• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 119
  • 31
  • 20
  • 9
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 211
  • 211
  • 71
  • 63
  • 34
  • 29
  • 29
  • 28
  • 27
  • 26
  • 25
  • 25
  • 25
  • 25
  • 24
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Enhancing a network coding security scheme to avoid packet dropping in wireless mesh networks / H.L.H.C. Terblanche.

Terblanche, Heila Levina Helena Catharina January 2013 (has links)
With the increase of mobile and smart device usage, the interest in dynamically forming networks is rising. One such type of network isWireless Mesh Networks (WMNs). WMNs are multi-hop networks, with a decentralised nature that can dynamically form into mesh topologies. Network Coding (NC) is a method that is used to increase the efficiency of networks by encoding and decoding data on packet level by means of an XOR operation. NC works well with WMNs because it can exploit WMNs broadcast and opportunistic listening properties. When implementing NC on WMNs the issue of security has to be taken into consideration. Dong et al. identified various security threats for intra-flow NC in WMNs. Intra-flow NC combines packets within individual flows, where the information is divided into different flows called generations, to optimize the decoding process. They identified threats for each component of intra-flow NC for WMNs. These components include forwarding node selection, data packet forwarding and acknowledgement delivery. These threats respectively for each component are wormhole attacks and link quality falsification, packet pollution and packet dropping and acknowledgementdropping, injection and delay. We identified that most security schemes focus on packet pollution attacks in NC, but not on any other threats. Packet dropping is also a major threat in networks that is not addressed. Both packet pollution and packet dropping are threats identified for the data forwarding component of WMNs. The Delayed Authentication with Random Transformations (DART) security scheme addresses packet pollution in intra-flow NC systems. The scheme is based on time asymmetry and checksums. The DART scheme only addresses packet pollution and not any of the other identified threats. The DART scheme was selected to be enhanced to also address packet dropping. To enhance the DART scheme we added additional information to the DART scheme’s checksum packets to detect malicious packet dropping nodes in the network. The information added to the checksum packet took the form of a HealthMatrix, which indicates how many packets a node has received and verified. The new scheme, called the Packet Dropping Detection (PDD) scheme collects the additional information from the checksum packets at the receiver node. The receiver sends the collected information to the source node which then uses the information to identify the malicious nodes in the network. These nodes are then removed from the network. The results show that this new scheme causes a small decrease in throughput – about 2%. The identification of malicious nodes can be used as a diagnostic tool and faulty nodes can be repaired or removed form the network. The advantage to detect malicious packet dropping nodes far outweighs this decrease in throughput. In this dissertation we investigate the effects of packet pollution and packet dropping on NC networks inWMNs. We also enhance an already existing scheme (DART) to add additional packet dropping detection security to it without a great loss in throughput. / Thesis (MIng (Computer and Electronic Engineering))--North-West University, Potchefstroom Campus, 2013.
52

Enhancing a network coding security scheme to avoid packet dropping in wireless mesh networks / H.L.H.C. Terblanche.

Terblanche, Heila Levina Helena Catharina January 2013 (has links)
With the increase of mobile and smart device usage, the interest in dynamically forming networks is rising. One such type of network isWireless Mesh Networks (WMNs). WMNs are multi-hop networks, with a decentralised nature that can dynamically form into mesh topologies. Network Coding (NC) is a method that is used to increase the efficiency of networks by encoding and decoding data on packet level by means of an XOR operation. NC works well with WMNs because it can exploit WMNs broadcast and opportunistic listening properties. When implementing NC on WMNs the issue of security has to be taken into consideration. Dong et al. identified various security threats for intra-flow NC in WMNs. Intra-flow NC combines packets within individual flows, where the information is divided into different flows called generations, to optimize the decoding process. They identified threats for each component of intra-flow NC for WMNs. These components include forwarding node selection, data packet forwarding and acknowledgement delivery. These threats respectively for each component are wormhole attacks and link quality falsification, packet pollution and packet dropping and acknowledgementdropping, injection and delay. We identified that most security schemes focus on packet pollution attacks in NC, but not on any other threats. Packet dropping is also a major threat in networks that is not addressed. Both packet pollution and packet dropping are threats identified for the data forwarding component of WMNs. The Delayed Authentication with Random Transformations (DART) security scheme addresses packet pollution in intra-flow NC systems. The scheme is based on time asymmetry and checksums. The DART scheme only addresses packet pollution and not any of the other identified threats. The DART scheme was selected to be enhanced to also address packet dropping. To enhance the DART scheme we added additional information to the DART scheme’s checksum packets to detect malicious packet dropping nodes in the network. The information added to the checksum packet took the form of a HealthMatrix, which indicates how many packets a node has received and verified. The new scheme, called the Packet Dropping Detection (PDD) scheme collects the additional information from the checksum packets at the receiver node. The receiver sends the collected information to the source node which then uses the information to identify the malicious nodes in the network. These nodes are then removed from the network. The results show that this new scheme causes a small decrease in throughput – about 2%. The identification of malicious nodes can be used as a diagnostic tool and faulty nodes can be repaired or removed form the network. The advantage to detect malicious packet dropping nodes far outweighs this decrease in throughput. In this dissertation we investigate the effects of packet pollution and packet dropping on NC networks inWMNs. We also enhance an already existing scheme (DART) to add additional packet dropping detection security to it without a great loss in throughput. / Thesis (MIng (Computer and Electronic Engineering))--North-West University, Potchefstroom Campus, 2013.
53

