• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 96
  • 13
  • 9
  • 6
  • 3
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 154
  • 154
  • 131
  • 60
  • 49
  • 38
  • 26
  • 25
  • 19
  • 19
  • 18
  • 17
  • 16
  • 16
  • 14
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
111

Classificação dinâmica de nós em redes em malha sem fio

Guedes, Diego Américo 11 September 2014 (has links)
Submitted by Cássia Santos (cassia.bcufg@gmail.com) on 2014-09-11T11:50:01Z No. of bitstreams: 2 Dissertacao Diego Americo Guedes.pdf: 971567 bytes, checksum: a39a61e190ff600e318da0dd24eb108c (MD5) license_rdf: 23148 bytes, checksum: 9da0b6dfac957114c6a7714714b86306 (MD5) / Made available in DSpace on 2014-09-11T11:50:01Z (GMT). No. of bitstreams: 2 Dissertacao Diego Americo Guedes.pdf: 971567 bytes, checksum: a39a61e190ff600e318da0dd24eb108c (MD5) license_rdf: 23148 bytes, checksum: 9da0b6dfac957114c6a7714714b86306 (MD5) / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / In this work we present and evaluate a modeling methodology that describes the creation of a topology for wireless mesh networks, and how this topology changes over time. The modeling methodology is based on network science, which is a multidisciplinary research area that has a lot of tools to help in the study and analysis of networks. In wireless mesh networks, the relative importance of the nodes is often related to the topological aspects, and data flow. However, due to the dynamics of the network, the relative importance of the nodes may vary in time. In the context of network science, the concept of centrality metric represents the relative importance of a node in the network. In this work we show also that the current centrality metrics are not able to rank properly the nodes in wireless mesh networks. Then we propose a new metric of centrality that ranks the most important nodes in a wireless mesh network over time. We evaluate our proposal using data from a case study of the proposed modeling methodology and also from real wireless mesh networks, achieving satisfactory performance. The characteristics of our metric make it a useful tool for monitoring dynamic networks. / Neste trabalho, apresentamos e avaliamos uma modelagem que descreve a criação de uma topologia para redes em malha sem fio e como essa se altera no tempo. A modelagem é baseada em ciência das redes (network science), uma área multidisciplinar de pesquisa que possui uma grande quantidade de ferramentas para auxiliar no estudo e análise de redes. Em redes em malha sem fio, a importância relativa dos nós é frequentemente relacionada a aspectos topológicos e ao fluxo de dados. Entretanto, devido à dinamicidade da rede, a importância relativa de um nó pode variar no tempo. No contexto de ciência de redes, o conceito de métricas de centralidade reflete a importância relativa de um nó na rede. Neste trabalho, mostramos também que as métricas atuais de centralidade não são capazes de classificar de maneira adequada os nós em redes em malha sem fio. Propomos então uma nova métrica de centralidade que classifica os nós mais importantes em uma rede em malha sem fio ao longo do tempo. Avaliamos nossa proposta com dados obtidos de um estudo de caso da modelagem proposta e de redes em malha sem fio reais, obtendo desempenho satisfatório. As características da nossa métrica a tornam uma ferramenta útil para monitoramento de redes dinâmicas.
112

Distributed and cooperative intrusion detection in wireless mesh networks / Détection d'intrusion distribuée et coopérative dans les réseaux maillés sans fil

