• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • No language data
  • Tagged with
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Real-Time Vehicle Performance Monitoring with Data Integrity

Jenkins, William George 09 December 2006 (has links)
A cornerstone of next generation intelligent transportation systems (ITS) is a seamless integration of in-vehicle networking with existing wireless telephony infrastructure. Remote access to on-board diagnostics and performance data is a crucial requirement for ITS. This thesis investigated the performance benefits of a data integrity buffering technique for an extensible vehicle position and performance tracking system (VPPTS). In support of this investigation, a VPPTS prototype was developed. The prototype used available technologies and interfaces to industry-standard communications channels and is a demonstration of a next-generation intelligent transportation system (ITS). The data integrity buffering technique under investigation was shown to provide quantitative improvements in successful VPPTS data transmissions. The use of this technique addressed important deficiencies in real-time data transmission for these types of systems over wireless networks.
2

A Targeted Denial of Service Attack on Data Caching Networks

Gouge, Jeffrey B 01 January 2015 (has links)
With the rise of data exchange over the Internet, information-centric networks have become a popular research topic in computing. One major research topic on Information Centric Networks (ICN) is the use of data caching to increase network performance. However, research in the security concerns of data caching networks is lacking. One example of a data caching network can be seen using a Mobile Ad Hoc Network (MANET). Recently, a study has shown that it is possible to infer military activity through cache behavior which is used as a basis for a formulated denial of service attack (DoS) that can be used to attack networks using data caching. Current security issues with data caching networks are discussed, including possible prevention techniques and methods. A targeted data cache DoS attack is developed and tested using an ICN as a simulator. The goal of the attacker would be to fill node caches with unpopular content, thus making the cache useless. The attack would consist of a malicious node that requests unpopular content in intervals of time where the content would have been just purged from the existing cache. The goal of the attack would be to corrupt as many nodes as possible without increasing the chance of detection. The decreased network throughput and increased delay would also lead to higher power consumption on the mobile nodes, thus increasing the effects of the DoS attack. Various caching polices are evaluated in an ICN simulator program designed to show network performance using three common caching policies and various cache sizes. The ICN simulator is developed using Java and tested on a simulated network. Baseline data are collected and then compared to data collected after the attack. Other possible security concerns with data caching networks are also discussed, including possible smarter attack techniques and methods.

Page generated in 0.0527 seconds