Using topological information in opportunistic network coding / by Magdalena Johanna (Leenta) Grobler

Grobler, Magdalena Johanna January 2008 (has links)
Recent advances in methods to increase network utilization have lead to the introduction of a relatively new method called Network Coding. Network Coding is a method that can reduce local congestion in a network by combining information sent over the network. It is commonly researched in the information theory field after it was first introduced by Ahlswede et al in 2000. Network Coding was proven in 2003, by Koetter & Medard to be the only way to achieve the throughput capacity defined by the Min cut Max flow theorem of Shannon. It was applied deterministically in wired networks and randomly in wireless networks. Random Network Coding however requires a lot of overhead and may cause possible delays in the network. We found that there is an open question as to determine where in a wireless network, Network Coding can be implemented. In this thesis we propose to find opportunities for the implementation of Network Coding, by searching for known deterministic Network Coding topologies in larger Networks. Because a known topology is used, we will then also know how Network Coding should be implemented. This method of finding opportunities for the implementation of Network Coding using topology can be combined with a routing algorithm to improve the utilization of a wireless network. We implemented our method on three different topologies and searched 1000 random networks for the presence of these topologies. We found that these topologies occurred frequently enough to make our method a viable method of finding opportunities for the implementation of Network Coding. / Thesis (M.Ing. (Computer and Electronical Engineering))--North-West University, Potchefstroom Campus, 2009.
54

Network Coded Media Distribution in Infrastructure Wireless Mesh Networks

Chieochan, Surachai 07 October 2011 (has links)
Infrastructure wireless mesh networks (IWMNs) provide inexpensive deployment, flexible extension of wireless infrastructure, and easy access to the Internet. With multiple radios at each node, a capacity per node improves by transmitting over these radios simultaneously using orthogonal channels. However, without properly addressing the problem of channel assignment and routing for those nodes that form wireless infrastructures, the resulting network throughput and reliability are unlikely to meet the requirements of those highly demanding, media distribution applications. On a particular channel, poor resource allocation at a given access point/gateway of the underlying IWMN can amplify the problem even further. Motivated by these problems, we develop, based on the theory of network coding, a set of alternative solutions that addresses the above issues. We first introduce a sub-optimal solution to the joint problem of network coding, channel assignment and link scheduling for throughput optimization in the multi-channel multi-radio IWMN. We mathematically formulate the problem as a linear program, taking into account opportunistic overhearing, among other constraints. Based on this formulation, we develop a sub-optimal, auction-based algorithm for network throughput optimization. Simulation results reveal the effectiveness of our algorithm in exploiting multiple radios and channels while coping with fairness issues arising from auctions. The proposed solution also shows promising gains over traditional routing solutions. Our experimental results on an 802.11 testbed further confirm these results. The second part of this thesis then presents three AP/gateway-oriented solutions that address the link-level issues related to radio resource allocation at a particular AP/gateway node of the underlying IWMN, which operates on a given channel serving a set of wireless clients. Since the last-hop wireless link is normally a bottleneck of the IWMN, the key idea underlying all the proposed solutions is to use a version of network coding at the bottlenecked AP/gateway. We use Markov chains and the probability theory to derive several performance measures related to media distribution for both uplink and downlink applications. Via extensive simulations, we show the promising delay and reliability gains of the network-coding based schemes over the traditional schemes without network coding.
55

