151 |
Wi-Fi Guest Access: A Struggle For Secure Functionality In Academic EnvironmentsKevin E. Lanning 9 April 2007 (has links)
The rapid growth in the functionality of Wi-Fi networking in recent years has benefited academic environments. Consistent with their role as centers of innovation academic institutions have an interest in facilitating as much mobile, computer networking functionality as possible to parties of varying levels of affiliation, while also assuring confidentiality and integrity of communications. Providing secure yet functional Wi-Fi access to guests and affiliates in an academic environment presents significant challenges. Academic institutions have taken a wide variety of approaches to this problem. This study presents and analyzes data gathered from semi-structured telephone interviews with employees focused on computer networking and security in academic environments regarding their institutions’ approaches toward striking a balance between security and functionality. The results are summarized, conclusions are presented, and solutions to common problems are reviewed. Finally, remaining significant research questions are presented and explored.
|
152 |
Application of IEEE 802.15.4 for home networkJonsson, Tobias, Acquaye, Gabriel January 2008 (has links)
<!--st1\:*{behavior:url(#ieooui) } --><!--[endif]--> <!-- /* Font Definitions */ @font-face {font-family:Garamond; panose-1:2 2 4 4 3 3 1 1 8 3; mso-font-charset:0; mso-generic-font-family:roman; mso-font-pitch:variable; mso-font-signature:647 0 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0cm; margin-bottom:.0001pt; mso-pagination:widow-orphan; mso-layout-grid-align:none; punctuation-wrap:simple; text-autospace:none; font-size:12.0pt; mso-bidi-font-size:10.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman"; mso-ansi-language:EN-GB; mso-fareast-language:EN-US;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 70.85pt 70.85pt 70.85pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} --> To implement a utility wireless sensor network, investigation of different wireless protocols has been performed. The protocols are Bluetooth, Wi-Fi, IEEE 802.15.4 and Zigbee. Consecutively literature studies have made it comprehensible to understand the function of the protocols that are suitable for development of wireless sensor networks. The importance of low cost, low power, reliable and high-quality properties for long distances are significant. IEEE 802.15.4 and Zigbee protocol are proper to implement as a wireless sensor network. To reduce the human efforts in the configuration of the system, a comfortable method is implemented to facilitate the procedure. The applied method is based on an automatic configuration of the system. The configuration and the decision taking are implemented in the software. The system is designed to avoid interference to other wireless networks with the possibilities of reconfiguration. A uniform hardware and software design with separate functions of the system decided by a subsequent command for configuration is preferable. This imposes an advantage that increases the flexible potential of the system when a uniform solution is implemented. To support the basic communication principles and control of the system, a buffer implementation has been introduced. The functionality of decision taking is distributed, configured by system commands from the host system. Detecting of system commands requires a properly operating buffer management. In consideration to the power consumption in reference to battery utilizations, the settings of RF-module and microcontroller have a powerful impact to reduce the power consumption. All possibilities of hibernates and avoidance of unnecessarily transmitting, should be deactivated to minimize the power consumption.
|
153 |
Performance Evaluation of Time Syncrhonization and Clock Drift Compensation in Wireless Personal Area NetworkWåhslén, Jonas, Orhan, Ibrahim, Sturm, Dennis, Lindh, Thomas January 2012 (has links)
Efficient algorithms for time synchronization, including compensation for clock drift, are essential in order to obtain reliable fusion of data samples from multiple wireless sensor nodes. This paper evaluates the performance of algorithms based on three different approaches; one that synchronizes the local clocks on the sensor nodes, and a second that uses a single clock on the receiving node (e.g. a mobile phone), and a third that uses broadcast messages. The performances of the synchronization algorithms are evaluated in wireless personal area networks, especially Bluetooth piconets and ZigBee/IEEE 802.15.4 networks. A new approach for compensation of clock drift and a realtime implementation of single node synchronization from the mobile phone are presented and tested. Finally, applications of data fusion and time synchronization are shown in two different use cases; a kayaking sports case, and monitoring of heart and respiration of prematurely born infants. / <p>QC 20130605</p>
|
154 |
An Efficient QoS MAC for IEEE 802.11p Over Cognitive Multichannel Vehicular NetworksEl Ajaltouni, Hikmat 22 February 2012 (has links)
One of the most challenging issues facing vehicular networks lies in the design of an
efficient MAC protocol due to mobile nature of nodes, delay constraints for safety applications and interference. In this thesis, I propose an efficient Multichannel QoS Cognitive MAC (MQOG). MQOG assesses the quality of channel prior to transmission employing dynamic channel allocation and negotiation algorithms to achieve significant increase in channel reliability,
throughput and delay constraints while simultaneously addressing Quality of Service.
