• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 5
  • 5
  • 5
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Cooperative Location Update in Wireless Mobile Networks

Ye, Cai-Fang 06 August 2008 (has links)
In this paper, in order to reduce the location update cost in wireless mobile networks, we propose a cooperative location update scheme. The proposed scheme first discovers the statistical relation between mobile stations according to their history of location update and paging. In order to reduce the total cost of mobility management, we propose integrating the cooperative location update scheme with the concurrent search scheme. We use analytical results and simulation results to justify the usage of the proposed approach.
2

Dynamic Optimal Fragmentation with Rate Adaptation in Wireless Mobile Networks

Chang, Yusun 13 November 2007 (has links)
Dynamic optimal fragmentation with rate adaptation (DORA) is an algorithm to achieve maximum goodput in wireless mobile networks. With the analytical model that incorporates number of users, contentions, packet lengths, and bit error rates in the network, DORA computes a fragmentation threshold and transmits optimal sized packets with maximum rates. To estimate the SNR in the model, an adaptive on-demand UDP estimator is designed to reduce overheads. Test-beds to execute experiments for channel estimation, WLANs, Ad Hoc networks, and Vehicle-to-Vehicle networks are developed to evaluate the performance of DORA. DORA is an energy-efficient generic CSMA/CA MAC protocol for wireless mobile computing applications, and enhances system goodput in WLANs, Ad Hoc networks, and Vehicle-to-Vehicle networks without modification of the protocols.
3

An Investigation of Group Key Management with Mobility Protocol for 5G Wireless Mobile Environment. A Case analysis of group key management security requirements with respect to wireless mobile environment of different proposed solutions

Eya, Nnabuike N. January 2019 (has links)
Group communication, security and 5G technology present a unique dimension of challenges and security remains crucial in the successful deployment of 5G technology across different industry. Group key management plays a vital role in secure group communication. This research work studies various group key management schemes for mobile wireless technology and then a new scheme is proposed and evaluated. The main architecture is analysed, while the components and their roles are established, trust and keying relationships are evaluated, as well as detailed functional requirements. A detailed description of the main protocols required within the scheme is also described. A numerical and simulation analysis is employed to assess the proposed scheme with regards to fulfilling the security requirement and performance requirements. The impact of group size variation, the impact of mobility rate variation are studied with regards to the average rekeying messages induced by each event and 1-affects-n phenomenon. The results obtained from the simulation experiments show that the proposed scheme outperformed other solutions with a minimal number of rekeying messages sent and less number of affected members on each event. The security requirements demonstrate that backward and forward secrecy is preserved and maintained during mobility between areas. Finally, the research work also proposes a 5G-enabled software-defined multicast network (5G-SDMNs), where software-defined networking (SDN) is exploited to dynamically manage multicast groups in 5G and mobile multicast environment. Also, mobile edge computing (MEC) is exploited to strengthen network control of 5G-SDMN. / National Open University of Nigeria
4

[en] A FRAMEWORK FOR QOS PROVISIONING IN WIRELESS MOBILE NETWORKS / [pt] UM FRAMEWORK PARA PROVISÃO DE QOS EM REDES MÓVEIS SEM FIO

LUCIANA DOS SANTOS LIMA 19 March 2003 (has links)
[pt] Nas últimas décadas, tem-se observado um crescente interesse nas tecnologias relacionadas a ambientes de comunicação móvel sem fio. Em grande parte, esse interesse vem acompanhando o crescimento do mercado de telecomunicações, mais especificamente dos sistemas de telefonia móvel celular. Os usuários vêm absorvendo rapidamente essas tecnologias, originando novas necessidades, como a utilização de serviços de dados multimídia, que exige garantias de qualidade. Nesse contexto, um dos desafios encontrados é conseguir a utilização eficiente do limitado espectro de freqüências disponível, fornecendo serviços com qualidade para os usuários. Esta dissertação propõe uma arquitetura para provisão de qualidade de serviço -QoS- fim-a-fim em redes móveis sem fio, levando em consideração características inerentes a esses ambientes. Para alcançar esse objetivo, são propostas modificações aos frameworks para provisão de QoS em ambientes genéricos de processamento e comunicação, visando atender às necessidades trazidas pelas redes móveis, gerando uma arquitetura adaptável para fornecer QoS em ambientes que ofereçam suporte à mobilidade. Uma instanciação dos frameworks para provisão de QoS em redes móveis sem fio é descrita através de um cenário de mobilidade, no qual é simulada uma rede infraestruturada de serviços integrados funcionando sobre o IP Móvel, de modo a validar a peoposta. / [en] In the last decades, increasing interest has been observed in technologies related to wireless mobile communication environments. Great part of such interest follows the growth in the telecommunications industry, more specifically of cellular mobile telephony systems. Users are quickly absorbing these technologies and generating new necessities, such as the use of services of multimedia data, which demand quality assurance. In this context, one of the challenges is the efficient use of the limited frequency spectrum available, providing users quality services. This thesis proposes an architecture for the provision of end-to-end QoS in wireless mobile networks, taking into account inherent characteristics of these environments. To reach this purpose, modifications were proposed to the frameworks for QoS provisioning in generic processing and communication environments, aiming to fulfill the necessities brought by mobile networks, generating an adaptable architecture to offer QoS in environments that support mobile connections. In order to validate the proposal, an instantiation of frameworks for QoS provisioning in wireless mobile networks is described by means of a mobility scenario in which an infrastructure network of integrated services is simulated working over Mobile IP.
5

