• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 106
  • 62
  • 32
  • 24
  • 9
  • 8
  • 6
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 293
  • 293
  • 77
  • 50
  • 42
  • 42
  • 39
  • 37
  • 36
  • 35
  • 32
  • 31
  • 29
  • 26
  • 26
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
221

Denial-of-service attacks against the Parrot ANAFI drone / DoS- attacker mot drönaren Parrot ANAFI.

Feng, Jesse, Tornert, Joakim January 2021 (has links)
As the IoT market continues to grow, so does the need for secure wireless communication. Drones have become a popular gadget among both individuals and various industries during the last decade, and the popularity continues to grow. Some drones use Wi-Fi technology for communication, such as the Parrot ANAFI, which introduces many of the same security threats that are frequently found in general IoT. Therefore, this report covers a common group of cyberattacks, known as denial-of-service attacks, their effects on the Parrot ANAFI, and their ease of use. A threat model was created to have an overview of the system architecture, and all of the identified threats were assessed using DREAD. All of the software tools used in this report can be found for free on the Internet using search engines and simple key words. The results showed that the drone is generally secure, but it is vulnerable to a certain denial-of-service attack, which can open the door to multiple attack surfaces if the password for the drone’s Wi-Fi is not strong enough. Some suggestions for mitigating these threats are presented at the end of the report. / I takt med att IoT-marknaden fortsätter att växa ökar också behovet av säker trådlös kommunikation. Drönare har blivit en populär pryl bland såväl privatpersoner som diverse industrier under det senaste decenniet, och populariteten fortsätter att växa. Vissa drönare använder Wi-Fi-teknik för kommunikation, till exempel Parrot ANAFI, vilket introducerar många av de säkerhetshot som ofta existerar bland IoT i allmänhet. Den här rapporten täcker därför en välkänd grupp av cyberattacker, som kallas denial-of-service-attacker, deras effekter på Parrot ANAFI och deras användarvänlighet. En hotmodell skapades för att ha en överblick över systemarkitekturen och alla identifierade hot rangordnades med hjälp av DREAD. Alla programvaruverktyg som används i denna rapport kan hittas gratis på Internet med hjälp av enkla sökningar på nyckelord. Resultaten påvisar att drönaren i allmänhet är säker, men att den är sårbar för en viss typ av denial-of-service-attack, vilket kan öppna dörren till flera attackytor om lösenordet för drönarens Wi-Fi inte är tillräckligt starkt. Några förslag för att mildra dessa hot presenteras i slutet av rapporten.
222

A Low-Cost Omnidirectional Antenna for Wi-Fi Access Points

McGough, Erin Patrick 05 June 2014 (has links)
No description available.
223

Unobtrusive, Pervasive, and Cost-Effective Communications with Mobile Devices

Champion, Adam C. 25 September 2017 (has links)
No description available.
224

Software Defined Radio (SDR) based sensing

Dahal, Ajaya 10 May 2024 (has links) (PDF)
The history of Software-Defined Radios (SDRs) epitomizes innovation in wireless communication. Initially serving military needs, SDRs swiftly transitioned to civilian applications, revolutionizing communication. This thesis explores SDR applications such as Spectrum Scanning Systems, Contraband Cellphone Detection, and Human Activity Recognition via Wi-Fi signals. SDRs empower Spectrum Scanning Systems to monitor and analyze radio frequencies, optimizing spectrum allocation for seamless wireless communication. In Contraband Cellphone Detection, SDRs identify unauthorized signals in restricted areas, bolstering security efforts by thwarting illicit cellphone usage. Human Activity Recognition utilizes Raspberry Pi 3B+ to track movement patterns via Wi-Fi signals, offering insights across various sectors. Additionally, the thesis conducts a comparative analysis of Wi-Fi-based Human Activity Recognition and Radar for accuracy assessment. SDRs continue to drive innovation, enhancing wireless communication and security in diverse domains, from defense to healthcare and beyond.
225

Industrial WiFi Redundancy Methods

Henrysson, Fabian, Dizdarevic, Oliver January 2024 (has links)
This thesis explores various Wi-Fi redundancy methods to enhance network resilience in industrial settings. Maintaining uninterrupted data transmission is crucial due to the increasing reliance on wireless technologies for industrial operations. Our research investigates the performance of different redundancy strategies, including Multi-Link Operation (MLO) and Truncated Automatic Repeat Request (TARQ), through practical prototyping and testing on specific hardware configurations. We aim to assess these methods' effectiveness in mitigating packet loss and improving transmission consistency under varying attenuation. The findings are expected to provide valuable insights into the potential of existing redundancy methods to improve Wi-Fi network robustness. This thesis evaluates two main redundancy methods: MLO and TARQ. In our findings, MLO demonstrated improved packet transmission consistency at lower levels of signal attenuation compared to standard implementations. TARQ, particularly on the 2.4 GHz band, significantly reduced packet loss across a wide range of attenuation levels, thus showing its potential to enhance network reliability.
226

Systémy řízení skladových operací / Warehouse Management Systems (WMS)