The uniqueness of MQOG lies in making use of the free unlicensed bands. To consider
fair effective sharing of resources I propose a Mobility Based Dynamic Transmit Opportunity
(MoByToP) while modifying the 802.11e TXOP (Transmit Opportunity). The proposed protocols were implemented in OMNET++ 4.1, and extensive experiments demonstrated a faster and more efficient reception of safety messages compared to existing VANet MAC Protocols. Finally, improvements in delay, packet delivery ratios and throughput were noticed.
|
155 |
UWB communication systems acquisition at symbol rate sampling for IEEE standard channel modelsCheng, Xia 29 March 2007
For ultra-wideband (UWB) communications, acquisition is challenging. The reason is from the ultra short pulse shape and ultra dense multipath interference. Ultra short pulse indicates the acquisition region is very narrow. Sampling is another challenge for UWB design due to the need for ultra high speed analog-to digital converter.<p>A sub-optimum and under-sampling scheme using pilot codes as transmitted reference is proposed here for acquisition. The sampling rate for the receiver is at the symbol rate. A new architecture, the reference aided matched filter is studied in this project. The reference aided matched filter method avoids using complex rake receiver to estimate channel parameters and high sampling rate for interpolation. A limited number of matched filters are used as a filter bank to search for the strongest path. Timing offset for acquisition is then estimated and passed to an advanced verification algorithm. For optimum performance of acquisition, the adaptive post detection integration is proposed to solve the problem from dense inter-symbol interference during the acquisition. A low-complex early-late gate tracking loop is one element of the adaptive post detection integration. This tracking scheme assists in improving acquisition accuracy. The proposed scheme is evaluated using Matlab Simulink simulations in term of mean acquisition time, system performance and false alarm. Simulation results show proposed algorithm is very effective in ultra dense multipath channels. This research proves reference aided acquisition with tracking loop is promising in UWB application.
|
156 |
IEEE 802.15.4 MAC Protocol Study and ImprovementCheng, Liang 27 November 2007 (has links)
IEEE 802.15.4 is a standard used for low rate personal area networks (PANs). It offers device level connectivity in applications with limited ower and relaxed throughput requirements. Devices with IEEE 802.15.4 technology can be used in many potential applications, such as home networking, industry/environments monitoring, healthcare equipments, etc, due to its extremely low power features. Although the superframe beacons play the key role in synchronizing channel access in IEEE 802.15.4, they are sources for energy inefficiency. This research focuses on exploring how to optimize the beacons, and designing novel schemes to distribute the information that are supposed to be delivered to a subset of PAN devices. In this work, an acknowledgement based scheme is proposed to reduce the energy consumption in the distribution of guaranteed time slot (GTS) descriptors. Based on the observation that the superframe beacon frame has global impact on all PAN devices, an energy-efficient channel reservation scheme is presented to deliver the information (GTS descriptors and pending addresses). In addition, the problem of channel underutilization is studied in the contention free period. To address the problem, a new GTS allocation scheme is proposed to improve the bandwidth utilization.
|
157 |
On Forward Error Correction in IEEE 802.15.4 Wireless Sensor NetworksLi, Wei, Guo, Zhiyuan January 2012 (has links)
Wireless Sensor Networks (WSN) are used in many applications, for example industrial applications, automatic control applications, monitoring applications, to name but a few. Although WSN can employ different standards in order to achieve short range wireless communication, the mainstream of the market is toadopt the low-power, low-rate IEEE 802.15.4 standard. However, this standard does not specify any block codes on the Physical layer (PHY) and the MAC sublayer. Reliability and energy efficiency are two important metrics used to evaluate the WSN performance. In order to enhance the reliability of the WSN performance, schemes such as Forward Error Correction (FEC) and HybridAutomatic Repeat-reQuest (HARQ) can be introduced on the PHY and MACsublayer when transmitting signals. However, this will reduce the energy efficiency of the WSN. In order to investigate what does affect the reliability and energy efficiency, this thesis has been conducted with the assistance of Matlab simulations, which simulate different transmission schemes proposed by the authors. Based on the simulations, both the reliability and energy efficiency can be evaluated and the results are illustrated for both metrics. The objective of this thesis is to determine a scheme that is able to meet these metric requirements.
|
158 |
An Efficient QoS MAC for IEEE 802.11p Over Cognitive Multichannel Vehicular NetworksEl Ajaltouni, Hikmat 22 February 2012 (has links)
One of the most challenging issues facing vehicular networks lies in the design of an
efficient MAC protocol due to mobile nature of nodes, delay constraints for safety applications and interference. In this thesis, I propose an efficient Multichannel QoS Cognitive MAC (MQOG). MQOG assesses the quality of channel prior to transmission employing dynamic channel allocation and negotiation algorithms to achieve significant increase in channel reliability,
throughput and delay constraints while simultaneously addressing Quality of Service.