Using topological information in opportunistic network coding / by Magdalena Johanna (Leenta) Grobler

Grobler, Magdalena Johanna January 2008 (has links)
Recent advances in methods to increase network utilization have lead to the introduction of a relatively new method called Network Coding. Network Coding is a method that can reduce local congestion in a network by combining information sent over the network. It is commonly researched in the information theory field after it was first introduced by Ahlswede et al in 2000. Network Coding was proven in 2003, by Koetter & Medard to be the only way to achieve the throughput capacity defined by the Min cut Max flow theorem of Shannon. It was applied deterministically in wired networks and randomly in wireless networks. Random Network Coding however requires a lot of overhead and may cause possible delays in the network. We found that there is an open question as to determine where in a wireless network, Network Coding can be implemented. In this thesis we propose to find opportunities for the implementation of Network Coding, by searching for known deterministic Network Coding topologies in larger Networks. Because a known topology is used, we will then also know how Network Coding should be implemented. This method of finding opportunities for the implementation of Network Coding using topology can be combined with a routing algorithm to improve the utilization of a wireless network. We implemented our method on three different topologies and searched 1000 random networks for the presence of these topologies. We found that these topologies occurred frequently enough to make our method a viable method of finding opportunities for the implementation of Network Coding. / Thesis (M.Ing. (Computer and Electronical Engineering))--North-West University, Potchefstroom Campus, 2009.
56

On Message Fragmentation, Coding and Social Networking in Intermittently Connected Networks

Altamimi, Ahmed B. 23 October 2014 (has links)
An intermittently connected network (ICN) is defined as a mobile network that uses cooperation between nodes to facilitate communication. This cooperation consists of nodes carrying messages from other nodes to help deliver them to their destinations. An ICN does not require an infrastructure and routing information is not retained by the nodes. While this may be a useful environment for message dissemination, it creates routing challenges. In particular, providing satisfactory delivery performance while keeping the overhead low is difficult with no network infrastructure or routing information. This dissertation explores solutions that lead to a high delivery probability while maintaining a low overhead ratio. The efficiency of message fragmentation in ICNs is first examined. Next, the performance of the routing is investigated when erasure coding and network coding are employed in ICNs. Finally, the use of social networking in ICNs to achieve high routing performance is considered. The aim of this work is to improve the better delivery probability while maintaining a low overhead ratio. Message fragmentation is shown to improve the CDF of the message delivery probability compared to existing methods. The use of erasure coding in an ICN further improve this CDF. Finally, the use of network coding was examined. The advantage of network coding over message replication is quantified in terms of the message delivery probability. Results are presented which show that network coding can improve the delivery probability compared to using just message replication. / Graduate / 0544 / 0984 / ahmedbdr@engr.uvic.ca
57

Hardware Prototyping of Two-Way Relay Systems

Wu, Qiong 2012 August 1900 (has links)
In this thesis, I conduct the hardware prototyping of a two-way relay system using the National Instruments FlexRIO hardware platform. First of all, I develop several practical mechanisms to solve the critical synchronization issues of the systems, including Orthogonal Frequency-Division Multiplexing (OFDM) frame synchronization at the receiver, source to source node synchronization, and handshaking between the sources and relay nodes. Those synchronization methods control the behavior of the two source nodes and the relay node, which play critical roles in the two-way relay systems. Secondly, I develop a pilot-based channel estimation scheme and validate it by showing the successful self-interference cancellation for the two-way relay systems. In particular, I experiment the self-interference cancellation technique by using several channel estimation schemes to estimate both source to relay channels and relay to source channels. Moreover, I implement the physical layer of a 5 MHz OFDM scheme for the two-way relay system. Both the transmitter and receiver are designed to mimic the Long Term Evolution (LTE) downlink scenario. The physical layer of the transmitter has been implemented in Field-Programmable Gate Arrays (FPGAs) and executed on the hardware board, which provides high throughput and fundamental building blocks for the two-way relay system. The physical layer of receiver is implemented in the real-time controller, which provides the ?exibility to rapidly recon?gure the system. Finally, I demonstrate that the 5MHz OFDM based two-way relay system can achieve reliable communications, when the channel estimation and system synchronization can be correctly executed.
58

