• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 45
  • 11
  • 11
  • 10
  • 7
  • 5
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 114
  • 114
  • 55
  • 55
  • 54
  • 36
  • 35
  • 30
  • 28
  • 17
  • 16
  • 13
  • 13
  • 12
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Energy-efficient and lifetime aware routing in WSNs

Rukpakavong, Wilawan January 2014 (has links)
Network lifetime is an important performance metric in Wireless Sensor Networks (WSNs). Transmission Power Control (TPC) is a well-established method to minimise energy consumption in transmission in order to extend node lifetime and, consequently, lead to solutions that help extend network lifetime. The accurate lifetime estimation of sensor nodes is useful for routing to make more energy-efficient decisions and prolong lifetime. This research proposes an Energy-Efficient TPC (EETPC) mechanism using the measured Received Signal Strength (RSS) to calculate the ideal transmission power. This includes the investigation of the impact factors on RSS, such as distance, height above ground, multipath environment, the capability of node, noise and interference, and temperature. Furthermore, a Dynamic Node Lifetime Estimation (DNLE) technique for WSNs is also presented, including the impact factors on node lifetime, such as battery type, model, brand, self-discharge, discharge rate, age, charge cycles, and temperature. In addition, an Energy-Efficient and Lifetime Aware Routing (EELAR) algorithm is designed and developed for prolonging network lifetime in multihop WSNs. The proposed routing algorithm includes transmission power and lifetime metrics for path selection in addition to the Expected Transmission Count (ETX) metric. Both simulation and real hardware testbed experiments are used to verify the effectiveness of the proposed schemes. The simulation experiments run on the AVRORA simulator for two hardware platforms: Mica2 and MicaZ. The testbed experiments run on two real hardware platforms: the N740 NanoSensor and Mica2. The corresponding implementations are on two operating systems: Contiki and TinyOS. The proposed TPC mechanism covers those investigated factors and gives an overall performance better than the existing techniques, i.e. it gives lower packet loss and power consumption rates, while delays do not significantly increase. It can be applied for single-hop with multihoming and multihop networks. Using the DNLE technique, node lifetime can be predicted more accurately, which can be applied for both static and dynamic loads. EELAR gives the best performance on packet loss rate, average node lifetime and network lifetime compared to the other algorithms and no significant difference is found between each algorithm with the packet delay.
72

Contribution à l'amélioration de la qualité de service dans les réseaux sans-fil multi-sauts

Moad, Dalil 12 November 2015 (has links)
Les réseaux sans fil 802.11 sont en train d'être considérés comme étant la pierre angulaire des systèmes de communication autonomes. En permettant aux usagers de communiquer les uns avec les autres avec les stations de base fixées a des endroits bien précis par l'intermédiaire de protocoles de communication comme les protocole de routage ad hoc. Le standard IEEE 802.11 propose des spéciations pour les deux couches basses (MAC et Physique) du modelé OSI. La couche MAC (Medium Access Control) introduit deux mécanismes d'accès au médium sans fil qui sont différents l'un de l'autre. Le mécanisme DCF (accès au canal distribue ou Distributed Coordination Function), l'accès au canal s'exécute dans chaque station sans faire appel à une unité centrale. Le mécanisme PCF (Point Coordination Function), contrairement au mécanisme DCF l'accès au canal se fait à l'aide d'une unité centrale. Le mécanisme le plus utilise par la norme 802.11 est DCF vu qu'il ne nécessite pas d'infrastructure au déploiement. Pour améliorer la qualité de service dans les réseaux sans multi- sauts, cette thèse aborde cette problématique dans deux couches de la pile protocolaire, à savoir la couche routage et la couches MAC. Elle améliore le routage a QoS en utilisant le protocole de routage a état de lien optimisé (OLSR) et améliore aussi l'efficacité de l'accès au médium sans fil lors du fonctionnement de la couche MAC en mode le plus courant DCF. Pour l'amélioration de routage, nous proposons une approche basée sur le graphe de conflit pour l'estimation de la bande passante partagée entre les nœuds adjacents. Pour la couche MAC, nous proposons un nouveau schéma de Backoff nomme l'algorithme Backoff de Padovane (PBA), pour améliorer l'efficacité de l'accès au médium sans fil dans les réseaux sans fil mobiles Ad Hoc (MANETs). / IEEE 802.11 based wireless networks are considered the cornerstone of autonomous communication systems. These networks allow users to communicate with each others via base stations deployed in specic locations through a set of dedicated communication protocols like Ad Hoc routing protocols. The IEEE 802.11 standard proposes specications for both physical and MAC layers of the OSI model. MAC layer denes dierent types of access to the wireless medium as explained below. The DCF (Distributed Coordination Function) mechanism, in which the access to the medium is executed localy in each station. The PCF (Point Coordination Function) method, unlike DCF mechanism the access the medium is managed by a central unit. The most widespread mechanism among them is the DCF mode as it does not require any infrastructure deployment. To improve the Quality of Service (QoS) oered to the dierent applications in multihop wireless networks, this thesis proposes original solutions to enhance the eciency of certain protocols in two dierent layers of OSI, i.e., routing and MAC layers. More specically, our proposed solutions enable higher eciency of OLSR protocol and ensure more ecient usage of the available bandwidth through the designed Padovan based medium access scheme operating in DCF mode. The routing approach used in OLSR is improved by applying the conict graphs to acquire more accurate estimation of the bandwidth shared with the adjacent nodes. At MAC layer, the number of collisions in dense networks is signicantly reduced by designing new backo scheme dubbed Padovan Backo Algorithm (BEB).
73

