• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 72
  • 11
  • 8
  • 8
  • 5
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 144
  • 144
  • 144
  • 51
  • 46
  • 37
  • 37
  • 31
  • 30
  • 22
  • 22
  • 20
  • 18
  • 18
  • 17
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

A genetic algorithm for network transport protocol parameter optimization

Granados Murillo, Adrian. January 2009 (has links)
Thesis (M.S.)--University of West Florida, 2009. / Submitted to the Dept. of Computer Science. Title from title page of source document. Document formatted into pages; contains 66 pages. Includes bibliographical references.
22

On Achieving Secure Message Authentication for Vehicular Communications

Zhang, Chenxi January 2010 (has links)
Vehicular Ad-hoc Networks (VANETs) have emerged as a new application scenario that is envisioned to revolutionize the human driving experiences, optimize traffic flow control systems, etc. Addressing security and privacy issues as the prerequisite of VANETs' development must be emphasized. To avoid any possible malicious attack and resource abuse, employing a digital signature scheme is widely recognized as the most effective approach for VANETs to achieve authentication, integrity, and validity. However, when the number of signatures received by a vehicle becomes large, a scalability problem emerges immediately, where a vehicle could be difficult to sequentially verify each received signature within 100-300 ms interval in accordance with the current Dedicated Short Range Communications (DSRC) protocol. In addition, there are still some unsolved attacks in VANETs such as Denial of Service (Dos) attacks, which are not well addressed and waiting for us to solve. In this thesis, we propose the following solutions to address the above mentioned security related issues. First of all, to address the scalability issues, we introduce a novel roadside unit (RSU) aided message authentication scheme, named RAISE, which makes RSUs responsible for verifying the authenticity of messages sent from vehicles and for notifying the results back to vehicles. In addition, RAISE adopts the k-anonymity property for preserving user privacy, where a message cannot be associated with a common vehicle. Secondly, we further consider the situation that RSUs may not cover all the busy streets of a city or a highway in some situations, for example, at the beginning of a VANETs' deployment period, or due to the physical damage of some RSUs, or simply for economic considerations. Under these circumstances, we further propose an efficient identity-based batch signature verification scheme for vehicular communications. The proposed scheme can make vehicles verify a batch of signatures once instead of one after another, and thus it efficiently increases vehicles' message verification speed. In addition, our scheme achieves conditional privacy: a distinct pseudo identity is generated along with each message, and a trust authority can trace a vehicle's real identity from its pseudo identity. In order to find invalid signatures in a batch of signatures, we adopt group testing technique which can find invalid signatures efficiently. Lastly, we identify a DoS attack, called signature jamming attack (SJA), which could easily happen and possibly cause a profound vicious impact on the normal operations of a VANET, yet has not been well addressed in the literature. The SJA can be simply launched at an attacker by flooding a significant number of messages with invalid signatures that jam the surrounding vehicles and prevent them from timely verifying regular and legitimate messages. To countermeasure the SJA, we introduces a hash-based puzzle scheme, which serves as a light-weight filter for excluding likely false signatures before they go through relatively lengthy signature verification process. To further minimize the vicious effect of SJA, we introduce a hash recommendation mechanism, which enables vehicles to share their information so as to more efficiently thwart the SJA. For each research solution, detailed analysis in terms of computational time, and transmission overhead, privacy preservation are performed to validate the efficiency and effectiveness of the proposed schemes.
23

