201 |
Trade-offs Between Energy and Security in Wireless NetworksMcKay, Kerry A 05 May 2005 (has links)
As the popularity of wireless networks increases, so does the need to protect them. In recent years, many researchers have studied the limitations of the security mechanisms that protect wireless networks. There has also been much research in the power consumption introduced by the network card. Technologies such as CPU and memory are increasing and so is their need for power, but battery technology is increasing at a much slower rate, forming a“battery gap". Because of this, battery capacity plays a major role in the usability of the devices. Although the effect of the network communication on a mobile device's battery has been widely researched, there has been less research on the effect of the security profile on energy usage. In this thesis, we examine a method for analyzing trade-offs between energy and security proposed by Colon Osorio et al. This research describes a method to identify the most appropriate security profile for a given application, given battery constraints. The same method can also be used to discover the minimum battery capacity to maintain a minimum security profile for a predefined amount of time. Trade-offs and optimality are analyzed using a cost-energy function, CE, and security measure, SM. CE encompasses the energy required to use countermeasure M against a specific vulnerability, Vi, as well as the energy consumed in bulk transfer. SM is a numerical representation of the effectiveness of a set of security mechanisms which utilize the set of countermeasures to defend against a set of vulnerabilities. Using CE and SM, we can compare different security profiles using a trade-off model. Having defined such a framework, we investigate different instances and examples where the use of the model is helpful in accessing trade-offs between security obtained and energy consumed to achieve such security. This was first examined through an analytical study, followed by experimentation. The major contributions of this work are an energy-security trade-off model and its empirical validation. This work extends the empirical experimentation done by other researchers such as Potlapally et al., Karri et al., and Stemm and Katz on the relationship between energy and the security of wireless communications in battery-constrained devices.
|
202 |
Wireless Communication Options for a Mobile Ultrasound SystemDickson, Brett William 02 September 2008 (has links)
"A mobile ultrasound system has been developed, which makes ultrasound examinations possible in harsh environments without reliable power sources, such as ambulances, helicopters, war zones, and disaster sites. The goal of this project was to analyze three different wireless communication technologies that could be integrated into the ultrasound system for possible utilization in remote data applications where medical information may be transmitted from the mobile unit to some centralized base station, such as an emergency room or field hospital. By incorporating wireless telecommunication technology into the design, on site medical personnel can be assisted in diagnostic decisions by remote medical experts. The wireless options that have been tested include the IEEE 802.11g standard, mobile broadband cards on a 3G cellular network, and a mobile satellite terminal. Each technology was tested in two phases. In the first phase, a client/server application was developed to measure and record general information about the quality of each link. Four different types of tests were developed to measure channel properties such as data rate, latency, inter-arrival jitter, and packet loss using various signal strengths, packet sizes, network protocols, and traffic loads. In the second phase of testing, the H.264 Scalable Video Codec (SVC) was used to transmit real-time ultrasound video streams over each of the wireless links to observe the image quality as well as the diagnostic value of the received video stream. The information gathered during both testing phases revealed the abilities and limitations of the different wireless technologies. The results from the performance testing will be valuable in the future for those trying to develop network applications for telemedicine procedures over these wireless telecommunication options. Additionally, the testing demonstrated that the system is currently capable of using H.264 SVC compression to transmit VGA quality ultrasound video at 30 frames per second (fps) over 802.11g while QVGA resolution at frame rates between 10 and 15 fps is possible over 3G and satellite networks."
