• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 29
  • 7
  • 6
  • 6
  • 3
  • 3
  • 3
  • 2
  • 1
  • 1
  • Tagged with
  • 72
  • 72
  • 19
  • 14
  • 14
  • 12
  • 11
  • 11
  • 10
  • 9
  • 9
  • 8
  • 8
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Protecting 802.11-Based Wireless Networks From SCTS and JACK Attacks

Zhang, Zhiguo 07 August 2008 (has links)
The convenience of IEEE 802.11-based wireless access networks has led to widespread deployment. However, these applications are predicated on the assumption of availability and confidentiality. Error-prone wireless networks afford an attacker considerable flexibility to exploit the vulnerabilities of 802.11-based mechanism. Two of most famous misbehaviors are selfish and malicious attacks. In this thesis we investigate two attacks: Spurious CTS attack (SCTS) and Jamming ACK attack (JACK). In the SCTS, malicious nodes may send periodic Spurious CTS packets to force other nodes to update their NAV values and prevent them from using the channel. In the JACK, an attacker ruins legitimate ACK packets for the intention of disrupting the traffic flow and draining the battery energy of victim nodes quickly. Correspondingly, we propose solutions: termed Carrier Sensing based Discarding (CSD), and Extended Network Allocation Vector (ENAV) scheme. We further demonstrate the performance of our proposed schemes through analysis and NS2 simulations.
22

Comparison of systems to detect rogue access points

Lennartsson, Alexander, Melander, Hilda January 2019 (has links)
A hacker might use a rogue access point to gain access to a network, this poses athreat to the individuals connected to it. The hacker might have the potential to leakcorporate data or steal private information. The detection of rogue access points istherefore of importance to prevent any damage to both businesses and individuals.Comparing different software that detects rogue access points increases the chanceof someone finding a solution that suits their network. The different type of softwarethat are compared are intrusion detection systems, wireless scanners and a Ciscowireless lan controller. The parameters that are being compared are; cost, compat-ibility, detection capability and implementation difficulty. In order to obtain resultssome of the parameters require testing. As there are three types of software, threeexperiment environments should be conducted. Our research indicates that alreadyexisting network equipment or the size of the network affects the results from theexperiments.
23

Redes de equipamentos sem fio de uso pessoal: comparação de tecnologias emergentes e análise de tendências. / Wireless network equipment for personal use comparison of emerging technology trends and analysis.

Rivera, Antonio D\'Acosta 06 October 2010 (has links)
No mundo globalizado em que vivemos os sistemas, as aplicações e as pessoas precisam estar conectadas permanentemente à Internet, e a uma variedade de redes de comunicação, com vários dispositivos, simultaneamente. O ideal, devido a esse contexto, seria ter um único dispositivo com uma única interface de rede e um único programa que permitisse fazer diversas conexões com diversos protocolos usados simultaneamente, tornando o sistema simples de usar e fácil de instalar e operar, conseguindo, desta forma, o nível de estabilidade e confiabilidade desejadas. Por isso, as redes de área pessoal (WPAN) estão crescendo em importância desde seu aparecimento em 1991. Diversas tecnologias foram propostas para sua implementação sem que haja um consenso sobre a aplicabilidade de cada opção. Este trabalho realiza uma avaliação crítica das diversas tecnologias propostas e por meio de um laboratório de prototipação procurou obter dados que permitam uma avaliação mais objetiva dessas tecnologias. Esse documento apresenta uma descrição desse laboratório e apresenta a metodologia proposta para comparação das tecnologias para WPAN, e os resultados obtidos em laboratório. O estudo apresentado demonstra, através de uma avaliação critica, que as principais alternativas no momento são Wi-Fi e Bluetooth e que com os dados obtidos na prototipação em laboratório se provou que hoje há possibilidade de virtualizar diferentes redes e tipos de interface em uma única interface física. A economia de escala, multiplicada pelo efeito da virtualização das interfaces, leva a conclusão que as tecnologias Wi-Fi e Bluetooth deverão dominar o mercado de WLAN e WPAN nos próximos anos. / In todays globalized world, systems, applications and people need to be permanently connected to the Internet, a variety of communications networks and several different devices simultaneously. Ideally, faced with this context, there should be a single device with a single network interface, and a single program that enables several connections and protocols to be used simultaneously, making the entire systems simple to use and easy to install and operate, thus leading to the desired levels of stability and reliability. So the personal area networks (WPAN) are growing in importance since its debut in 1991. Several technologies have been proposed for its implementation without a consensus on the applicability of each option The proposed work will conduct a critical evaluation of the various proposed technologies and, through a laboratory prototype seek information to enable a more objective evaluation of these technologies. This document provides a description of the laboratory and presents the proposed methodology to compare technology for WPAN.
24

Redes de equipamentos sem fio de uso pessoal: comparação de tecnologias emergentes e análise de tendências. / Wireless network equipment for personal use comparison of emerging technology trends and analysis.

