Document Type



Doctor of Philosophy (PhD)


Computer Science

First Advisor's Name

S.S. Iyengar

First Advisor's Committee Title

Committee Chair

Second Advisor's Name

Leonardo Bobadilla

Second Advisor's Committee Title

Committee Member

Third Advisor's Name

Ning Xie

Third Advisor's Committee Title

Committee Member

Fourth Advisor's Name

Niki Pissinou

Fourth Advisor's Committee Title

Committee Member


Computer Science

Date of Defense



Today's interconnected world requires an inexpensive, fast, and reliable way of transferring information. There exists an increasingly important need for intelligent and adaptable routing of network flows. In the last few years, many researchers have worked toward developing versatile solutions to the problem of routing network flows in unpredictable circumstances. These attempts have evolved into a rich literature in the area of "oblivious network design" which typically route the network flows via a routing scheme that makes use of a spanning tree or a set of trees of the graph representation of the network.

In the first chapter, we provide an introduction to network design. This introductory chapter has been designed to clarify the importance and position of oblivious routing problems in the context of network design as well as its containing field of research. Part I of this dissertation discusses the fundamental role of linked hierarchical data structures in providing the mathematical tools needed to construct rigorous versatile routing schemes and applies hierarchical routing tools to the process of constructing versatile routing schemes. Part II of this dissertation applies the routing tools generated in Part I to address real-world network optimization problems in the area of electrical power networks, clusters of micrograms, and content-centric networks. There is an increasing concern regarding the security and privacy of both physical and communication layers of smart interactive customer-driven power networks, better known as smart grids. Part III of this dissertation utilizes an advanced interdisciplinary approach to address existing security and privacy issues, proposing legitimate countermeasures for each of them from the standpoint of both computing and electrical engineering. The proposed methods are theoretically proven by mathematical tools and illustrated by real-world examples.



Files over 15MB may be slow to open. For best results, right-click and select "Save as..."



Rights Statement

Rights Statement

In Copyright. URI:
This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).