Politiques de robustesse en réseaux ad hoc / Robustness policies in mobile ad hoc networks

Bagayoko, Amadou Baba 11 July 2012 (has links)
Les réseaux sans fil sont sujets à des perturbations voire des pannes de liens et de noeuds en raison des caractéristiques intrinsèques de leur support de communication ; ces pannes sont aggravées par les particularités de relayage et de mobilité des noeuds dans les réseaux ad hoc. Ces réseaux requièrent donc la conception et la mise oeuvre des protocoles robustes au niveau de toutes les couches protocolaires. Dans cette thèse, nous choisissons une approche de robustesse pour améliorer les performances des communications dans un réseau mobile ad hoc. Nous proposons et étudions deux architectures de protection (protection par une analyse prédictive et protection par redondance de routes) qui sont couplées avec une restauration de niveau routage. Concernant la phase de détection, le protocole de routage utilise les notifications de niveau liaison pour détecter les pannes de liens. La première solution repose sur un protocole de routage réactif unipath dont le critère de sélection de routes est modifié. L’idée est d’utiliser des métriques capables de prédire l’état futur des routes dans le but d’améliorer leur durée de vie. Pour cela, deux métriques prédictives reposant sur la mobilité des noeuds sont proposées : la fiabilité des routes et une combinaison fiabilité-minimum de sauts. Pour calculer ces métriques prédictives, nous proposons une méthode analytique de calcul de la fiabilité de liens entre noeuds. Cette méthode prend compte le modèle de mobilité des noeuds et les caractéristiques de la communication sans fil notamment les collisions inter-paquets et les atténuations du signal. Les modèles de mobilité étudiés sont les modèles Random Walk et Random Way Point. Nous montrons l’impact de ces métriques sur les performances en termes de taux de livraison de paquets, de surcoût normalisé et de ruptures de routes. La seconde solution est une protection par redondance de routes qui s’appuie sur un protocole de routage multipath. Dans cette architecture, l’opération de recouvrement consiste soit à un basculement sur une route secondaire soit à une nouvelle découverte. Nous montrons que la redondance de routes améliore la robustesse de la communication en réduisant le temps de restauration. Ensuite, nous proposons une comparaison analytique entre les différentes politiques de recouvrement d’un protocole multipath. Nous en deduisons qu’un recouvrement segmenté donne les meilleurs résultats en termes de temps de restauration et de fiabilité / Due to the unreliability characteristics of wireless communications, and nodes mobility, Mobile Ad hoc Networks (MANETs) suffer from frequent failures and reactivation of links. Consequently, the routes frequently change, causing significant number of routing packets to discover new routes, leading to increased network congestion and transmission latency. Therefore, MANETs demand robust protocol design at all layers of the communication protocol stack, particularly at the MAC, the routing and transport layers. In this thesis, we adopt robustness approach to improve communication performance in MANET. We propose and study two protection architectures (protection by predictive analysis and protection by routes redundancy) which are coupled with a routing level restoration. The routing protocol is responsible of the failure detection phase, and uses the mechanism of link-level notifications to detect link failures. Our first proposition is based on unipath reactive routing protocol with a modified route selection criterion. The idea is to use metrics that can predict the future state of the route in order to improve their lifetime. Two predictive metrics based on the mobility of nodes are proposed : the routes reliability and, combining hop-count and reliability metrics. In order to determine the two predictive metrics, we propose an analytical formulation that computes link reliability between adjacent nodes. This formulation takes into account nodes mobility model and the the wireless communication characteristics including the collisions between packets and signal attenuations. Nodes mobility models studied are Random Walk and Random Way Point. We show the impact of these predictive metrics on the networks performance in terms of packet delivery ratio, normalized routing overhead and number of route failures. The second proposition is based on multipath routing protocol. It is a protection mechanism based on route redundancy. In this architecture, the recovery operation is either to switch the traffic to alternate route or to compute a new route. We show that the routes redundancy technique improves the communication robustness by reducing the failure recovery time. We propose an analytical comparison between different recovery policies of multipath routing protocol. We deduce that segment recovery is the best recovery policy in terms of recovery time and reliability
74