An Efficient Approach to Coding-Aware Routing

Singh, Harveer January 2016 (has links)
Network coding is an emerging technology that intelligently exploits the store/forward nature of routers to increase the efficiency of the network. Though the concept works in theory, the segregation of coding and routing decisions makes them inapplicable in almost any practical environment. Coding-aware routing takes the network coding a step further to lessen its disadvantages by allowing interlayer communication while making routing decisions. However, most of the existing work exploits coding benefits only for fixed wireless networks, making them dependent on the types of network medium, topology and mobility and thus inapplicable for wired and mobile Ad Hoc networks. The aim of this thesis is to present a generalized algorithm that can detect any possible coding opportunity in a network of any medium, topology and mobility while making routing decisions. We have tested and evaluated our algorithm in six different network topology settings i.e. small wired, big wired, small Ad Hoc network with regular trajectories, big Ad Hoc network with regular trajectories, small Ad Hoc with random trajectories and big Ad Hoc with random trajectories. Improved performance in network throughput, mean queue size and mean end-to-end delay confirms the validity of our algorithm.
59

Physical-Layer Network Coding for MIMO Systems

Xu, Ning 05 1900 (has links)
The future wireless communication systems are required to meet the growing demands of reliability, bandwidth capacity, and mobility. However, as corruptions such as fading effects, thermal noise, are present in the channel, the occurrence of errors is unavoidable. Motivated by this, the work in this dissertation attempts to improve the system performance by way of exploiting schemes which statistically reduce the error rate, and in turn boost the system throughput. The network can be studied using a simplified model, the two-way relay channel, where two parties exchange messages via the assistance of a relay in between. In such scenarios, this dissertation performs theoretical analysis of the system, and derives closed-form and upper bound expressions of the error probability. These theoretical measurements are potentially helpful references for the practical system design. Additionally, several novel transmission methods including block relaying, permutation modulations for the physical-layer network coding, are proposed and discussed. Numerical simulation results are presented to support the validity of the conclusions.
60

Link Reliability in Cooperative Relaying Using Network Coding

Ahsin, Tafzeel ur Rehman January 2010 (has links)
Demand for high data rates is increasing rapidly for future wireless systems.This trend is due to the increase in the number of mobile subscribers that need bandwidth hungry multimedia applications anywhere, anytime. Fourth generation cellular systems like IMT-advanced are being developed to meet these requirements. The unreliable nature of the wireless medium is one of the main hinderance in providing high data rates. Cooperative communication in cellular networks is emerging as a new paradigm to deal with the channel impairments. User cooperation via fixed relays in cellular systems form multiple access relay channels (MARCs) and provide an effective and cost efficient solution to achieve spatial diversity gains. Network resources can be utilized efficiently by using network coding at cooperating nodes. A lot of research work has focused on highlighting the gains achieved by using network coding in MARCs. However, there are certain areas that are not fully explored yet. For instance, the kind of the detection scheme used at the base station receiver and its impact on the link performance has not been addressed. In most cases, the outage probability has been used as a performance measure of MARCs. However, it is well known that the outage probability gives information about the signal availability, but it does not give the complete picture about the reliability of the link and the achieved quality of service. This thesis work looks at the link performance, in terms of symbol error probability, of multiple access relay channels that employ network coding at the relay node. Different types of detection schemes are considered and their performance is compared under different link conditions. Analytical expressions for the average symbol error probability of the cooperating users are derived. Focusing on the uplink of cellular systems, certain rules are devised on how to group users at relay node to ensure mutual benefit for the cooperating users. As a way of improving the link performance of multiple access relay channels and their robustness, the thesis considers constellation selection for the different branches. This method takes advantage of the redundancy between the transmitted symbols created by network coding and the augmented signal space obtained at the base station receiver. The obtained results show that, with a proper selection of the constellation sets, the link performance of MARCs can be improved. The thesis further looks at the interaction between the channel coding schemes of the cooperating users and network coding. It is shown that joint channel-network coding in MARCs can be seen as a product code. This new representation provides considerable flexibility in selecting efficient decoding algorithms at the base station receiver and gives the possibility to use more powerful network coding schemes for MARCs. / QC 20101118 / Sino-Swedish Cooperative Program: IMT-Advanced and Beyond

Page generated in 0.0479 seconds