|
203 |
Modelagem analítica da vazão de redes sem fio baseadas na norma IEEE 802.11ahSoares, Stephanie Miranda 20 July 2019 (has links)
Dissertação (mestrado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2018. / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES). / Inúmeras tecnologias promissoras foram desenvolvidas desde a concepção da Internet das Coisas (IoT, do inglês Internet of Things) que poderão modificar diferentes aspectos em nosso cotidiano. Tendo em vista o rápido crescimento da IoT, foi criado o grupo de tarefa IEEE 802.11ah para o desenvolvimento de uma nova norma Wi-Fi para lidar com os principais desafios da IoT, que são a conectividade de muitos dispositivos com recursos de energia limitados a um único ponto de acesso e o aumento do alcance das transmissões para distâncias muito maiores do que aquelas tipicamente utilizadas em redes locais sem fio. Assim, esse padrão traz novos mecanismos nas camadas física e de enlace para atender aos requisitos da IoT. Na camada física, houve modificações para operação em faixas de frequências abaixo de 1 GHz e, na camada MAC, o padrão traz novos mecanismos de economia de energia para ter um melhor desempenho em redes densas, sendo um deles o acesso restrito ao canal (RAW, do inglês Restricted Access Window). Recentemente, há muitos trabalhos sobre o IEEE 802.11ah, entretanto, a maior parte deles trazem ideias de agrupamento ou modelagem analítica para descobrirem o tamanho ótimo do RAW para obter maior desempenho da rede. No entanto, para um melhor entendimento dos efeitos dos diversos parâmetros e mecanismos do IEEE 802.11ah, esta dissertação apresenta um modelo analítico da função de coordenação distribuída do IEEE 802.11ah para o caso em que as estações estão distribuídas uniformemente em diversos slots RAW e possuem a mesma prioridade de tráfego, sob condições de tráfego saturado e canal ideal. Em nosso modelo, consideramos que cada intervalo de beacon possui somente um RAW o qual é dividido em slots RAW, e estudamos o impacto no desempenho da vazão ao variar o número de slots RAW e o número de estações na rede. Além disto, introduzimos ao modelo Markoviano uma probabilidade de término do slot RAW e propomos duas expressões empíricas para o cálculo desta probabilidade. Por fim validamos o modelo analítico com simulações no simulador de redes NS3 e, a partir das simulações computacionais, encontramos uma constante de ajuste para aproximar o modelo das simulações. / Many promising technologies have been developed since the conception of the Internet of Things (IoT) that can modify different aspects of our daily lives. In light of the rapid growth of IoT, it was created the IEEE 802.11ah Task Group to develop a newWi-Fi standard to address IoT’s key challenges, which are the connectivity of many devices with limited power resources to a single access point and the increase in the transmissions range for distances much greater than those typically used in wireless local area networks. Thus, this standard brings new mechanisms in the physical and link layers to meet IoT requirements. In the physical layer, there were modifications to permit the operation in frequency bands below 1 GHz and, in the MAC layer, the standard brings new power saving mechanisms to perform better in dense networks, one of which is the restricted access to the channel (RAW). Recently, there have been a lot of work on IEEE 802.11ah, however, most of them bring grouping or analytical modeling ideas to find out the optimal RAW size for a higher network performance. On the other hand, for a better understanding of the effects of the various IEEE 802.11ah parameters and mechanisms, this dissertation presents an analytical model of the distributed coordination function of IEEE 802.11ah for the case where the stations are evenly distributed in several RAW slots and have the same traffic priority, under conditions of saturated traffic and ideal channel. In our model, we consider that each beacon interval has only one RAW which is divided into RAW slots, and we study the impact on throughput performance by varying the number of RAW slots and the number of stations in the network. In addition, we introduce to the Markovian model a probability of reaching the end of a RAW slot and propose two heuristic expressions for this probability calculation. Finally we validate the analytical model with simulations in the networks simulator NS3 and, from the computational simulations, we find an adjustment constant to approximate the model of the simulations.
