• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • Tagged with
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Throughput Of Wireless Mesh Networks : An Experimental Study

Ramachandran, P 04 1900 (has links) (PDF)
Mesh network is gaining importance as the next generation network for many high speed applications such as multimedia streaming. This is because it is easy and inexpensive to setup mesh networks with mobile and PDA devices and can be used as a private network. Hence research is active in the field of routing protocols and routing metrics to improve the mesh network performance. Though most of the protocols are evaluated based on simulation, we implemented protocols based on a few metrics like Expected Transmission Count (ETX) Per-hop Packet Pair Delay (Pkt Pair) and WCETT (Weighted Cumulative Expected Transmitted Time) to investigate the performance of the network through experiments. An advanced version of DSR protocol called LQSR (Link Quality Source Routing) protocol of Microsoft Research along with MCL (Mesh Connectivity Layer) allows multiple heterogeneous adapters to be used in mesh network. Since wireless adapters of 802.11a standard offer 12 non-interfering channels and 802.11b/g standard offer 3 non-interfering channels, using multiple adapters of different bands operating on non-interfering channels to improve capacity and robustness of mesh networks was also investigated. In this thesis we explore the possibility of increasing the coverage area of Wireless Mesh Networks (WMN) to enhance the capacity of WMN and minimize the problems due to interference. Theoretical achievable capacity to every node in a random static wireless ad-hoc network with ideal routing is known to be where n is the total number of nodes in the network. Therefore, with increasing number of nodes in a network, throughput drops significantly. Our measurements show that throughput in a single WMN for different path length is closer to the throughput with nodes across two WMNs of the same path length. We propose to interconnect the networks by using multiple wireless adapters in a gateway node configured with the SSID of the networks in operation. We exploit the DSR protocol feature of assigning locally unique interface indices to its adapters. Performance of a network depends heavily on the metrics used for routing packets. Different metrics were studied in the thesis by setting up a 10-node testbed with a combination of nodes with single and two radios. Testbed was partitioned into two networks with two gateway nodes. Performance of multi-radio performance with the above metrics was compared with baseline single radio nodes in the network with the same metric. It is found that multi-radio nodes out-perform single radio nodes in the multi-hop scenario. Also, operating multi-mesh networks using multiple interfaces configured to those networks in a gateway node increases the coverage area and robustness without loss of performance.
2

Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters

Akbar, Yousef M. A. H. 11 May 2020 (has links)
The power grid has changed a great deal from what has been generally viewed as a traditional power grid. The modernization of the power grid has seen an increase in the integration and incorporation of computing and communication elements, creating an interdependence of both physical and cyber assets of the power grid. The fast-increasing connectivity has transformed the grid from what used to be primarily a physical system into a Cyber- Physical System (CPS). The physical elements within a power grid are well understood by power engineers; however, the newly deployed cyber aspects are new to most researchers and operators in this field. The new computing and communications structure brings new vulnerabilities along with all the benefits it provides. Cyber security of the power grid is critical due to the potential impact it can make on the community or society that relies on the critical infrastructure. These vulnerabilities have already been exploited in the attack on the Ukrainian power grid, a highly sophisticated, multi-layered attack which caused large power outages for numerous customers. There is an urgent need to understand the cyber aspects of the modernized power grid and take the necessary precautions such that the security of the CPS can be better achieved. The power grid is dependent on two main cyber infrastructures, i.e., Supervisory Control And Data Acquisition (SCADA) and Advanced Metering Infrastructure (AMI). This thesis investigates the AMI in power grids by developing a testbed environment that can be created and used to better understand and develop security strategies to remove the vulnerabilities that exist within it. The testbed is to be used to conduct and implement security strategies, i.e., an Intrusion Detections Systems (IDS), creating an emulated environment to best resemble the environment of the AMI system. A DoS flooding attack and an IDS are implemented on the emulated testbed to show the effectiveness and validate the performance of the emulated testbed. / M.S. / The power grid is becoming more digitized and is utilizing information and communication technologies more, hence the smart grid. New systems are developed and utilized in the modernized power grid that directly relies on new communication networks. The power grid is becoming more efficient and more effective due to these developments, however, there are some considerations to be made as for the security of the power grid. An important expectation of the power grid is the reliability of power delivery to its customers. New information and communication technology integration brings rise to new cyber vulnerabilities that can inhibit the functionality of the power grid. A coordinated cyber-attack was conducted against the Ukrainian power grid in 2015 that targeted the cyber vulnerabilities of the system. The attackers made sure that the grid operators were unable to observe their system being attacked via Denial of Service attacks. Smart meters are the digitized equivalent of a traditional energy meter, it wirelessly communicates with the grid operators. An increase in deployment of these smart meters makes it such that we are more dependent on them and hence creating a new vulnerability for an attack. The smart meter integration into the power grid needs to be studied and carefully considered for the prevention of attacks. A testbed is created using devices that emulate the smart meters and a network is established between the devices. The network was attacked with a Denial of Service attack to validate the testbed performance, and an Intrusion detection method was developed and applied onto the testbed to prove that the testbed created can be used to study and develop methods to cover the vulnerabilities present.

Page generated in 0.0664 seconds