Morais, Anderson 28 November 2012 (has links)
Les réseaux maillés sans fil (WMNs - Wireless Mesh Networks) sont une technologie émergente qui prend de l'importance parmi les traditionnels systèmes de communication sans fil. Toutefois, WMNs sont particulièrement vulnérables à des attaques externes et internes en raison de leurs attributs inhérents tels que le moyen de communication ouverte et l'architecture décentralisée. Dans cette recherche, nous proposons un système complet de détection d'intrusion distribué et coopératif qui détecte efficacement et effectivement des attaques au WMN en temps réel. Notre mécanisme de détection d'intrusion est basé sur l'échange fiable des événements du réseau et la coopération active entre les nœuds participants. Dans notre approche distribuée, systèmes de détection d'intrusion (IDS - Intrusion Detection System,) sont indépendamment installé dans chaque nœud mesh pour surveiller passivement le comportement de routage du nœud et en même temps surveiller le comportement de son voisinage. Sur cette base, nous avons d'abord développé un Analyseur de Protocole de Routage (APR) qui génère avec précision des événements de routage à partir du trafic observée, qui sont ensuite traités par le propre nœud et échangés entre les nœuds voisins. Deuxièmement, nous proposons un Mécanisme de Détection d'Intrusion Distribué (MDID) pratique, qui calcule périodiquement des Métriques de mal comportement précises en faisant usage des événements de routage générés et des Contraintes de Routage prédéfinies qui sont extraites à partir du comportement du protocole. Troisièmement, nous proposons un Mécanisme de Consensus Coopérative, qui est déclenché parmi les nœuds voisins si tout comportement malveillant est détecté. Le Mécanisme de Consensus Coopérative analyse les Métriques de mal comportement et partage les Résultats de Détection d'Intrusion parmi les voisins pour traquer la source de l'intrusion. Pour valider notre recherche, nous avons mis en œuvre la solution de détection d'intrusion distribuée en utilisant une plate-forme de réseau mesh virtualisée composé de machines virtuelles (VM - Virtual Machines) interconnectés. Nous avons également implémenté plusieurs attaques de routage pour évaluer la performance des mécanismes de détection d'intrusion / Wireless Mesh Network (WMN) is an emerging technology that is gaining importance among traditional wireless communication systems. However, WMNs are particularly vulnerable to external and insider attacks due to their inherent attributes such as open communication medium and decentralized architecture. In this research, we propose a complete distributed and cooperative intrusion detection system for efficient and effective detection of WMN attacks in real-time. Our intrusion detection mechanism is based on reliable exchange of network events and active cooperation between the participating nodes. In our distributed approach, Intrusion Detection Systems (IDSs) are independently placed at each mesh node to passively monitor the node routing behavior and concurrently monitor the neighborhood behavior. Based on that, we first implement a Routing Protocol Analyzer (RPA) that accuracy generates Routing Events from the observed traffic, which are then processed by the own node and exchanged between neighboring nodes. Second, we propose a practical Distributed Intrusion Detection Engine (DIDE) component, which periodically calculates accurate Misbehaving Metrics by making use of the generated Routing Events and pre-defined Routing Constraints that are extracted from the protocol behavior. Third, we propose a Cooperative Consensus Mechanism (CCM), which is triggered among the neighboring nodes if any malicious behavior is detected. The CCM module analyzes the Misbehaving Metrics and shares Intrusion Detection Results among the neighbors to track down the source of intrusion. To validate our research, we implemented the distributed intrusion detection solution using a virtualized mesh network platform composed of virtual machines (VMs) interconnected. We also implemented several routing attacks to evaluate the performance of the intrusion detection mechanisms
113

Enabling Multimedia Services over Wireless Multi-Hop Networks

Cavalcanti de Castro, Marcel January 2009 (has links)
<p>With the constant development of wireless technologies, the usageof wireless devices tends to increase even more in the future.Wireless multi-hop networks (WMNs) have emerged as a keytechnology to numerous potential scenarios, ranging from disasterrecovery to wireless broadband internet access. The distributedarchitecture of WMNs enables nodes to cooperatively relay othernode's packets. Because of their advantages over other wirelessnetworks, WMNs are undergoing rapid progress and inspiringnumerous applications. However, many technical issues still existin this field. In this thesis we investigate how Voice over IP(VoIP) and peer-to-peer (P2P) application are influenced bywireless multi-hop network characteristics and how to optimizethem in order to provide scalable communication.We first consider the deployment of VoIP service in wirelessmulti-hop networks, by using the Session Initiation Protocol (SIP)architecture. Our investigation shows that the centralized SIParchitecture imposes several challenges when deployed in thedecentralized wireless multi-hop environment. We find that VoIPquality metrics are severely degraded as the traffic and number ofmultiple hops to the gateway increase. In the context ofscalability, we further propose four alternative approaches whichavoid current limitations.In the second part of this thesis we tackle the network capacityproblem while providing scalable VoIP service over wirelessmulti-hop networks. The performance evaluation shows the influenceof intra and inter-flow interference in channel utilization, whichdirect impacts the VoIP capacity. In order to avoid the small VoIPpacket overhead, we propose a new adaptive hop-by-hop packetaggregation scheme based on wireless link characteristics. Ourperformance evaluation shows that the proposed scheme can increasethe VoIP capacity by a two-fold gain.The study of peer-to-peer applicability over wireless multi-hopnetworks is another important contribution. A resource lookupapplication is realized through structured P2P overlay. We showthat due to several reasons, such as characteristics of wirelesslinks, multi-hop forwarding operation, and structured P2Pmanagement traffic aggressiveness the performance of traditionalP2P applications is rather low in wireless multi-hop environments.Therefore, we suggested that a trade-off between the P2P lookupefficiency and the P2P management traffic overhead can be achievedwhile maintaining the overlay network consistency in wirelessmulti-hop networks.</p>
114