Localization and Coverage in Wireless Ad Hoc Networks

Gribben, Jeremy 04 August 2011 (has links)
Localization and coverage are two important and closely related problems in wireless ad hoc networks. Localization aims to determine the physical locations of devices in a network, while coverage determines if a region of interest is sufficiently monitored by devices. Localization systems require a high degree of coverage for correct functioning, while coverage schemes typically require accurate location information. This thesis investigates the relationship between localization and coverage such that new schemes can be devised which integrate approaches found in each of these well studied problems. This work begins with a thorough review of the current literature on the subjects of localization and coverage. The localization scheduling problem is then introduced with the goal to allow as many devices as possible to enter deep sleep states to conserve energy and reduce message overhead, while maintaining sufficient network coverage for high localization accuracy. Initially this sufficient coverage level for localization is simply a minimum connectivity condition. An analytical method is then proposed to estimate the amount of localization error within a certain probability based on the theoretical lower bounds of location estimation. Error estimates can then be integrated into location dependent schemes to improve on their robustness to localization error. Location error estimation is then used by an improved scheduling scheme to determine the minimum number of reference devices required for accurate localization. Finally, an optimal coverage preserving sleep scheduling scheme is proposed which is robust to localization error, a condition which is ignored by most existing solutions. Simulation results show that with localization scheduling network lifetimes can be increased by several times and message overhead is reduced while maintaining negligible differences in localization error. Furthermore, results show that the proposed coverage preserving sleep scheduling scheme results in fewer active devices and coverage holes under the presence of localization error.
24

A Design and Evaluation of a Secure Neighborhood Awareness Framework for Vehicular Ad-Hoc Networks

Abumansoor, Osama 09 June 2014 (has links)
Vehicular ad-hoc networks (VANETs) are envisioned to provide many road and safety applications that will improve drivers' awareness and enhance the driving experience. Many of proposed applications are location-based that depend on sharing the location information of vehicles and events among neighboring nodes. The location-based applications should provide vehicle operators with knowledge of the current surrounding conditions to help them make appropriate traveling decisions, such as avoiding traffic congestion. Drivers expect to receive accurate and reliable information from other vehicles. Therefore, securing localization service integrity is important to support a VANET's overall system reliability. In this thesis, we study the exchanged location information in VANETs and designed a framework to prevent potential security threats that will violate users' privacy and overcome limitations that can impact the exchanged data integrity and reliability. The solution developed a secure neighborhood awareness service and shared localization information management protocol in a VANET. The proposed framework is constructed through several components: (i) a location verification protocol that will secure location information by providing a non-line-of-sight (NLOS) verification protocol to overcome moving obstacle effects; (ii) privacy-preserving location information management to detect data inconsistency and provide a recovery process while preventing attackers from tracking individual vehicles; (iii) a trust model evaluation mechanism based on neighborhood awareness; (iv) an adaptive beacon protocol that will reduce the number of messages and provide quality of service(QoS) control for network managers and authorities. We also propose a security evaluation model that quantifies the security attributes for the localization service in a VANET. The model will help evaluate an integrated security measures that are provided by different components of the network services.
25

An evaluation of reputation spreading in mobile ad-hoc networks

Håkansson, Martin January 2004 (has links)
The use of mobile ad-hoc networks (MANETs) is growing. The issue of security in MANETs is not trivial, since such networks have no fixed infrastructure and therefor centralised security is not applicable. MANETs are also more sensitive to attacks due to their wireless communication channels and their spontaneous nature. All kind of cooperation requires a sense of trust. The opinion about trust in other entities can be used as a mean to dynamically allow for secure cooperation in MANETs, as soft security. And also to counter some of the inherited security problems of MANETs. To use opinions as a security paradigm in MANETs the opinions about other nodes has to be spread as reputation about a node. This reputation spreading can be done through spreading of opinions or the spreading of evidences about a nodes behaviour. In this work evidence and reputation spreading are compared to each other. This comparison shows that they are quite similar from a security point of view but that they differ in scalability.
26

Localization and Coverage in Wireless Ad Hoc Networks

Gribben, Jeremy January 2011 (has links)
Localization and coverage are two important and closely related problems in wireless ad hoc networks. Localization aims to determine the physical locations of devices in a network, while coverage determines if a region of interest is sufficiently monitored by devices. Localization systems require a high degree of coverage for correct functioning, while coverage schemes typically require accurate location information. This thesis investigates the relationship between localization and coverage such that new schemes can be devised which integrate approaches found in each of these well studied problems. This work begins with a thorough review of the current literature on the subjects of localization and coverage. The localization scheduling problem is then introduced with the goal to allow as many devices as possible to enter deep sleep states to conserve energy and reduce message overhead, while maintaining sufficient network coverage for high localization accuracy. Initially this sufficient coverage level for localization is simply a minimum connectivity condition. An analytical method is then proposed to estimate the amount of localization error within a certain probability based on the theoretical lower bounds of location estimation. Error estimates can then be integrated into location dependent schemes to improve on their robustness to localization error. Location error estimation is then used by an improved scheduling scheme to determine the minimum number of reference devices required for accurate localization. Finally, an optimal coverage preserving sleep scheduling scheme is proposed which is robust to localization error, a condition which is ignored by most existing solutions. Simulation results show that with localization scheduling network lifetimes can be increased by several times and message overhead is reduced while maintaining negligible differences in localization error. Furthermore, results show that the proposed coverage preserving sleep scheduling scheme results in fewer active devices and coverage holes under the presence of localization error.
27