Antonio D\'Acosta Rivera 06 October 2010 (has links)
No mundo globalizado em que vivemos os sistemas, as aplicações e as pessoas precisam estar conectadas permanentemente à Internet, e a uma variedade de redes de comunicação, com vários dispositivos, simultaneamente. O ideal, devido a esse contexto, seria ter um único dispositivo com uma única interface de rede e um único programa que permitisse fazer diversas conexões com diversos protocolos usados simultaneamente, tornando o sistema simples de usar e fácil de instalar e operar, conseguindo, desta forma, o nível de estabilidade e confiabilidade desejadas. Por isso, as redes de área pessoal (WPAN) estão crescendo em importância desde seu aparecimento em 1991. Diversas tecnologias foram propostas para sua implementação sem que haja um consenso sobre a aplicabilidade de cada opção. Este trabalho realiza uma avaliação crítica das diversas tecnologias propostas e por meio de um laboratório de prototipação procurou obter dados que permitam uma avaliação mais objetiva dessas tecnologias. Esse documento apresenta uma descrição desse laboratório e apresenta a metodologia proposta para comparação das tecnologias para WPAN, e os resultados obtidos em laboratório. O estudo apresentado demonstra, através de uma avaliação critica, que as principais alternativas no momento são Wi-Fi e Bluetooth e que com os dados obtidos na prototipação em laboratório se provou que hoje há possibilidade de virtualizar diferentes redes e tipos de interface em uma única interface física. A economia de escala, multiplicada pelo efeito da virtualização das interfaces, leva a conclusão que as tecnologias Wi-Fi e Bluetooth deverão dominar o mercado de WLAN e WPAN nos próximos anos. / In todays globalized world, systems, applications and people need to be permanently connected to the Internet, a variety of communications networks and several different devices simultaneously. Ideally, faced with this context, there should be a single device with a single network interface, and a single program that enables several connections and protocols to be used simultaneously, making the entire systems simple to use and easy to install and operate, thus leading to the desired levels of stability and reliability. So the personal area networks (WPAN) are growing in importance since its debut in 1991. Several technologies have been proposed for its implementation without a consensus on the applicability of each option The proposed work will conduct a critical evaluation of the various proposed technologies and, through a laboratory prototype seek information to enable a more objective evaluation of these technologies. This document provides a description of the laboratory and presents the proposed methodology to compare technology for WPAN.
25

Security of IEEE 802.11b / Säkerhet i IEEE 802.11b

Skoglund, Johan January 2003 (has links)
<p>The IEEE 802.11b standard is today the only commonly used standard in Europe for fast wireless networks. This makes it possible to connect computers to networks in places where it is not possible to use wires. Examples of such situations are internet access at airports, communication in emergency areas or for military communication. Common for all these situations is that network security is important. </p><p>This thesis consists of two different parts. The first part handles the security mechanisms and the second part is an evaluation of the possibilities to use IEEE 802.11b in embedded applications. The part that handles the security includes the security mechanisms found in the standard, flaws in these mechanisms and methods that try to reduce these problems.</p>
26

VHDL Implementation of CORDIC Algorithm for Wireless LAN

Lashko, Anastasia, Zakaznov, Oleg January 2004 (has links)
<p>This work is focused on the CORDIC algorithm for wireless LAN. The primary task is to create a VHDL description for CORDIC vector rotation algorithm. </p><p>The basic research has been carried out in MATLAB. The VHDL implementation of the CORDIC algorithm is based on the results obtained from the MATLAB simulation. Mentor Graphics FPGA Advantage© for Xilinx 4010XL FPGA has been used for the hardware implementation.</p>
27

