Matthew Beaman

Learn More
Ad-hoc wireless networks are being deployed in critical applications that require protection against sophisticated adversaries. However, wireless routing protocols, such as the widely-used AODV, are often designed with the assumption that nodes are benign. Cryptographic extensions such as Secure AODV (SAODV) protect against some attacks but are still(More)
ii This thesis is dedicated to my grandfather, Dr. Edward Eaton Mason, who is an inspiration to achieve great things. To my grandmother, Dordana Fairman Mason, who looked after me during my undergraduate years. To my father, who gave me a love of learning. To my mother, who gave me a love of music. iii ACKNOWLEDGMENTS I would like to thank the many people(More)
  • 1