UAV Routing Protocol (URP) for crop health management / UAV Routing Protocol (URP) pour la gestion de la santé des cultures

Mohammad, Ammad Uddin 19 December 2017 (has links)
Les réseaux de capteurs sans fil sont maintenant un moyen crédible de collecte de données sur les cultures. L'installation d'une structure de communication fixe pour relayer les données surveillées depuis la tête de grappe jusqu'à sa destination finale peut être soit impraticable en raison de la topologie du terrain, soit prohibitive en raison du coût initial élevé. Une solution plausible consiste à utiliser des véhicules aériens sans pilote (UAV) comme moyen alternatif de collecte de données et de contrôle de supervision limité de l'état des détecteurs. Dans cet article, nous considérons le cas des parcelles agricoles disjointes comprenant chacune des grappes de capteurs, organisées de manière prédéterminée en fonction des objectifs d'élevage. Cette recherche vise à trouver une solution optimale pour la recherche de UAV et la collecte de données à partir de tous les capteurs installés dans un champ de culture. En outre, le protocole de routage des capteurs tiendra compte d'un compromis entre la gestion de l'énergie et les frais généraux de diffusion des données. Le système proposé est évalué en utilisant un modèle simulé et il devrait trouver une classe parmi toutes les sous-considérations. / Wireless sensor networks are now a credible means for crop data collection. The installation of a fixed communication structure to relay the monitored data from the cluster head to its final destination can either be impractical because of land topology or prohibitive due to high initial cost. A plausible solution is to use Unmanned Aerial Vehicles (UAV) as an alternative means for both data collection and limited supervisory control of sensors status. In this paper, we consider the case of disjoint farming parcels each including clusters of sensors, organized in a predetermined way according to farming objectives. This research focuses to drive an optimal solution for UAV search and data gathering from all sensors installed in a crop field. Furthermore, the sensor routing protocol will take into account a tradeoff between energy management and data dissemination overhead.The proposed system is evaluated by using a simulated model and it should find out a class among all under consideration.
75

Message dissemination in mobile delay tolerant networks / Diffusion d'informations dans les réseaux à retard mobiles tolérantes