A Design and Evaluation of a Secure Neighborhood Awareness Framework for Vehicular Ad-Hoc Networks

Abumansoor, Osama January 2014 (has links)
Vehicular ad-hoc networks (VANETs) are envisioned to provide many road and safety applications that will improve drivers' awareness and enhance the driving experience. Many of proposed applications are location-based that depend on sharing the location information of vehicles and events among neighboring nodes. The location-based applications should provide vehicle operators with knowledge of the current surrounding conditions to help them make appropriate traveling decisions, such as avoiding traffic congestion. Drivers expect to receive accurate and reliable information from other vehicles. Therefore, securing localization service integrity is important to support a VANET's overall system reliability. In this thesis, we study the exchanged location information in VANETs and designed a framework to prevent potential security threats that will violate users' privacy and overcome limitations that can impact the exchanged data integrity and reliability. The solution developed a secure neighborhood awareness service and shared localization information management protocol in a VANET. The proposed framework is constructed through several components: (i) a location verification protocol that will secure location information by providing a non-line-of-sight (NLOS) verification protocol to overcome moving obstacle effects; (ii) privacy-preserving location information management to detect data inconsistency and provide a recovery process while preventing attackers from tracking individual vehicles; (iii) a trust model evaluation mechanism based on neighborhood awareness; (iv) an adaptive beacon protocol that will reduce the number of messages and provide quality of service(QoS) control for network managers and authorities. We also propose a security evaluation model that quantifies the security attributes for the localization service in a VANET. The model will help evaluate an integrated security measures that are provided by different components of the network services.
28

Dynamic TCP Proxies: Coping with Mobility and Disadvantaged Hosts in MANETs

Schomp, Kyle Graham 23 July 2010 (has links)
No description available.
29

AN INTEGRATED SECURITY SCHEME WITH RESOURCE-AWARENESS FOR WIRELESS AD HOC NETWORKS

DENG, HONGMEI 07 October 2004 (has links)
No description available.
30

Extensions for Multicast in Mobile Ad-hoc Networks (XMMAN): The Reduction of Data Overhead in Wireless Multicast Trees

Christman, Michael Edward 22 August 2002 (has links)
Mobile Ad hoc Network (MANET) routing protocols are designed to provide connectivity between wireless mobile nodes that do not have access to high-speed backbone networks. While many unicast MANET protocols have been explored, research involving multicast protocols has been limited. Existing multicast algorithms attempt to reduce routing overhead, but few, if any, attempt to reduce data overhead. The broadcast nature of wireless communication creates a unique environment in which overlaps in coverage are common. When designed properly, a multicast algorithm can take advantage of these overlaps and reduce data overhead. Unlike a unicast route, in which there is one path between a sender and receiver, a multicast tree can have multiple branches between the sender and its multiple receivers. Some of these paths can be combined to reduce redundant data rebroadcasts. The extensions presented in this thesis are a combination of existing and original routing techniques that were designed to reduce data rebroadcasts by aggregating multicast data flows. One such optimization takes advantage of the multipoint relay (MPR) nodes used by the Optimized Link State Routing (OLSR) unicast protocol. These nodes are used in unicast routing to reduce network broadcast, but can be used to help create efficient multicast data flows. Additionally, by listening to routing messages meant for other nodes, a host can learn a bit about its network and may be able to make routing changes that improve the multicast tree. This protocol was implemented as a software router in Linux. It should be emphasized that this is a real implementation and not a simulation. Experiments showed that the number of data packets in the network could be reduced by as much as 19 percent. These improvements were accomplished while using only a small amount of routing overhead. / Master of Science

Page generated in 0.0412 seconds