Authentification dans les réseaux maillés sans fils avec la cryptographie basée sur l'identité

Boudguiga, Aymen 10 September 2012 (has links) (PDF)
De nos jours, l'authentification dans les réseaux maillés sans fils fait appel aux certificats ou aux secrets partagés. Dans les environnements sans fils, la gestion des certificats est désavantageuse. En effet, les certificats nécessitent le déploiement d'une infrastructure à clés publiques (ICP) et la définition d'une autorité de certification (AC). La AC définit toute une politique qui permet de contrôler la génération, la transmission et la révocation des certificats. Cette politique ne prend pas en considération les limites en termes de puissance et de mémoire que peuvent avoir les stations des clients dans un réseau maillé. Afin de ne pas utiliser les certificats et ne pas déployer une ICP, nous avons étudié dans cette thèse les utilisations possibles de la cryptographie basée sur l'identité (CBI) pour la définition de nouveaux schémas d'authentification pour les réseaux maillés sans fils. La CBI propose de dériver, directement, la clé publique d'une station à partir de son identité. Par conséquent, nous n'avons plus besoin de passer par des certificats pour associer l'identité de la station à sa paire de clés (publique et privée). Par contre, la CBI définit un générateur de clé privée (GCP) qui gère le calcul des clés privées des différentes stations sur le réseau. Par conséquent, ce GCP est capable de réaliser une attaque d'usurpation d'identité (escroc de clés) à l'encontre de toutes les stations légitimes. Pour diminuer le risque de cette attaque, les chercheurs ont tendance à supposer que le GCP est digne de confiance. Dans cette thèse, nous présentons tout d'abord un protocole d'authentification basée sur l'utilisation conjointe d'un mot de passe et de la CBI. En effet, nous proposons d'utiliser le serveur d'authentification de notre réseau maillé comme GCP. Ensuite, nous étudions une liste de mécanismes qui permettent de contrer l'attaque de l'escroc qui caractérise le GCP.
115

Transport-Layer Performance in Wireless Multi-Hop Networks

Karlsson, Jonas January 2013 (has links)
Wireless communication has seen a tremendous growth in the last decades. Continuing on this trend, wireless multi-hop networks  are nowadays used or planned for use in a multitude of contexts, spanning from Internet access at home to emergency situations. The Transmission Control Protocol (TCP) provides reliable and ordered delivery of a data and is used by major Internet applications such as web browsers, email clients and file transfer programs. TCP traffic is also the dominating traffic type on the Internet. However, TCP performs less than optimal in wireless multi-hop networks due to packet reordering, low link capacity, packet loss and variable delay. In this thesis, we develop novel proposals for enhancing the network and transport layer to improve TCP performance in wireless multi-hop networks. As initial studies, we experimentally evaluate the performance of different TCP variants, with and without mobile nodes. We further evaluate the impact of multi-path routing on TCP performance and propose packet aggregation combined with aggregation aware multi-path forwarding as a means to better utilize the available bandwidth. The last contribution is a novel extension to multi-path TCP to  enable single-homed hosts to fully utilize the network capacity. / <p>Opponent changed. Prof. C. Lindeman from the University of Leipzig was substituted by Prof. Zhang.</p>
116

Novel Approaches and Architecture for Survivable Optical Internet

Haque, Anwar Ariful 12 April 2013 (has links)
Any unexpected disruption to WDM (Wavelength Division Multiplexing) based optical networks which carry data traffic at tera-bit per second may result in a huge loss to its end-users and the carrier itself. Thus survivability has been well-recognized as one of the most important objectives in the design of optical Internet. This thesis proposes a novel survivable routing architecture for the optical Internet. We focus on a number of key issues that are essential to achieve the desired service scenarios, including the tasks of (a) minimizing the total number of wavelengths used for establishing working and protection paths in WDM networks; (b) minimizing the number of affected working paths in case of a link failure; (c) handling large scale WDM mesh networks; and (d) supporting both Quality of Service (QoS) and best-effort based working lightpaths. To implement the above objectives, a novel path based shared protection framework namely Group Shared protection (GSP) is proposed where the traffic matrix can be divided into multiple protection groups (PGs) based on specific grouping policy, and optimization is performed on these PGs. To the best of our knowledge this is the first work done in the area of group based WDM survivable routing approaches where not only the resource sharing is conducted among the PGs to achieve the best possible capacity efficiency, but also an integrated survivable routing framework is provided by incorporating the above objectives. Simulation results show the effectiveness of the proposed schemes.
117

