• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 7
  • Tagged with
  • 7
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

An Analysis of Collaborative Attacks on Mobile Ad hoc Networks

Vu, Cong Hoan, Soneye, Adeyinka January 2009 (has links)
A Mobile Ad hoc Network (MANET) consists of a set of communicating wireless mobile nodes or devices that do not have any form of fixed infrastructure or centralized authority. The security in MANET has become a significant and active topic within the research community. This is because of high demand in sharing streaming video and audio in various applications, one MANET could be setup quickly to facilitate communications in a hostile environment such as battlefield or emergency situation likes disaster rescue operation. In spite of the several attacks aimed at specific nodes in MANET that have been uncovered, some attacks involving multiple nodes still receive little attention. A reason behind this is because people make use of security mechanisms applicable to wired networks in MANET and overlook the security measures that apply to MANET. Furthermore, it may also have to do with the fact that no survey or taxonomy has been done to clarify the characteristics of different multiple node attacks. This thesis addresses the aforementioned gap by providing a proper definition and categorization of collaborative attacks against MANET from the various multiple node attacks found. Simulation using OPNET Modeler was used to investigate the performance impact of a collaborative blackhole attack on a mobile ad hoc network. Network throughput, packet delivery ratio and end-to-end delay are the performance metrics used in our result analysis. Based on the analyses of performance metrics made, we realised the consequences of a collaborative blackhole attack on MANET. In order to prevent or reduce these consequences, we also discuss a number of mitigation plans to counteract the different kinds of collaborative attacks. Keywords: MANET, Collaborative Attacks, Multiple Node, Blackhole. / Contact Information: Author(s): Cong Hoan Vu Address: Folkparksvägen 19:08, 372 40 Ronneby, Sweden. E-mail: vuconghoan@gmail.com Adeyinka Soneye Address: Polhemsgatan 27B, LGH 30, 371 40 Karlskrona, Sweden. E-mail: adso07@student.bth.se
2

Updated Unified Picture of Active Galactic Nucleus Structure Revealed by X-Ray and Infrared Observations and Radiative Transfer Simulations / X線・赤外線観測と輻射輸送計算で確立する活動銀河核の新たな統一描像

Ogawa, Shoji 23 March 2023 (has links)
京都大学 / 新制・課程博士 / 博士(理学) / 甲第24413号 / 理博第4912号 / 新制||理||1702(附属図書館) / 京都大学大学院理学研究科物理学・宇宙物理学専攻 / (主査)准教授 上田 佳宏, 教授 嶺重 慎, 教授 太田 耕司 / 学位規則第4条第1項該当 / Doctor of Science / Kyoto University / DFAM
3

Intelligent Honeypot Agents for Detection of Blackhole Attack in Wireless Mesh Networks

Prathapani, Anoosha January 2010 (has links)
No description available.
4

Security Threats in Mobile Ad Hoc Network

Biswas, Kamanashis, Ali, Md. Liakat January 2007 (has links)
Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. As MANET is quickly spreading for the property of its capability in forming temporary network without the aid of any established infrastructure or centralized administration, security challenges has become a primary concern to provide secure communication. In this thesis, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. In our study, we have found that necessity of secure routing protocol is still a burning question. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack etc. In conclusion, we focus on the findings and future works which may be interesting for the researchers like robust key management, trust based systems, data security in different layer etc. However, in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.
5

X-ray Study on Microquasar SS 433/W50 Extended Jets: Propagation of Non-thermal Particles and Origin of Hotspots / X線観測を用いたマイクロクエーサーSS 433/W50ジェットの非熱的粒子の伝搬とホットスポット形成の研究

Kayama, Kazuho 23 March 2023 (has links)
京都大学 / 新制・課程博士 / 博士(理学) / 甲第24407号 / 理博第4906号 / 新制||理||1701(附属図書館) / 京都大学大学院理学研究科物理学・宇宙物理学専攻 / (主査)教授 鶴 剛, 准教授 細川 隆史, 教授 永江 知文 / 学位規則第4条第1項該当 / Doctor of Science / Kyoto University / DFAM
6

ON GRAVITATIONAL WAVES IN KERR SPACETIME: A perturbative approach towards gravitational waves emitted by extreme mass ratio inspirals

Toomani, Vahid 20 June 2023 (has links)
Meine kumulative Dissertation
7

An Analysis of the 5D Stationary Bi-Axisymmetric Soliton Solution to the Vacuum Einstein Equations / On the 5D Soliton Solution of the Vacuum Einstein Equations

Zwarich, Sebastian 11 1900 (has links)
We set out to analyze 5D stationary and bi-axisymmetric solutions to the vacuum Einstein equations. These are in the cohomogeneity 2 setting where the orbit space is a right half plane. They can have a wide range of behaviour at the boundary of the orbit space. The goal is to understand in detail the soliton example in Khuri, Weinstein and Yamada's paper ``5-dimensional space-periodic solutions of the static vacuum Einstein equations". This example is periodic and has alternating axis rods as its boundary data. We start by deriving the harmonic equations which determines the behaviour of the metric in the interior of the orbit space. Then we analyze what conditions the boundary data imposes on the metric. These are called the smoothness conditions which we derive for solely the alternating axis rod case. We show that with an ellipticity assumption they predict that the twist potentials are constant and that the metric is of the form which appears in Khuri, Weinstein and Yamada's paper. We then analyze the Schwarzschild metric in its standard form which is cohomogeneity 1 and its Weyl form which is cohomogeneity 2. This Weyl form can be made periodic and this serves as an inspiration for the examples in Khuri, Weinstein and Yamada's paper. Finally we analyze the soliton example in detail and show that it satisfies the smoothness conditions. We then provide a new example which has a single axis rod on the boundary with non-constant twist potentials but that is missing a point on the boundary. / Thesis / Master of Science (MSc) / We study the geometry of 5D blackholes. These blackholes are idealized by certain spatial symmetries and time invariance. They are solutions to the vacuum Einstein equations. The unique characteristic of these blackholes is the range of behaviour they may exhibit at the boundary of the domain of outer communication. There could be a standard event horizon called a horizon rod or an axis rod where a certain part of the spatial symmetry becomes trivial. In this thesis we start by deriving the harmonic map equations which are satisfied in the interior of the domain of communication. Then we show how this boundary data affects the metric through the smoothness conditions. We then analyze the soliton example in a paper by Khuri, Weinstein and Yamada and show that it respects the smoothness conditions. We then provide a new example which is interesting in the fact it has non-constant twist potentials.

Page generated in 0.0343 seconds