• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 62
  • 4
  • 4
  • 3
  • Tagged with
  • 99
  • 44
  • 22
  • 20
  • 18
  • 14
  • 13
  • 13
  • 13
  • 11
  • 10
  • 10
  • 9
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Telecommunication Network Survivability for Improved Reliability in Smart power Grids

Mogla, Sankalp 29 October 2014 (has links)
Power transmission grid infrastructures deliver electricity across large distance and are vital to the functioning of modern society. Increasingly these setups embody highly-coupled cyber-physical systems where advanced telecommunications networks are used to send status and control information to operate power transmission grid components, i.e., "smart grids". However, due to the high inter-dependency between the communication and power grid network layers, failure events can lead to further loss of control of key grid components, i.e., even if they are undamaged. In turn, such dependencies can exacerbate cascading failures and lead to larger electricity blackouts, particularly under disaster conditions. As a result, a range of studies have looked at modelling failures in interdependent smart grids. However most of these designs have not considered the use of proactive network-level survivability schemes. Indeed, these strategies can help maintain vital control connectivity during failures and potentially lead to reduced outages. Hence this thesis addresses this critical area and applies connection protection methodologies to reduce communication/control disruption in transmission grids. The performance of these schemes is then analyzed using detailed simulation for a sample IEEE transmission grid. Overall findings show a good reduction in the number of overloaded transmission lines when applying network-level recovery schemes.
42

The Use of Demand-wise Shared Protection in Creating Topology Optimized High Availability Networks

Todd, Brody 11 1900 (has links)
In order to meet the availability requirements of modern communication networks, a number of survivability techniques were developed that adapt the demand-wise shared protection design model to incorporate strategies increasing network availability. The survivability methodologies developed took two approaches. The first incorporated availability directly into the network design model. The second ensured minimum dual failure restorability was set within the model. These methodologies were developed for predetermined topologies, as well as to have topology optimization incorporated into the model. All methodologies were implemented and analyzed on a set of samples. The analysis examined cost, topology and actual availability of the network designs. Availability design was effective but computationally intensive and difficult to design. Minimum dual failure restorability was also effective in increasing availability with a significant caveat, dual failure restorability increased exposure to possible failures, and without sufficient levels of dual failure restorability could have a negative impact on availability. / Engineering Management
43

Data Security in Unattended Wireless Sensor Networks

Vepanjeri Lokanadha Reddy, Sasi Kiran 14 January 2013 (has links)
In traditional Wireless Sensor network's (WSN's), the sink is the only unconditionally trusted authority. If the sink is not connected to the nodes for a period of time then the network is considered as unattended. In Unattended Wireless Sensor Network (UWSN), a trusted mobile sink visits each node periodically to collect data. This network differs from the traditional multi hop wireless sensor networks where the nodes close to the sink deplete their power earlier than the other nodes. An UWSN can prolong the life time of the network by saving the battery of the nodes and also it can be deployed in environments where it is not practical for the sink to be online all the time. Saving data in the memory of the nodes for a long time causes security problems due to the lack of tamper-resistant hardware. Data collected by the nodes has to be secured until the next visit of the sink. Securing the data from an adversary in UWSN is a challenging task. We present two non-cryptographic algorithms (DS-PADV and DS-RADV) to ensure data survivability in mobile UWSN. The DS-PADV protects against proactive adversary which compromises nodes before identifying its target. DS-RADV makes the network secure against reactive adversary which compromises nodes after identifying the target. We also propose a data authentication scheme against a mobile adversary trying to modify the data. The proposed data authentication scheme uses inexpensive cryptographic primitives and few message exchanges. The proposed solutions are analyzed both mathematically and using simulations proving that the proposed solutions are better than the previous ones in terms of security and communication overhead.
44

P-Cycle-based Protection in Network Virtualization

Song, Yihong 25 February 2013 (has links)
As the "network of network", the Internet has been playing a central and crucial role in modern society, culture, knowledge, businesses and so on in a period of over two decades by supporting a wide variety of network technologies and applications. However, due to its popularity and multi-provider nature, the future development of the Internet is limited to simple incremental updates. To address this challenge, network virtualization has been propounded as a potential candidate to provide the essential basis for the future Internet architecture. Network virtualization is capable of providing an open and flexible networking environment in which service providers are allowed to dynamically compose multiple coexisting heterogeneous virtual networks on a shared substrate network. Such a flexible environment will foster the deployment of diversified services and applications. A major challenge in network virtualization area is the Virtual Network Embedding (VNE), which aims to statically or dynamically allocate virtual nodes and virtual links on substrate resources, physical nodes and paths. Making effective use of substrate resources requires high-efficient and survivable VNE techniques. The main contribution of this thesis is two high-performance p-Cycle-based survivable virtual network embedding approaches. These approaches take advantage of p-Cycle-based protection techniques that minimize the backup resources while providing a full VN protection scheme against link and node failures.
45