Distributed and cooperative intrusion detection in wireless mesh networks

Morais, Anderson 28 November 2012 (has links) (PDF)
Wireless Mesh Network (WMN) is an emerging technology that is gaining importance among traditional wireless communication systems. However, WMNs are particularly vulnerable to external and insider attacks due to their inherent attributes such as open communication medium and decentralized architecture. In this research, we propose a complete distributed and cooperative intrusion detection system for efficient and effective detection of WMN attacks in real-time. Our intrusion detection mechanism is based on reliable exchange of network events and active cooperation between the participating nodes. In our distributed approach, Intrusion Detection Systems (IDSs) are independently placed at each mesh node to passively monitor the node routing behavior and concurrently monitor the neighborhood behavior. Based on that, we first implement a Routing Protocol Analyzer (RPA) that accuracy generates Routing Events from the observed traffic, which are then processed by the own node and exchanged between neighboring nodes. Second, we propose a practical Distributed Intrusion Detection Engine (DIDE) component, which periodically calculates accurate Misbehaving Metrics by making use of the generated Routing Events and pre-defined Routing Constraints that are extracted from the protocol behavior. Third, we propose a Cooperative Consensus Mechanism (CCM), which is triggered among the neighboring nodes if any malicious behavior is detected. The CCM module analyzes the Misbehaving Metrics and shares Intrusion Detection Results among the neighbors to track down the source of intrusion. To validate our research, we implemented the distributed intrusion detection solution using a virtualized mesh network platform composed of virtual machines (VMs) interconnected. We also implemented several routing attacks to evaluate the performance of the intrusion detection mechanisms
118

Métriques de routage dans les réseaux maillés sans fil

Sarr, Yaye 04 1900 (has links)
Ces dernières années, les technologies sans fil ont connu un essor fulgurant. Elles ont permis la mise en place de réseaux sans fil à hautes performances. Les réseaux maillées sans fil (RMSF) sont une nouvelle génération de réseaux sans fil qui offrent des débits élevés par rapport aux réseaux Wi-Fi (Wireless Fidelity) classiques et aux réseaux ad-hoc. Ils présentent de nombreux avantages telles que leur forte tolérance aux pannes, leur robustesse, leur faible coût etc. Les routeurs des RMSF peuvent disposer de plusieurs interfaces radio et chaque interface peut opérer sur plusieurs canaux distincts, c’est des RMSF multiples-radios, multiples-canaux. Ce type de réseau peut accroître de manière considérable les performances des RMSF. Cependant plusieurs problèmes subsistent et doivent être résolus notamment celui du routage. Le routage dans les RMSF demeure un défi majeur. Le but des protocoles de routage est de trouver les meilleures routes i.e. des routes qui maximisent les débits et minimisent les délais, lors de l’acheminement du trafic. La qualité des routes dans les RMSF peut être fortement affectée par les interférences, les collisions, les congestions etc. Alors les protocoles doivent être en mesure de détecter ces problèmes pour pouvoir en tenir compte lors de la sélection des routes. Plusieurs études ont été dédiées aux métriques et aux protocoles de routage dans les RMSF afin de maximiser les performances de celles ci. Mais la plupart ne prennent pas en considération toutes les contraintes telles que les interférences, le problème des stations cachées etc. Ce mémoire propose une nouvelle métrique de routage pour RMSF. Nous avons mis en place une nouvelle métrique de routage pour RMSF appelée MBP (Metric Based on Probabilities). Cette métrique est destinée aux RMSF mono-radio ou multiples-radios. Elle permet d’éviter les routes à forte ii interférence. Les résultats des simulations ont montré que MBP présente des améliorations par rapport à certaines métriques : ETT, WCETT et iAWARE qui sont connues dans le domaine. / In recent years, wireless technologies have developed sharply. They allow the establishment of high performance wireless networks. Wireless Mesh Networks (WMNs) is a new generation of wireless networks that offer high throughput compared to classical Wi-Fi (Wireless Fidelity) or ad-hoc networks. WMNs have attracted significant research due to their features that include dynamic self organization, self configuration, easy maintenance and low cost. WMNs nodes can be equipped with multiples-radios and multiples-channels. This type of network can increase significantly the performance of WMNs. However, several problems must be solved including routing in WMNs. Routing in WMNs is a great challenge. The main goal of routing protocols is to find best paths i.e. paths that maximize throughputs and minimize delays when transmitting packets. Route quality can be strongly affected by interference, collisions, congestions etc. Then protocols should be able to detect these problems and take them into account during route selection. We propose a new routing metric for WMNs, called MBP that captures the impact of intra-flow and inter-flow interference in multi-radio, multi-channel networks. Results show that MBP has better performances than some existing and popular metrics like ETT, WCETT and iAWARE.
119