The uniqueness of MQOG lies in making use of the free unlicensed bands. To consider
fair effective sharing of resources I propose a Mobility Based Dynamic Transmit Opportunity
(MoByToP) while modifying the 802.11e TXOP (Transmit Opportunity). The proposed protocols were implemented in OMNET++ 4.1, and extensive experiments demonstrated a faster and more efficient reception of safety messages compared to existing VANet MAC Protocols. Finally, improvements in delay, packet delivery ratios and throughput were noticed.
|
159 |
Sécurité dans les réseaux Wi-Fi : étude détaillée des attaques et proposition d'une architecture Wi-Fi sécuriséeGaha, Maher 03 1900 (has links) (PDF)
Nous avons assisté ces dernières années à la montée en puissance des réseaux locaux sans fil ou encore Wi-Fi, qui sont en passe de devenir l'une des principales solutions de connexion pour de nombreuses entreprises. Le marché du sans fil se développe rapidement dès lors que les entreprises constatent les gains de productivité qui découlent de la disparition des câbles. Avec cette évolution rapide de ce type dématérialisé de réseaux, les exigences en termes de sécurité deviennent de plus en plus sévères. De ce fait, beaucoup de travaux et d'efforts ont été consentis ces dernières années afin d'aboutir à des solutions pour sécuriser ces réseaux. Toutefois, des vulnérabilités persistent encore et il est toujours possible de monter des attaques plus ou moins facilement. Notamment, contre le dernier né des protocoles de sécurité Wi-Fi, à savoir WPA2, qui bien qu'étant plus robuste sur le plan conceptuel que les générations précédentes, fait face à un problème majeur, celui de son incompatibilité matérielle avec les précédents protocoles. En effet, WPA2 exige de nouveaux équipements matériels, ce qui constitue un surcoût économique énorme pour les entreprises ayant déjà déployé des équipements Wi-Fi d'anciennes générations. Dans ce mémoire, nous élaborons une synthèse exhaustive de toutes les attaques qui ciblent les réseaux Wi-Fi. Cette synthèse comprend une classification des attaques par rapport aux standards de sécurité ainsi que l'illustration des détails de leur mise en œuvre. Outre le volet conceptuel et théorique, nous abordons également le volet pratique et montrons sa richesse. Nous proposons également une nouvelle approche architecturale de sécurisation des réseaux Wi-Fi dans l'entreprise. Notre proposition prend en compte l'hétérogénéité des équipements et des standards de sécurité supportés. Cette nouvelle architecture a le mérite d'offrir une grande flexibilité ainsi qu'une sécurité renforcée par rapport aux approches traditionnelles. Pour élaborer cette solution sécurisée, nous nous sommes basés principalement sur la différenciation à plusieurs niveaux (standard de sécurité supporté, communauté d'utilisateurs, nature de trafic). Ces niveaux de différenciation offrent la granularité nécessaire pour permettre une meilleure gestion du réseau et un meilleur contrôle d'accès aux ressources, ce qui améliore la sécurité du réseau Wi-Fi en particulier et du système d'information de l'entreprise dans son ensemble.
______________________________________________________________________________
MOTS-CLÉS DE L’AUTEUR : Wi-Fi, sécurité, attaque, architecture sécurisée, différenciation.
|
160 |
The Mobility Impact in IEEE 802.11p Infrastructureless Vehicular NetworksAlasmary, Waleed 15 April 2010 (has links)
Vehicular ad hoc networks (VANETs) are an extreme case of mobile ad hoc networks (MANETs). High speed and frequent network topology changes are the main characteristics of vehicular networks. These characteristics lead to special issues and challenges in the network design, especially at the medium access control (MAC) layer. Due to high speed of nodes and their frequent disconnections, it is difficult to design a MAC scheme in VANETs that satisfies the quality-of-service requirements in all networking scenarios. In this thesis, we provide a comprehensive evaluation of the mobility impact on the IEEE 802.11p MAC performance. The study evaluates basic performance metrics such as packet delivery ratio, throughput, and delay, as well as the impact of mobility factors. The study also presents a relation between the mobility factors and the respective medium access behavior. Moreover, a new unfairness problem according to node relative speed is identified for both broadcast and unicast scenarios. To achieve better performance, we propose two dynamic contention window mechanisms to alleviate network performance degradation due to high mobility. Extensive simulation results show the significant impact of mobility on the IEEE 802.11p MAC performance, an identification of a new unfairness problem in the vehicle-to-vehicle (V2V) communications, and the effectiveness of the proposed MAC schemes.
|
Page generated in 0.0323 seconds