Defense and Civilian Energy Systems: Security, Sustainability and Survivability Considerations for the 21st Century

Lam, Danny 11 September 2013 (has links)
The United States and NATO Allies have a national security problem that is the product of America being the home of inexpensive and plentiful modern energy. A century of cheap and plentiful domestic supplies of oil has resulted in the architecture of civilian and military systems that are premised on the continued availability of cheap, high gradient conventional energy. As the pre-eminent military power of the last century, America ensured that access to secure “rear” areas, bases and supply lines can be relied on – at least until recently. With the increasing prevalence of asymmetric warfare conducted primarily with non-state actors and the loss of America’s monopoly on precision munitions (PGMs), or in the event of conflict with peer competitor states, security of supply lines, staging and rear areas can no longer be taken for granted. For expeditionary forces, supply of conventional liquid fuels represents a sizable amount of tonnage required to transport combat units to battle and conduct operations. Supplies are primarily conveyed by inherently vulnerable platforms like tankers and stockpiled in difficult to harden warehouses or dumps. While there is no shortage of petroleum or conventional fossil energy worldwide, the sheer volume of fuel presently needed to conduct modern expeditionary military operations itself creates vulnerabilities. The DoD and individual services have in place long-term programs to reduce the energy intensity with valuable lessons for NATO allies as most military systems and doctrine are patterned after DoD architectures. Transfer of techniques for reducing energy intensity from defense to the civilian sector has spinoff benefits overall; for example, by making operations in remote locations such as the Arctic / Antarctic more affordable and practical, and enabling a more energy / resource efficient civilian economy. Benefits from reduction of energy use include the reduction of signatures from energy use that are expensive and difficult to mask or hide, potentially reducing vulnerabilities in both the military and civilian infrastructure. Despite these benefits, legacy systems architectures in both defense and civilian limit energy efficiency gains. Technological advances of the past century have enabled many functions such as HVAC and lighting to be met with low gradient, low density and intermittent energy if systems are re-architectured. New designs, if standardized and rolled out quickly, offer the potential to benefit from making use of renewables like solar, wind, micro-hydro, or to use conventional high gradient energy more efficiently in combined cycle systems that often can be locally sourced even for remote forward operating bases. Low gradient energy systems, by their nature, present a smaller emissions signature issue. US-DoD has an opportunity to drive the development of the implementation of these high efficiency technologies and institutions and accelerate their spread to the civilian economy. This thesis presents a vision of a technically, politically, economically and logistically viable pathway to a cleaner and more sustainable alternative to current dominant energy systems architecture and provides a roadmap to implementation
46

A probabilistic technique for the assessment of complex dynamic system resilience

Balchanos, Michael Gregory 24 April 2012 (has links)
In the presence of operational uncertainty, one of the greatest challenges in systems engineering is to ensure system effectiveness, mission capability and survivability. Safety management is shifting from passive, reactive and diagnosis-based approaches to autonomous architectures that will manage safety and survivability through active, proactive and prognosis-based solutions. Resilience engineering is an emerging discipline, with alternative recommendations on safer and more survivable system architectures. A resilient system can "absorb" the impact of change due to unexpected disturbances, while it "adapts" to change, in order to maintain its physical integrity and mission capability. A framework of proposed resilience estimations is the basis for a scenario-based assessment technique, driven by modeling and simulation-based (M&S) analysis, for obtaining system performance, health monitoring, damage propagation and overall mission capability responses. For the technique development and testing, a small-scale canonical problem has been formulated, involving a reconfigurable spring-mass-damper system, in a multi-spring configuration. Operational uncertainty is introduced through disturbance factors, such as external forces with varying magnitude, input frequency, event duration and occurrence time. Case studies with varying levels of damping and alternative reconfiguration strategies return the effects of operational uncertainty on system performance, mission capability, and survivability, as well as on the "restore", "absorb", and "adapt" resilience capacities. The Topological Investigation for Resilient and Effective Systems, through Increased Architecture Survivability (TIRESIAS) technique is demonstrated for a reduced scale, reconfigurable naval cooling network application. With uncertainty effects modeled through network leak combinations, TIRESIAS provides insight on leak effects to survival times, mission capability degradations, and on resilience function capacities, for the baseline configuration. Comparative case studies were conducted for different architecture configurations, which have been generated for different total number of control valves and valve locations on the topology.
47