|
204 |
A Markov Chain Approach to IEEE 802.11WLAN Performance AnalysisXiong, Lixiang January 2008 (has links)
Doctor of Philosopy (PhD) / Wireless communication always attracts extensive research interest, as it is a core part of modern communication technology. During my PhD study, I have focused on two research areas of wireless communication: IEEE 802.11 network performance analysis, and wireless cooperative retransmission. The first part of this thesis focuses on IEEE 802.11 network performance analysis. Since IEEE 802.11 technology is the most popular wireless access technology, IEEE 802.11 network performance analysis is always an important research area. In this area, my work includes the development of three analytical models for various aspects of IEEE 802.11 network performance analysis. First, a two-dimensional Markov chain model is proposed for analysing the performance of IEEE 802.11e EDCA (Enhanced Distributed Channel Access). With this analytical model, the saturated throughput is obtained. Compared with the existing analytical models of EDCA, the proposed model includes more correct details of EDCA, and accordingly its results are more accurate. This better accuracy is also proved by the simulation study. Second, another two-dimensional Markov chain model is proposed for analysing the coexistence performance of IEEE 802.11 DCF (Distributed Coordination Function) and IEEE 802.11e EDCA wireless devices. The saturated throughput is obtained with the proposed analytical model. The simulation study verifies the proposed analytical model, and it shows that the channel access priority of DCF is similar to that of the best effort access category in EDCA in the coexistence environment. The final work in this area is a hierarchical Markov chain model for investigating the impact of data-rate switching on the performance of IEEE 802.11 DCF. With this analytical model,the saturated throughput can be obtained. The simulation study verifies the accuracy of the model and shows the impact of the data-rate switching under different network conditions. A series of threshold values for the channel condition as well as the number of stations are obtained to decide whether the data-rate switching should be active or not. The second part of this thesis focuses on wireless cooperative retransmission. In this thesis, two uncoordinated distributed wireless cooperative retransmission strategies for single-hop connection are presented. In the proposed strategies, each uncoordinated cooperative neighbour randomly decide whether it should transmit to help the frame delivery depending on some pre-calculated optimal transmission probabilities. In Strategy 1, the source only transmits once in the first slot, and only the neighbours are involved in the retransmission attempts in the subsequent slots. In Strategy 2, both the source and the neighbours participate in the retransmission attempts. Both strategies are first analysed with a simple memoryless channel model, and the results show the superior performance of Strategy 2. With the elementary results for the memoryless channel model, a more realistic two-state Markov fading channel model is used to investigate the performance of Strategy 2. The simulation study verifies the accuracy of our analysis and indicates the superior performance of Strategy 2 compared with the simple retransmission strategy and the traditional two-hop strategy.
|
205 |
Gestion dynamique des topologies sans filsJabri, Issam 08 November 2008 (has links) (PDF)
La problématique de la qualité de service dans les réseaux locaux sans fils IEEE 802.11 demeure l'un des défis délicats à surmonter par la communauté scientifique. L'étude et l'évaluation des approches apportés pour le support de QoS dans ce type de réseaux que ce soit par des simulations, des modèles analytiques ou des mesures réelles montre que ces approches sont toujours insuffisantes pour apporter des vraies garanties de qualité de services aux utilisateurs sans fils. Suite à des travaux effectués au CRAN qui ont porté sur l'équilibrage des charges dans les réseaux Ethernet industriels nous avons opté pour une méthode d'équilibrage de charges dans le contexte des réseaux hotspots 802.11. L'objectif de cette approche étant d'équilibrer les charges des points d'accès pour satisfaire aux besoins en termes de qualité de service de l'ensemble des applications sans fils. Ces besoins sont exprimés en termes de disponibilité, de délais, de bande passante...Nous avons alors définis un algorithme d'équilibrage de charges pouvant établir dynamiquement des associations optimales entre les utilisateurs présents dans un hotspot et les points d'accès en service. Un protocole d'échanges entre les stations sans fils et les points d'accès et entre ces derniers et le serveur d'équilibrage de charges a été établi. Le fonctionnement de ce protocole a été vérifié et simulé en utilisant les outils SDL et MSC. Pour l'évaluation de la performance de l'approche d'équilibrage par rapport à la méthode d'accès de base du protocole, un ensemble de simulations ont été effectués. Ces simulations effectuées sur OPNET montrent que cette approche permet d'améliorer un ensemble de paramètres de qualité de service perçue par les utilisateurs d'un réseau Hotspot.