Dynamic power control in backbone wireless mesh networks : a decentralized approach

Olwal, Thomas 15 December 2010 (has links) (PDF)
The remarkable evolution of wireless networks into the next generation to provide ubiquitous and seamless broadband applications has recently triggered the emergence of Wireless Mesh Networks (WMNs). The WMNs comprise stationary Wireless Mesh Routers (WMRs) forming Wireless Backbone Mesh Networks (WBMNs) and mobile Wireless Mesh Clients (WMCs) forming the WMN access. While WMCs are limited in function and radio resources, the WMRs are expected to support heavy duty applications : that is, WMRs have gateway and bridge functions to integrate WMNs with other networks such as the Internet, cellular, IEEE 802.11, IEEE 802.15, IEEE 802.16, sensor networks, et cetera. Consequently, WMRs are constructed from fast switching radios or multiple radio devices operating on multiple frequency channels. WMRs are expected to be self-organized, self-configured and constitute a reliable and robust WBMN which needs to sustain high traffic volumes and long "online" time. However, meeting such stringent service expectations requires the development of decentralized dynamic transmission power control (DTPC) approaches. This thesis addresses the DTPC problem for both single and multiple channel WBMNs. For single channel networks, the problem is formulated as the minimization of both the link-centric and network-centric convex cost function. In order to solve this issue, multiple access transmission aware (MATA) models and algorithms are proposed. For multi-radio multi-channel (MRMC) WBMNs, the network is modelled as sets of unified channel graphs (UCGs), each consisting of interconnected active network users communicating on the same frequency channel. For each UCG set, the minimization of stochastic quadratic cost functions are developed subject to the dynamic Link State Information (LSI) equations from all UCGs. An energy-efficient multi-radio unification protocol (PMMUP) is then suggested at the Link-Layer (LL). Predictive estimation algorithms based on this protocol are proposed to solve such objective functions. To address transmission energy and packet instabilities, and interference across multiple channels, singularly-perturbed weakly-coupled (SPWC) control problems are formulated. In order to solve the SPWC transmission power control problem, a generalized higher-order recursive algorithm (HORA) that obtains the Riccati Stabilizing Solutions to the control problem is developed. The performance behaviours of the proposed models and algorithms are evaluated both analytically and through computer simulations. Several simulations are performed on a large number of randomly generated topologies. Simulation and analytical results confirm the efficacy of the proposed algorithms compared to the most recently studied techniques
120

Novel Approaches and Architecture for Survivable Optical Internet

Haque, Anwar Ariful 12 April 2013 (has links)
Any unexpected disruption to WDM (Wavelength Division Multiplexing) based optical networks which carry data traffic at tera-bit per second may result in a huge loss to its end-users and the carrier itself. Thus survivability has been well-recognized as one of the most important objectives in the design of optical Internet. This thesis proposes a novel survivable routing architecture for the optical Internet. We focus on a number of key issues that are essential to achieve the desired service scenarios, including the tasks of (a) minimizing the total number of wavelengths used for establishing working and protection paths in WDM networks; (b) minimizing the number of affected working paths in case of a link failure; (c) handling large scale WDM mesh networks; and (d) supporting both Quality of Service (QoS) and best-effort based working lightpaths. To implement the above objectives, a novel path based shared protection framework namely Group Shared protection (GSP) is proposed where the traffic matrix can be divided into multiple protection groups (PGs) based on specific grouping policy, and optimization is performed on these PGs. To the best of our knowledge this is the first work done in the area of group based WDM survivable routing approaches where not only the resource sharing is conducted among the PGs to achieve the best possible capacity efficiency, but also an integrated survivable routing framework is provided by incorporating the above objectives. Simulation results show the effectiveness of the proposed schemes.

Page generated in 0.0442 seconds