Korčián, Stanislav January 2009 (has links)
Goal of this thesis is to describe the warehouse management systems with focus on the engineering solution, software development and innovation. The evolution of warehouse management systems is very similar to that of many other software solutions. Initially a system to control movement and storage of materials within a warehouse, the role of WMS is expanding to including light manufacturing, transportation management, order management, and complete accounting systems. General point of view of this thesis is suggest the method how to implement modular (standard) solution on the premises. Project is specialized on PDA terminals and wireless access points settings. Introductory chapter of thesis offer extensive background, which reach out reader with system SAP and logistics processes. Practical part of project can divided to two parts. First one analyze software and develop system in cooperation with supplier and ITC department of ABB corporation. Follow part describe reports and dynamic programmes in programming language ABAP with a view to adoption architecture of system SAP. In fine author intend about future development of modern technology in ABB corporation and potential development of object identification method.
227

On the use of WiMAX and Wi-Fi in a VANET to provide in-vehicle connectivity and media distribution

Mojela, Lerotholi Solomon 12 1900 (has links)
Thesis (MScEng)--Stellenbosch University, 2011. / ENGLISH ABSTRACT: The recent emergence of ubiquitous wireless connectivity and the increasing computational capacity of modern vehicles have triggered immense interest in the possibilities of vehicular connectivity. A plethora of potential applications for vehicular networks have been proposed in the areas of safety, traffic infrastructure management, information, and entertainment. The broad range of applications requires creative utilisation of the available wireless medium, using a combination of existing and novel wireless technologies. In this research the evaluation of one such configuration is performed. Dedicated short range communication for safety applications is assumed, and the use of Wi- Fi and WiMAX for non-safety applications is evaluated. Little is known about the media streaming performance of these wireless technologies in realistic vehicular ad-hoc network (VANET) scenarios. Due to the extreme mobility and unpredictable environmental aspects in a real road environment, an empirical evaluation is performed and presented. Evaluation of a multi-vehicle to infrastructure (V2V2I) VANET, using Wi-Fi for the vehicle-to-vehicle communication and WiMAX for the vehicle to infrastructure (V2I) communication is experimented. It is observed that Wi-Fi is unaffected by the vehicle speed; whenever nodes are within communication range, data gets transferred normally. A detailed characterisation of the network architecture is presented and the results show that a multitude of applications can be supported with this proposed network architecture. / AFRIKAANSE OPSOMMING: Die toenemende beskikbaarheid en digtheid van koordlose netwerke en die verhoogde verwerkingsvermoëns van moderne voertuie het die afgelope paar jaar aansienlike belangstelling gewek in die moontlikhede wat voertuig-kommunikasie bied. ʼn Magdom moontlike toepassings is voorgestel in ʼn wye verskeidenheid van velde insluitende veiligheid, verkeersinfrastruktuur, informasie en vermaak. Hierdie voorstelle vereis die kreatiewe benutting van die beskikbare en nuwe koordlose tegnologieë. Hierdie tesis evalueer een voorbeeld van so ‘n opstelling. ʼn Toegewyde kortafstand kommunikasie modus vir veiligheidstoepassings word aangeneem, terwyl Wi-Fi en WiMAX vir ander toepassings evalueer word. Daar is min navorsing oor die kapasiteit en seinsterkte van hierdie beskikbare netwerke onder realistiese voertuig netwerk (VANET) scenario‘s. Weens die hoë mobiliteit van voertuie en ook die onvoorspelbaarheid van hierdie omgewing word ʼn empiriese evaluasie beskou as die mees gepaste metode. Die navorsing ondersoek ʼn multi-voertuig-totinfrastruktuur- netwerk wat Wi-Fi gebruik vir voertuig-tot-voertuig (V2V) kommunikasie en WiMAX vir voertuig-tot-infrastruktuur (V2I) kommunikasie. Die navorsing bevind dat Wi-Fi nie beïnvloed word deur die spoed van die voertuig nie: wanneer die nodes binne die bereik is van die netwerk word data normaal oorgedra. ‗n Gedetailleerde karakterisering van dié netwerk word gedoen en die resultate dui aan dat ‗n groot hoeveelheid toepassings ondersteun kan word deur dié opstelling.
228

The Smart Home From a Security Perspective

Christensson, Daniel, Eriksson, Emelie January 2019 (has links)
Based on the fact that many electronic devices are digitalized in our world in order to facilitate our lives, there is a large potential for development in the home. Smart Home solutions are giving us the opportunity to control and manage for example alarms, electricity and surveillance but the technology's rapid improvement paves the way for issues related to security. The objectives for this work will bring up common communication technologies, security and vulnerabilities in the context of a Smart Home and what could be done for future work. In order to investigate the objectives, a literature study has been conducted together with an experiment. The experiment result exploits a weakness in a common Smart Home technology used in the network enable devices in the form of threats and vulnerabilities. In order to mitigate and minimize threats and vulnerabilities one conclusion is that a security policy could be produced. This security policy should provide the user with good practice of how to manage security in order to mitigate vulnerabilities and threats within the Smart Home.
229

Estimativa da ocupação utilizando sensoriamento wi-fi de telefones móveis: uma aplicação no transporte público urbano de passageiros por ônibus. / Estimating the occupancy using Wi-Fi sensing of mobile phones: an application of the urban public transportation by bus.