Wireless On-Board Diagnostics

Schirninger, Rene, Zeppetzauer, Stefan January 2005 (has links)
<p>Wireless On-board diagnostics functionality, which is a future outlook to vehicle system </p><p>parameter analysis, enables measurements and controlling without the limitation of a physical </p><p>connector. Today every vehicle must by law provide the possibility to analyze engine and </p><p>emission related parameters (OBD II). The wireless connection requires a high security level </p><p>to prevent unauthorized communication establishment with the truck’s bus system. The aim </p><p>of the project is to make a survey of the available security mechanisms and to find the most </p><p>promising solutions. Furthermore, several usage scenarios and access right levels are </p><p>specified and a risk analysis of the whole system is made. The greatest challenge is the </p><p>specification and implementation of a proper key-exchange mechanism between the analyzing </p><p>device and the truck’s bus system, which is therefore carried out with the highest possible </p><p>level of awareness. Consequently several different concepts have been formulated based on </p><p>the different usage scenarios.</p>
28

Autonomic wireless networking

Velayos Muñoz, Héctor Luis January 2005 (has links)
Large-scale deployment of IEEE 802.11 wireless LANs (WLANs) remains a significant challenge. Many access points (APs) must be deployed and interconnected without a-priori knowledge of the demand. We consider that the deployment should be iterative, as follows. At first, access points are deployed to achieve partial coverage. Then, usage statistics are collected while the network operates. Overloaded and under-utilized APs would be identified, giving the opportunity to relocate, add or remove APs. In this thesis, we propose extensions to the WLAN architecture that would make our vision of iterative deployment feasible. One line of work focuses on self-configuration, which deals with building a WLAN from APs deployed without planning, and coping with mismatches between offered load and available capacity. Self-configuration is considered at three levels. At the network level, we propose a new distribution system that forms a WLAN from a set of APs connected to different IP networks and supports AP auto-configuration, link-layer mobility, and sharing infrastructure between operators. At the inter-cell level, we design a load-balancing scheme for overlapping APs that increases the network throughput and reduces the cell delay by evenly distributing the load. We also suggest how to reduce the handoff time by early detection and fast active scanning. At the intra-cell level, we present a distributed admission control that protects cells against congestion by blocking stations whose MAC service time would be above a set threshold. Another line of work deals with self-deployment and investigates how the network can assist in improving its continuous deployment by identifying the reasons for low cell throughput. One reason may be poor radio conditions. A new performance figure, the Multi-Rate Performance Index, is introduced to measure the efficiency of radio channel usage. Our measurements show that it identifies cells affected by bad radio conditions. An additional reason may be limited performance of some AP models. We present a method to measure the upper bound of an AP’s throughput and its dependence on offered load and orientation. Another reason for low throughput may be excessive distance between users and APs. Accurate positioning of users in a WLAN would permit optimizing the location and number of APs. We analyze the limitations of the two most popular range estimation techniques when used in WLANs: received signal strength and time of arrival. We find that the latter could perform better but the technique is not feasible due to the low resolution of the frame timestamps in the WLAN cards. The combination of self-configuration and self-deployment enables the autonomic operation of WLANs.
29

Adaptive Cooperative Awareness Messaging for Enhanced Overtaking Assistance on Rural Roads

Böhm, Annette, Jonsson, Magnus, Uhlemann, Elisabeth January 2011 (has links)
Cooperative traffic safety applications such as lane change or overtaking assistance have the potential to reduce the number of road fatalities. Many emerging traffic safety applications are based on IEEE 802.11p and periodic position messages, so-called cooperative awareness messages (CAM) being broadcasted by all vehicles. In Europe, ETSI defines a periodic report rate of 2 Hz for CAMs. Although a high report rate is the key to early hazard detection, the 2 Hz rate has been chosen to avoid congestion in settings where the vehicle density is high, e.g., on major highways and in urban scenarios. However, on rural roads with a limited number of communicating vehicles, a report rate of 2 Hz leads to unnecessary delay in cooperative awareness. By adapting the CAM report rate depending on the specific application and road traffic density, and by making use of the priority levels provided by the 802.11p quality of service mechanism, we show that hazards can be detected earlier and the available bandwidth is used more efficiently, while not overexploiting the network resources. / <p>©2011 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.</p><p></p><p>Category number CFP11VTF-ART; Code 87844</p>
30

VHDL Implementation of CORDIC Algorithm for Wireless LAN

Lashko, Anastasia, Zakaznov, Oleg January 2004 (has links)
This work is focused on the CORDIC algorithm for wireless LAN. The primary task is to create a VHDL description for CORDIC vector rotation algorithm. The basic research has been carried out in MATLAB. The VHDL implementation of the CORDIC algorithm is based on the results obtained from the MATLAB simulation. Mentor Graphics FPGA Advantage© for Xilinx 4010XL FPGA has been used for the hardware implementation.

Page generated in 0.057 seconds