Miao, Jingwei 29 March 2013 (has links)
Cette thèse traite de la dissémination de messages dans les réseaux tolérants aux délais (DTNs). Ce type d'environnements très contraints ouvre de nombreux défis parmi lesquels le routage qui exploite au mieux les critères de mobilité des noeuds, le routage utilisant un nombre réduit de copies du message à disséminer, le routage de messages respectant la vie privée des noeuds, le routage en présence de nœuds égoïstes. Ce sont ces défis que nous adressons dans le cadre de cette thèse. La première contribution de cette thèse consiste en un protocole de routage adaptatif pour les DTNs exploitant au mieux les critères de mobilité des nœuds. En particulier, ce protocole permet de déterminer à chaque fois qu'une décision de routage doit être prise, quel critère de mobilité augmente la probabilité que le message soit délivré à sa destination. Cette décision est prise grâce à une fonction d'utilité calculée par les nœuds après normalisation des valeurs décrivant les différents critères de mobilité. Le protocole est validé par des simulations faites en utilisant des traces de mobilité réelles et en comparaison avec des protocoles de l'état de l'art. Les résultats montrent de meilleures performances en terme de taux de délivrance de messages mais à coût plus élevé. La seconde contribution de cette thèse consiste en un protocole dont le but est d'adapter dynamiquement le nombre de copies de messages disséminés dans le réseau. Le protocole proposé dans cette thèse résout ce problème en pré-calculant un nombre de copies nécessaire pour atteindre une certaine probabilité de délivrance, puis en augmentant dynamiquement ce nombre au fur et à mesure que le délai d'expiration du message approche. Les résultats montrent que le protocole proposé offre un taux de délivrance équivalent aux protocoles les plus performants à un cout bien inférieur. La troisième contribution de cette thèse consiste en un protocole de routage dans les DTNs qui protège la vie privée des nœuds. En particulier, ce protocole protège les informations relatives à la mobilité des nœuds. Ceci est fait en se basant sur l'organisation des nœuds en communautés. En particulier, au lieu de comparer leur propres probabilités de rencontrer la destination d'un message donné, dans le protocole proposé, les nœuds comparent la probabilité qu'un nœud de leur communauté rencontre la destination. Afin de calculer cette probabilité au sein de la communauté de manière à préserver les valeurs individuelle, le protocole se base sur des algorithmes de cryptographie afin de calculer des produits de probabilité de manière à protéger les valeurs individuelles. Les résultats montrent que le protocole exhibe des performances équivalentes aux protocoles existants tout en étant le seul à respecter les informations confidentielles des usagers. / Mobile Delay Tolerant Networks (MDTNs) are wireless mobile networks in which a complete routing path between two nodes that wish to communicate cannot be guaranteed. A number of networking scenarios have been categorized as MDTNs, such as vehicular ad hoc networks, pocket switched networks, etc. The network asynchrony, coupled with the limited resources of mobile devices make message dissemination (also called routing) one of the fundamental challenges in MDTNs. In the literature, a large body of work has been done to deal with routing in MDTNs. However, most of the existing routing protocols are based on at least one of the following three assumptions: (1) all messages can be routed by relying on a single mobility property; (2) all messages can be routed using a single message allocation strategy; (3) users are willing to disclose their mobility information and relationships to others in order to improve the quality of the routing. We argue that the above three assumptions are not realistic because: (1) users can exhibit various social behaviors and consequently various mobility properties (e.g., they can have regular movements during week-days and exhibit non-predictable movements during week-ends); (2) some messages might need more or less copies to be delivered according to the localization of the source and the destination and to the urgency of the message; and (3) users mobility data can disclose sensitive information about the users. In this thesis, we relieve MDTN routing from the above three restrictive assumptions. Firstly, we propose an adaptive routing protocol for mobile delay tolerant networks. The proposed protocol can dynamically learn the social properties of nodes based on their mobility patterns, and exploit the most appropriate routing strategy each time an intermediate node is encountered. Simulations performed on real mobility traces show that our protocol achieves a better delivery ratio than existing state-of-the-art routing protocols that rely on a single mobility property. Secondly, we present a delay and cost balancing protocol for efficient routing in mobile delay tolerant networks. The presented protocol reasons on the remaining time-to-live of a message to dynamically allocate the minimum number of copies that are necessary to achieve a given delivery probability. Evaluation results show that the protocol can achieve a good balance between message delivery delay and delivery cost, compared with most of the existing routing protocols in the literature. Lastly, we propose an efficient privacy preserving prediction-based routing protocol for mobile delay tolerant networks. This protocol preserves the mobility patterns of a node from being disclosed by exploiting the mobility pattern of communities that node belongs to. Evaluation results demonstrate that this protocol can obtain comparable routing performance to prediction-based protocols while preserving the mobility pattern of nodes.
76