Defense and Civilian Energy Systems: Security, Sustainability and Survivability Considerations for the 21st Century

Lam, Danny 11 September 2013 (has links)
The United States and NATO Allies have a national security problem that is the product of America being the home of inexpensive and plentiful modern energy. A century of cheap and plentiful domestic supplies of oil has resulted in the architecture of civilian and military systems that are premised on the continued availability of cheap, high gradient conventional energy. As the pre-eminent military power of the last century, America ensured that access to secure “rear” areas, bases and supply lines can be relied on – at least until recently. With the increasing prevalence of asymmetric warfare conducted primarily with non-state actors and the loss of America’s monopoly on precision munitions (PGMs), or in the event of conflict with peer competitor states, security of supply lines, staging and rear areas can no longer be taken for granted. For expeditionary forces, supply of conventional liquid fuels represents a sizable amount of tonnage required to transport combat units to battle and conduct operations. Supplies are primarily conveyed by inherently vulnerable platforms like tankers and stockpiled in difficult to harden warehouses or dumps. While there is no shortage of petroleum or conventional fossil energy worldwide, the sheer volume of fuel presently needed to conduct modern expeditionary military operations itself creates vulnerabilities. The DoD and individual services have in place long-term programs to reduce the energy intensity with valuable lessons for NATO allies as most military systems and doctrine are patterned after DoD architectures. Transfer of techniques for reducing energy intensity from defense to the civilian sector has spinoff benefits overall; for example, by making operations in remote locations such as the Arctic / Antarctic more affordable and practical, and enabling a more energy / resource efficient civilian economy. Benefits from reduction of energy use include the reduction of signatures from energy use that are expensive and difficult to mask or hide, potentially reducing vulnerabilities in both the military and civilian infrastructure. Despite these benefits, legacy systems architectures in both defense and civilian limit energy efficiency gains. Technological advances of the past century have enabled many functions such as HVAC and lighting to be met with low gradient, low density and intermittent energy if systems are re-architectured. New designs, if standardized and rolled out quickly, offer the potential to benefit from making use of renewables like solar, wind, micro-hydro, or to use conventional high gradient energy more efficiently in combined cycle systems that often can be locally sourced even for remote forward operating bases. Low gradient energy systems, by their nature, present a smaller emissions signature issue. US-DoD has an opportunity to drive the development of the implementation of these high efficiency technologies and institutions and accelerate their spread to the civilian economy. This thesis presents a vision of a technically, politically, economically and logistically viable pathway to a cleaner and more sustainable alternative to current dominant energy systems architecture and provides a roadmap to implementation
48

Multi-failure network restorability design in survivable transport networks

Akpuh, Jude Unknown Date
No description available.
49

The Use of Demand-wise Shared Protection in Creating Topology Optimized High Availability Networks

Todd, Brody Unknown Date
No description available.
50

Data Security in Unattended Wireless Sensor Networks

Vepanjeri Lokanadha Reddy, Sasi Kiran 14 January 2013 (has links)
In traditional Wireless Sensor network's (WSN's), the sink is the only unconditionally trusted authority. If the sink is not connected to the nodes for a period of time then the network is considered as unattended. In Unattended Wireless Sensor Network (UWSN), a trusted mobile sink visits each node periodically to collect data. This network differs from the traditional multi hop wireless sensor networks where the nodes close to the sink deplete their power earlier than the other nodes. An UWSN can prolong the life time of the network by saving the battery of the nodes and also it can be deployed in environments where it is not practical for the sink to be online all the time. Saving data in the memory of the nodes for a long time causes security problems due to the lack of tamper-resistant hardware. Data collected by the nodes has to be secured until the next visit of the sink. Securing the data from an adversary in UWSN is a challenging task. We present two non-cryptographic algorithms (DS-PADV and DS-RADV) to ensure data survivability in mobile UWSN. The DS-PADV protects against proactive adversary which compromises nodes before identifying its target. DS-RADV makes the network secure against reactive adversary which compromises nodes after identifying the target. We also propose a data authentication scheme against a mobile adversary trying to modify the data. The proposed data authentication scheme uses inexpensive cryptographic primitives and few message exchanges. The proposed solutions are analyzed both mathematically and using simulations proving that the proposed solutions are better than the previous ones in terms of security and communication overhead.

Page generated in 0.0564 seconds