|
206 |
Mécanismes de Gestion de Mobilité Généralisée dans un Système Hétérogène Fixe/MobileBelghoul, Farouk 06 1900 (has links) (PDF)
Le support de la mobilité dans les protocoles réseaux existants est devenu primordial, à cause du nombre croissant d'utilisateurs de terminaux mobiles désirant garder une connexion constante au réseau, tout en se déplaçant librement à travers des segments de réseaux d'accès sans fil hétérogènes. Le protocole de routage dominant dans les architectures réseaux filaires est IP "Internet protocole". Ce protocole est en passe de dominer aussi le mode des réseaux sans fils. Ainsi, il est naturel d'introduire des mécanismes de gestion de mobilité basés sur IP, dont un processus de handover (passage d'une point d'accès radio à une autre point) efficace et flexible afin de garantir aux utilisateurs une qualité de service minimale de transmission des donnés. En effet, un handover inefficace génère de la latence, de la gigue et des pertes de paquets. La transmission des données est affectée et dégrade la qualité de services de l'application utilisant les services du réseau. Dans cette thèse, nous examinons et analysons d'abord la complexité et l'efficacité des principales techniques de handover et de gestion de mobilité basée sur IP. Les résultats de cette analyse seront ensuite exploités pour présenter finalement notre proposition de soft handover basé sur IPv6. Cette solution permettra l'extension de mobile IPv6 avec une gestion efficace, transparente et locale du multihoming. Bien sur la duplication des flux est bidirectionnel entre le réseau et le mobile et permet un changement de point d'accès au réseau sans perte de données. Nous analysons ensuite les performances de notre approche à travers des résultats de simulations. Ces simulations sont effectuées dans un simulateur développé par notre équipe nommé Gemini2. Cette partie inclut également une comparaison des performances par rapport au fast handover bicasting et Mobile IPv6 basique. Finalement, le dernier chapitre de la thèse inclut notre expérience de l'implémentation d'un prototype mobile multi interfaces et un testbed mobile IPv6 soft handover. Cette implémentation a comme but principal la validation de nos travaux. Ce banc de test nous permettra, en plus, d'analyser les performances du soft handover dans des conditions réelles et avec différents types d'applications et de flux multimédia.
|
207 |
Qualité de service et qualité de contrôle d'un Système Discret Contrôlé en Réseau Sans Fil : proposition d'une approche de co-conception appliquée au standard IEEE 802.11Habib, Gilbert 09 November 2010 (has links) (PDF)
L'utilisation de la communication sans fil dans les applications de contrôle offre de nombreux avantages comme la mobilité... Toutefois, la communication sans fil souffre de nombreux inconvénients tels que la perte d'information, délais aléatoires. Ces problèmes sont essentiellement induits par le non déterministe du comportement de la communication sans fil qui peut avoir un impact négatif sur la performance du système. L'objectif de ce travail porte sur l'amélioration des performances de Systèmes Discrets Contrôlés via un Réseau Sans fil. Ses systèmes sont caractérisés par une commande logique distribuée sur des automates programmables et des boîtiers d'entrées/sorties déportés communiquant via un réseau de communication sans fil, IEEE 802.11. L'approche proposée repose sur un processus de co-conception basé : un, sur une modélisation conjointe des comportements de la commande et du réseau au travers de modèles SED déterministes pour la commande et stochastiques pour le réseau, et sur la simulation pour évaluer les performances des SDCR sans fil et notamment leur temps de réponse. Deux, la proposition d'un algorithme qui alloue dynamiquement les priorités définies par l'IEEE 802.11e sur les trafics de communication en fonction des besoins et des états de la commande; cet algorithme est évalué sur un cas d'étude, pour lequel la communication sans fil induit des risques de collision entre des équipements d'une installation industrielle, en utilisant l'environnement de simulation précédemment défini. Les simulations montrent une amélioration de la performance du système surtout dans des cas où le réseau est très chargé.