Collision guided routing for ad hoc mobile wireless networks

Ba Surra, Shadi Saleh Ali January 2013 (has links)
Ad hoc mobile wireless networks are self-configuring infrastructureless networks of mobile devices connected via wireless links. Each device can send and receive data, but it should also forward traffic unrelated to its own use. All need to maintain their autonomy, and effectively preserve their resources (e.g. battery power). Moreover, they can leave the network at any time. Their intrinsic dynamicity and fault tolerance makes them suitable for applications, such as emergency response and disaster relief, when infrastructure is nonexistent or damaged due to natural disasters, such as earthquakes and flooding, as well as more mundane, day-to-day, uses where their flexibility would be advantageous. Routing is the fundamental research issue for such networks and refers to finding and maintaining routes between nodes. Moreover, it involves selecting the best route where many may be available. However, due to the freedom of movement of nodes, new routes need to be constantly recalculated. Most routing protocols use pure broadcasting to discover new routes, which takes up a substantial amount of bandwidth. Intelligent rebroadcasting reduces these overheads by calculating the usefulness of a rebroadcast, and the likelihood of message collisions. Unfortunately, this introduces latency and parts of the network may become unreachable. This dissertation presents a routing protocol that uses a new parallel and distributed guided broadcasting technique to reduce redundant broadcasting and to accelerate the path discovery process, while maintaining a high reachability ratio as well as keeping node energy consumption low. This broadcasting scheme is implemented in a Mobile Ad Hoc Network (MANET) and a Wireless Mesh Network (WMN). To reduce overheads further, a Zone based Routing with Parallel Collision Guided Broadcasting Protocol (ZCG) in MANET is introduced. This uses a one hop clustering algorithm that splits the network into zones led by reliable leaders that are mostly static and have plentiful battery resources. For WMN, a Social-aware Routing Protocol (SCG) is designed that draws upon social network theory to associate longstanding social ties between nodes, using their communication patterns to divide the network into conceptual social groups, which allows cluster members to protect each other from redundant broadcasts by using intelligent rebroadcasting. The performance characteristics of the new protocols are established through simulations that measure their behaviour and by comparing them to other well-known routing protocols, namely the: AODV, DSR, TORA and the OLSR, as appropriate, it emerges that two new protocols, the ZCG and SCG, perform better in certain conditions, with the latter doing consistently well under most circumstances.
77

Implementação de um protocolo mesh multi-hop baseado em algoritmo de roteamento geográfico para redes de sensores sem fio / Implementation of a multi-hop mesh protocol based on geographic routing algorithm for wireless sensor networks

Bonifácio, Tatiana Giorgenon 13 January 2011 (has links)
As tecnologias de redes sem fio passaram a atender não só às aplicações corporativas mais sofisticadas como também àquelas envolvendo desde o rastreamento de animais, monitoramento de estruturas e automação industrial até o gerenciamento de utilidades urbanas. Este projeto de pesquisa aborda o desenvolvimento de um protocolo de rede mesh multi-hop segundo a especificação IEEE 802.15.4, com o uso de coordenadas geográficas de cada nó para o roteamento de dados em aplicações de iluminação pública. Para o desenvolvimento do protocolo de rede, é considerada a biblioteca de rotinas de interface de rede denominada Simple MAC (SMAC). Tal biblioteca pode ser utilizada para a elaboração do protocolo de roteamento geográfico destinado à rede mesh multi-hop. Paralelamente, propõe-se a descrição de um método a ser adotado para a inserção do protocolo de roteamento geográfico no SMAC. Os códigos, desenvolvidos em linguagem de programação C, são portados para a plataforma de desenvolvimento dos nós de comunicação de um toolkit específico e submetidos a ensaios experimentais. Os resultados englobam a geração de conhecimento teórico e prático a respeito das redes de sensores sem fio, bem como o desenvolvimento de um software aberto para este tipo de rede. As propriedades de auto-organização da rede, robustez e baixa latência são comprovadas nos ensaios experimentais. / The technologies of wireless networks have to serve not only the most sophisticated business applications but also those that involve the tracking of animals, monitoring of structures, industrial automation and the management of urban utilities. This research project addresses the development of a protocol for multi-hop mesh network according to IEEE 802.15.4, with the use of geographical coordinates of each node for routing data in applications such as street lighting. In order to develop the network protocol, the routines library of the network interface, called Simple MAC (SMAC), is considered. This library can be used for establishing the geographic routing protocol destined for the multi-hop mesh network. In parallel it is proposed to describe a method to be adopted for the inclusion of geographic routing protocol in SMAC. The codes, developed in C programming language, are ported to the development platform of communication nodes of a specific toolkit and subjected to experimental tests. The results include the generation of theoretical and practical knowledge regarding the wireless sensor networks, as well as the development of open software for this type of network. The properties of self-organization of the network, robustness and low latency are proven in experimental tests.
78

