a valuation system to integrate the caused delay in selection of security algorithms at each node without consumer's knowledge of the actual delays. We achieve this by incorporating the consumer's valuation system, in the calculation of the credit transfers through the Vickrey-Clarke-Groves (VCG) payments with Clarke's pivotal rule. As the utmost significant contribution of this work, we solve the revelation theorem's problem of misrepresentation of agents' private information in mechanism design theory through the proposed design. We design an incentive model and incorporate the valuations in the incentives. The simulations validate the theoretical results. They prove the significance of this model and among others show the correlation of the credit transfers to actual delays and security valuations. In the layer-specific approach for the network-layer, we implement the DSIC-S protocol to extend current IPsec and IKEv2 protocols. IPsec-O and IKEv2-O inherit the strong properties of DSIC-S through the proposed extensions. Furthermore, we propose yet another layer-specific protocol, the SME_Q, for the datalink layer based on ATM. We develop an extensive simulation software, SMEQSIM, to simulate ATM security negotiations. We simulate the proposed protocol in a comprehensive real-life ATM network and prove the significance of this research work.
dc.language.isoen_USen_US
dc.publisherVirginia Techen_US
dc.rightsI hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to Virginia Tech or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, dissertation, or project report.en_US
dc.subjectIncentive Compatibilityen_US
dc.subjectDominant Strategyen_US
dc.subjectIPsecen_US
dc.subjectQoSen_US
dc.subjectATMen_US
dc.subjectDelayen_US
dc.subjectSecurity Protocolen_US
dc.subjectPerformanceen_US
dc.subjectOptimizationen_US
dc.subjectMechanism Design Theoryen_US
dc.subjectGame Theoryen_US
dc.subjectBayesian Gamesen_US
dc.titleOptimal Consumer-Centric Delay-Efficient Security Management in Multi-Agent Networks: A Game and Mechanism Design Theoretic Approachen_US
dc.typeDissertationen_US
dc.contributor.departmentElectrical and Computer Engineeringen_US
dc.description.degreePh. D.en_US
thesis.degree.namePh. D.en_US
thesis.degree.leveldoctoralen_US
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen_US
thesis.degree.disciplineElectrical and Computer Engineeringen_US
dc.contributor.committeechairMili, Lamine M.en_US
dc.contributor.committeememberClauer, C. Roberten_US
dc.contributor.committeememberCenteno, Virgilio A.en_US
dc.contributor.committeememberChen, Ing-Rayen_US
dc.contributor.committeememberEltoweissy, Mohamed Y.en_US
dc.type.dcmitypeTexten_US
dc.identifier.sourceurlhttp://scholar.lib.vt.edu/theses/available/etd-04122012-094602/en_US
dc.date.sdate2012-04-12en_US
dc.date.rdate2016-10-18
dc.date.adate2012-05-01en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record