|
208 |
Wireless LANs, Real-Time Traffic / Wireless LANs, realtidstrafikGrape, Torbjörn January 2003 (has links)
<p>The usage of Wireless Local Area Networks is increasing rapidly throughout the world. The technology today is not quality proof for the market’s demands. We want to be able to completely wireless perform our demands, such as confer via video or IP-telephony. This is what we call multimedia real-time traffic. It may be achieved over the physical infrastructure in some areas with good results. The goal of this Master’s Thesis is to analyze the possibilities and give solutions and suggestions to achieve multimedia over the wireless networks, with emphasis on the protocol Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). </p><p>This Master’s Thesis is a theoretical study and the suggested solutions have not been tested in an actual wireless network. Instead they have been tested by computer simulation to give an indication of improvements. Basic configurations are set to the same as in the IEEE 802.11 standard. </p><p>Different methods to reach possible improvements of a WLAN are studied, analyzed and simulated. Such methods are: priority, congestion management and multi-channel protocol. Simulations results show how the priority affects the wireless network and how a multi-channel protocol improves the latency and efficiency of the network. The simulation part is concentrated to show improvements of real-time traffic, which is time sensitive. With a multi- channel protocol the network can allow more users, i.e. more traffic. Also, the network will gain improvement in stability.</p>
|
209 |
Snabb och säker roaming i WLAN / Fast and Secure Roaming in WLANFalk, Magnus January 2004 (has links)
<p>This thesis investigates how Ericsson AB should do to achieve fast and secure handover when roaming in a WLAN. It also provides a security analysis of the system that the wireless access point is part of. The reason for this is that Ericsson is selling an access point called the ABS 2200 aimed at the public hotspot market. </p><p>The premise was that they wanted a standardized way of handling the roaming issue. At the outset the 802.11F standard looked like a good alternative (in fact the only standardized alternative). Towards last stages of the work though, it was discovered that the 802.11F standard is no longer supported by IEEE. </p><p>Despite this fact, the conclusion is that secure and fast roaming can be attained if 802.11F is combined with the security standard 802.11i. </p><p>The security analysis concludes that Denial Of Service is a major threat to WLAN hotspots. It also points out the link between the access point and authentication server is the weakest link in the system. The recommendation is that this link receives an additional layer of protection through IPsec withESP. The algorithm recommendations for ESP are AES for confidentiality and SHA-1 for integrity. </p><p>This thesis can also be used as a primer on security in WLAN and contains an extensive glossary making it useful as a reference when reading 802.11 standards.</p>
|
210 |
Investigation of IEEE Standard 802.11 Medium Access Control (MAC) Layer in ad-hocGarcia Torre, Fernando January 2006 (has links)
<p>This thesis involved a research of mechanisms of MAC layer in the ad-hoc networks environment, the ad-hoc networks in the terminology of the standard are called IBSS Independent Basic Service, these type of networks are very useful in real situation where there are not the possibility of display a infrastructure, when there isn’t a network previous planning. </p><p>The connection to a new network is one of the different with the most common type of Wireless Local Area Networks (WLAN) that are the ones with infrastructure. The connection is established without the presence of a central station, instead the stations discover the others with broadcast messages in the coverage area of each station. In the context of standard 802.11 networks the communication between the stations is peer to peer, only with one hop. To continue with initiation process is necessary the synchronization between the different stations of his timers.</p><p>The other capital mechanism that is treated is the medium access mechanism, to hold a shared and unreliable medium, all the heavy of this issue goes to the distributed coordination function DCF.</p><p>In this moment there is an emergent technology, WIMAX or standard IEEE 802.16, like the standard 802.11 is a wireless communication protocol. Some comparison between the MAC layer mechanisms would be realized between these two standards</p>
|
Page generated in 0.0243 seconds