Nunes, Edson Hilios Marques 25 March 2019 (has links)
A lotação do veículo é um dos fatores determinantes para a qualidade do transporte público (TP), pois, além do conforto do passageiro, afeta também a confiabilidade da linha, alterando a velocidade média do veículo. Entretanto, na cidade de São Paulo, Brasil, uma das maiores operações de ônibus do mundo, é difícil se encontrar implantado algum equipamento de contagem automática de passageiros (APC), provavelmente devido aos custos das tecnologias atuais. Esta pesquisa apresenta os resultados de um método de APC utilizando o sensoriamento por Wi-Fi de telefones móveis dos passageiros embarcados num veículo do TP por ônibus. Para este fim, um protótipo de baixo custo foi desenvolvido e instalado na linha 6500-10 entre o Terminal Santo Amaro e o Terminal Bandeira, durante 7 dias da semana em horários de pico e entre pico. Os dados coletados foram analisados através de ferramentas estatísticas e métodos de análise geográficas. Durante o experimento observou-se que o APC foi capaz de detectar a mudança da ocupação do veículo em 85% dos casos, com uma confiança de até 20% e um erro de até 22 passageiros por medida. Através de dados de posição geográfica foi possível gerar matrizes de carregamento, que permitem inferir a origem e o destino dos passageiros em cada viagem, assim como - para todo o período do experimento - indicar os trechos com maior lotação. Por outro lado, o método não apresentou bons resultados saindo dos terminais e quando a ocupação mudou repentinamente, requerendo estudos posteriores para refinar o algoritmo apresentado. Da mesma maneira, ainda não há como generalizar o método para toda operação, pois, o espaço amostral estudado foi pequeno, deixando como sugestão para pesquisas futuras o aprimoramento deste sistema. / The crowdedness of a vehicle is one of the main quality factor of the public transportation (TP) quality, since, besides the comfort, also affect the reliability of the line, changing its average speed. However, the city of São Paulo, Brazil, one of the biggest bus operations of the world, it is difficult to find any automatic passenger counter (APC) equipment deployed, probably due the costs of current technologies. This research shows the results of an APC technology by the sensing of the Wi-Fi signal of smartphones that are boarded in a vehicle on TP by bus. Therefore, a prototype was developed and deployed on the line 6500-10 between the Terminal Santo Amaro and the Terminal Bandeira, during 7 working days of the week on peak and off-peak hours. was analyzed with statistical and geographical tools. During the experiment, it was observed that the Wi-Fi APC was capable of estimate the occupancy of the vehicle 85% of the cases, with a significance level up to 20% and an error up to 22 passengers per estimation. Through the geographical analysis it was generated load matrices, that allow to infer the origin and destination of the passenger in each trip, indicating the sections along the route where were more boarding and alighting. On the other hand, the method did not perform well when coming out of the final stops and when the crowdedness changed suddenly, requiring further analysis to understand how to deal better under these circumstances. Likewise, due to the limited sample utilized in this research, we cannot generalize the results presented, pressing the need for new researches on different operation scenarios.
230

An Ensemble Learning Based Multi-level Network Intrusion Detection System for Wi-Fi Dominant Networks

Francisco D. Vaca (6790182) 03 June 2019 (has links)
<div>Today, networks contribute signicantly to everyone's life. The enormous usefulness of networks for various services and data storage motivates adversaries to launch attacks on them. Network Intrusion Detection Systems (NIDSs) are used as security measure inside the organizational networks to identify any intrusions and generate alerts for them. The idea of deploying an NIDS is quite known and has been studied and adopted in both academia and industry. However, most of the NIDS literature have emphasized to detect the attacks that originate externally in a wired network infrastructure. In addition, Wi-Fi and wired networks are treated the same for the NIDSs. The open infrastructure in Wi-Fi network makes it different from the wired network. Several internal attacks that could happen in a Wi-Fi network are not pos-</div><div>sible in a wired network. The NIDSs developed using traditional approaches may fail to identify these internal attacks.</div><div><br></div><div><div>The thesis work attempts to develop a Multi-Level Network Intrusion Detection System (ML-NIDS) for Wi-Fi dominant networks that can detect internal attacks specic to Wi-Fi networks as well as the generic network attacks that are independent of network infrastructure. In Wi-Fi dominant networks, Wi-Fi devices (stations) are prevalent at the edge of campus and enterprise networks and integrated with the fixed wired infrastructure at the access. The implementation is proposed for Wi-Fi dominant networks; nevertheless, it aims to work for the wired network as well. We develop the ML-NIDS using an ensemble learning method that combines several weak</div><div>learners to create a strong learner.</div></div><div><br></div>

Page generated in 0.0177 seconds