Implementação de um protocolo mesh multi-hop baseado em algoritmo de roteamento geográfico para redes de sensores sem fio / Implementation of a multi-hop mesh protocol based on geographic routing algorithm for wireless sensor networks

Tatiana Giorgenon Bonifácio 13 January 2011 (has links)
As tecnologias de redes sem fio passaram a atender não só às aplicações corporativas mais sofisticadas como também àquelas envolvendo desde o rastreamento de animais, monitoramento de estruturas e automação industrial até o gerenciamento de utilidades urbanas. Este projeto de pesquisa aborda o desenvolvimento de um protocolo de rede mesh multi-hop segundo a especificação IEEE 802.15.4, com o uso de coordenadas geográficas de cada nó para o roteamento de dados em aplicações de iluminação pública. Para o desenvolvimento do protocolo de rede, é considerada a biblioteca de rotinas de interface de rede denominada Simple MAC (SMAC). Tal biblioteca pode ser utilizada para a elaboração do protocolo de roteamento geográfico destinado à rede mesh multi-hop. Paralelamente, propõe-se a descrição de um método a ser adotado para a inserção do protocolo de roteamento geográfico no SMAC. Os códigos, desenvolvidos em linguagem de programação C, são portados para a plataforma de desenvolvimento dos nós de comunicação de um toolkit específico e submetidos a ensaios experimentais. Os resultados englobam a geração de conhecimento teórico e prático a respeito das redes de sensores sem fio, bem como o desenvolvimento de um software aberto para este tipo de rede. As propriedades de auto-organização da rede, robustez e baixa latência são comprovadas nos ensaios experimentais. / The technologies of wireless networks have to serve not only the most sophisticated business applications but also those that involve the tracking of animals, monitoring of structures, industrial automation and the management of urban utilities. This research project addresses the development of a protocol for multi-hop mesh network according to IEEE 802.15.4, with the use of geographical coordinates of each node for routing data in applications such as street lighting. In order to develop the network protocol, the routines library of the network interface, called Simple MAC (SMAC), is considered. This library can be used for establishing the geographic routing protocol destined for the multi-hop mesh network. In parallel it is proposed to describe a method to be adopted for the inclusion of geographic routing protocol in SMAC. The codes, developed in C programming language, are ported to the development platform of communication nodes of a specific toolkit and subjected to experimental tests. The results include the generation of theoretical and practical knowledge regarding the wireless sensor networks, as well as the development of open software for this type of network. The properties of self-organization of the network, robustness and low latency are proven in experimental tests.
79

Distributed and cooperative intrusion detection in wireless mesh networks / Détection d'intrusion distribuée et coopérative dans les réseaux maillés sans fil