Utilisation des propriétés électromagnétiques en sécurité des réseaux sans fil / Signal-Based security in wireless networks

Ben Hamida, Sana 27 February 2012 (has links)
La sécurité des systèmes de communication mobiles/sans fil est problématique, car ceux-ci sont généralement construits suivant une topologie répartie ou arborescente. Les noeuds qui composent ces réseaux sont caractérisés par des ressources limitées et connectés généralement entre eux d'une manière ad-hoc sans l'aide d'une tierce personne de confiance. Les méthodes de sécurité matures issues du monde des réseaux filaires s'appuient souvent sur des procédés nécessitant des systèmes centralisés et des ressources importantes qui sont difficiles à mettre en place dans des réseaux à fortes contraintes. Dans le cadre de cette thèse, on propose de nouvelles solutions de sécurité qui exploitent les propriétés du médium électromagnétique et de l'interface de radiocommunication dans le but d'assurer des communications sécurisées. La thèse est structurée en deux parties. La première est dédiée au problème de génération de clés de cryptage en exploitant les propriétés des systèmes de communication à bande de fréquence ultra large (ULB). Trois phases sont nécessaires pour convertir le canal radio en clés secrètes: l'estimation du canal, la quantification et l'accord mutuel entre noeuds. Des expérimentations ont été effectuées pour valider les hypothèses sur lesquelles se fondent les méthodes de génération de clés (c.-à-d. la réciprocité et la décorrélation spatiale du canal). Notre étude a montré que la robustesse de ces techniques de sécurité repose sur le choix des algorithmes de numérisation utilisés pour la conversion de la signature du canal ULB vers un format de clé. Une solution adaptative d'extraction a été proposée, évaluée et testée. La robustesse contre les attaques de prédiction du canal a été également examinée. La deuxième partie traite le problème des intrusions illégitimes aux réseaux sans fil. Dans un premier temps, nous testons expérimentalement une méthode basée sur les variations électromagnétiques afin de détecter l'attaque d'écoute passive "eavesdropping" dans les réseaux de capteurs. Par la suite, nous présentons nos travaux concernant l'attaque relais qui est une variante de l'attaque de l'homme-du-milieu et qui est considérée comme un grand défi en particulier pour les systèmes d'authentification. Une nouvelle approche basée sur la détection de la variation des caractéristiques du bruit a été proposée. Des études théoriques et expérimentales ont été conduites pour vérifier la validité de la proposition dans les systèmes de communication de type RFID. / Security in mobile wireless networks is considered a major impediment since these environments are a collection of low-cost devices. They are generally collected in ad hoc manner without the help of trusted third party. Therefore, conventional security methods are always inappropriate. Recent contributions propose to explore the radio communication interface and to turn the radio propagation problems into advantages by providing new alternatives to enhance security. In this thesis, we investigate the signal-based security concept and study its effectiveness through experiments. The first part of this dissertation discusses the problem of key generation from Ultra Wide Band channel. To derive secret keys from channel measurements three stages are required: channel estimation, quantization and key agreement. A campaign of measurements has been performed to confirm the fundamental channel requirements for key generation (i.e., the reciprocity and the spatial decorrelation). Results show that the robustness of such techniques depends on the channel information used as source of randomness as well as on the underlying algorithms. Analysis on the impact of each stage (i.e. the quantization and the key agreement) on the security has been presented. An adaptive key extraction method is proposed, performances are evaluated and robustness against deterministic channel prediction attacks is presented. The second part of the dissertation considers the problem of intrusion detection. First, we test a method based on electromagnetic radiation to discover the presence of an adversary in the receiver/emitter vicinity. Then, the problem of relay attack detection is investigated in RFID systems. A relay attack is a man-in-the middle attack, where the adversary is able to successfully pass the authentication phase by relaying messages between the legitimate verifier and the prover. A new solution based on the noise channel is proposed to detect this attack. Experimental and theoretical results are provided to test the effectiveness of the new proposition.

Page generated in 0.0845 seconds