Morais, Anderson 28 November 2012 (has links)
Les réseaux maillés sans fil (WMNs - Wireless Mesh Networks) sont une technologie émergente qui prend de l'importance parmi les traditionnels systèmes de communication sans fil. Toutefois, WMNs sont particulièrement vulnérables à des attaques externes et internes en raison de leurs attributs inhérents tels que le moyen de communication ouverte et l'architecture décentralisée. Dans cette recherche, nous proposons un système complet de détection d'intrusion distribué et coopératif qui détecte efficacement et effectivement des attaques au WMN en temps réel. Notre mécanisme de détection d'intrusion est basé sur l'échange fiable des événements du réseau et la coopération active entre les nœuds participants. Dans notre approche distribuée, systèmes de détection d'intrusion (IDS - Intrusion Detection System,) sont indépendamment installé dans chaque nœud mesh pour surveiller passivement le comportement de routage du nœud et en même temps surveiller le comportement de son voisinage. Sur cette base, nous avons d'abord développé un Analyseur de Protocole de Routage (APR) qui génère avec précision des événements de routage à partir du trafic observée, qui sont ensuite traités par le propre nœud et échangés entre les nœuds voisins. Deuxièmement, nous proposons un Mécanisme de Détection d'Intrusion Distribué (MDID) pratique, qui calcule périodiquement des Métriques de mal comportement précises en faisant usage des événements de routage générés et des Contraintes de Routage prédéfinies qui sont extraites à partir du comportement du protocole. Troisièmement, nous proposons un Mécanisme de Consensus Coopérative, qui est déclenché parmi les nœuds voisins si tout comportement malveillant est détecté. Le Mécanisme de Consensus Coopérative analyse les Métriques de mal comportement et partage les Résultats de Détection d'Intrusion parmi les voisins pour traquer la source de l'intrusion. Pour valider notre recherche, nous avons mis en œuvre la solution de détection d'intrusion distribuée en utilisant une plate-forme de réseau mesh virtualisée composé de machines virtuelles (VM - Virtual Machines) interconnectés. Nous avons également implémenté plusieurs attaques de routage pour évaluer la performance des mécanismes de détection d'intrusion / Wireless Mesh Network (WMN) is an emerging technology that is gaining importance among traditional wireless communication systems. However, WMNs are particularly vulnerable to external and insider attacks due to their inherent attributes such as open communication medium and decentralized architecture. In this research, we propose a complete distributed and cooperative intrusion detection system for efficient and effective detection of WMN attacks in real-time. Our intrusion detection mechanism is based on reliable exchange of network events and active cooperation between the participating nodes. In our distributed approach, Intrusion Detection Systems (IDSs) are independently placed at each mesh node to passively monitor the node routing behavior and concurrently monitor the neighborhood behavior. Based on that, we first implement a Routing Protocol Analyzer (RPA) that accuracy generates Routing Events from the observed traffic, which are then processed by the own node and exchanged between neighboring nodes. Second, we propose a practical Distributed Intrusion Detection Engine (DIDE) component, which periodically calculates accurate Misbehaving Metrics by making use of the generated Routing Events and pre-defined Routing Constraints that are extracted from the protocol behavior. Third, we propose a Cooperative Consensus Mechanism (CCM), which is triggered among the neighboring nodes if any malicious behavior is detected. The CCM module analyzes the Misbehaving Metrics and shares Intrusion Detection Results among the neighbors to track down the source of intrusion. To validate our research, we implemented the distributed intrusion detection solution using a virtualized mesh network platform composed of virtual machines (VMs) interconnected. We also implemented several routing attacks to evaluate the performance of the intrusion detection mechanisms
80

考量移動特性於耐延遲網路之團隊省電機制設計 / Energy-aware grouping design by considering moving pattern for delay tolerant networks

劉勇麟, Liu, Yung Lin Unknown Date (has links)
在傳統的DTN路由協定中,由於網路拓樸的快速變動,為了能將訊息封包傳送到目的地,通常是透過大量的複製,或是透過資訊的過濾與計算,將封包交由適合的節點來協助傳送。 然而在電池電源有限的條件之下,過於冗餘的封包複製傳遞,或CPU運算的大量使用,將使得節點容易因電量耗盡而失去傳遞的功能,不只是造成整體系統的存活時間(System Lifetime)降低,亦非常不利於維持整體網路的傳遞成功率(Delivery Ratio)。 在旅行的過程中,同行的人們通常具有相同的移動軌跡以及最終目的地,因而形成團體行動的模式;針對這樣的特性,我們採用每個團隊只留下一位領隊來統籌探索鄰居及封包傳遞的概念,透過GPS的資訊輔助來設計出組隊省電機制,延長節點存活時間,進而提升系統存活時間,並在運算複雜度較低且封包冗餘複製亦降低的狀況下,仍保有不錯的傳遞成功率以及較低的效能衰減。 / In traditional routing protocols of DTNs, most of them are using redundancy messages and information computing to make a good relay decision. Due to energy limitation, too many redundant message transmissions or high computing will make nodes die off quickly. It will decrease the system lifetime and diminish the delivery ratio of the whole system. When people go on a tour, friends always form a group due that members have a similar moving path and destination. Based on the features of moving patterns, we design a grouping scheme, namely, Energy-aware Grouping, with the concept that there is only one node awake in a group in charge of contact and message transmissions. With the assistance by GPS, our method has reduced the numbers of redundant message transmissions and information computing. Simulation results show that it can extend the system lifetime with maintaining still good delivery ratio

Page generated in 0.0617 seconds