• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 95
  • 29
  • 27
  • 19
  • 8
  • 4
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 234
  • 234
  • 42
  • 37
  • 36
  • 35
  • 31
  • 31
  • 29
  • 27
  • 27
  • 27
  • 22
  • 21
  • 20
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
111

Wireless Network Physical Layer Security with Smart Antenna

Wang, Ting 17 June 2013 (has links)
Smart antenna technique has emerged as one of the leading technologies for enhancing the quality of service in wireless networks. Because of its ability to concentrate transmit power in desired directions, it has been widely adopted by academia and industry to achieve better coverage, improved capacity and spectrum efficiency of wireless communication systems. In spite of its popularity in applications of performance enhancement, the smart antenna's capability of improving wireless network security is relatively less explored. This dissertation focuses on exploiting the smart antenna technology to develop physical layer solutions to anti-eavesdropping and location security problems. We first investigate the problem of enhancing wireless communication privacy. A novel scheme named "artificial fading" is proposed, which leverages the beam switching capability of smart antennas to prevent eavesdropping attacks. We introduce the optimization strategy to design a pair of switched beam patterns that both have high directional gain to the intended receiver. Meanwhile, in all the other directions, the overlap between these two patterns is minimized. The transmitter switches between the two patterns at a high frequency. In this way, the signal to unintended directions experiences severe fading and the eavesdropper cannot decode it. We use simulation experiments to show that the artificial fading outperforms single pattern beamforming in reducing the unnecessary coverage area of the wireless transmitter. We then study the impact of beamforming technique on wireless localization systems from the perspectives of both location privacy protection and location spoofing attack. For the location privacy preservation scheme, we assume that the adversary uses received signal strength (RSS) based localization systems to localize network users in Wireless LAN (WLAN). The purpose of the scheme is to make the adversary unable to uniquely localize the user when possible, and otherwise, maximize error of the adversary's localization results. To this end, we design a two-step scheme to optimize the beamforming pattern of the wireless user's smart antenna. First, the user moves around to estimate the locations of surrounding access points (APs). Then based on the locations of the APs, pattern synthesis is optimized to minimize the number of APs in the coverage area and degenerate the localization precision. Simulation results show that our scheme can significantly lower the chance of being localized by adversaries and also degrade the location estimation precision to as low as the coverage range of the AP that the wireless user is connected to. As personal privacy preservation and security assurance at the system level are always conflictive to some extent, the capability of smart antenna to intentionally bias the RSS measurements of the localization system also potentially enables location spoofing attacks. From this aspect, we present theoretical analysis on the feasibility of beamforming-based perfect location spoofing (PLS) attacks, where the attacker spoofs to a target fake location by carefully choosing the beamforming pattern to fool the location system. The PLS problem is formulated as a nonlinear feasibility problem, and due to its intractable nature, we solve it using semidefinite relaxation (SDR) in conjunction with a heuristic local search algorithm. Simulation results show the effectiveness of our analytical approach and indicate the correlation between the geometry of anchor deployment and the feasibility of PLS attacks. Based on the simulation results, guidelines for guard against PLS attacks are provided. / Ph. D.
112

Platforma pro mobilní agenty v bezdrátových senzorových sítích / Platform for Mobile Agents in Wireless Sensor Networks

Horáček, Jan January 2009 (has links)
This work deals with implementation of an agent platform, which is able to run agent code in wireless sensor networks. Implementation has been done for MICAz platform, which uses TinyOS operating system for developing applications. This work contains list of chosen TinyOS parts and illustrates, how such a platform can be used for our purposes. We will describe main features of ALLL language and we will also demonstrate some examples of agents.
113

Multi-Rotor--Aided Three-Dimensional 802.11 Wireless Heat Mapping

Pack, Scott James 18 March 2014 (has links) (PDF)
Traditional wireless site surveys produce a heat-map of link strength or quality over a target area, usually on the ground plane. In recent years research has gone into using aerial drones in network attack and surveillance, making three dimensional awareness of wireless coverage areas of interest. A multi-rotor drone and data collection module were built and tested as part of this research. Site assessments were conducted both in open space and near structures. Collected data was interpolated across the target area, and visualized as points and contours. These visualizations were exported to a Keyhole Markup Language (KML) for visualization in context. Resulting visualizations proved to be beneficial in identifying the coverage area of both authorized and rogue access points.
114

Positioning System for Rescuing Missions in Underground Facilities : Wireless Network Implementation

Martínez Olivo, Alejandro January 2019 (has links)
In the case of an emergency in an underground facility, the harsh environment make the rescue missions a difficult and taxing task for the first responders. Disorientation, stress and lack of communication are fatal in that territory. In order to overcome all this difficulties and provide a system to coordinate and help locate emergency responders, a new Indoor Positioning System (IPS) is proposed. The system shall be scalable so it can expand its coverage over the site, it would adapt and remain reliable in the harsh conditions of the environment. The main goal of this project is to present an analysis of the current wireless technologies, their advantages and disadvantages and a comparison between them. Build a new solution and present the results of the performance of the network. The tests recreate the characteristics of the underground territory and present a good analysis of the system. This thesis project report the process, to build a scalable, adaptable and reliable wireless network to be used as the framework of a positioning system. The system is constructed using the ZigBee protocol stack and the nRF52840 hardware. A graphical user interface is developed to facilitate the configuration of the network. At the end the results gives proof that the system can be used in the underground facilities as long as the network is deployed carefully. / Vid en nödsituation i en underjordisk anläggning, på grund av den svåra miljön, räddningsuppdragen blir en svår och beskattande uppgift för de första svararna. Desorientering, stress och brist på kommunikation är dödliga inom det området. För att övervinna alla dessa svårigheter och tillhandahålla ett system för att samordna och hjälpa till att hitta nödlägen, föreslås ett nytt inomhuspositioneringssystem (IPS). Systemet ska vara skalbart så att det kan utöka sin täckning över webbplatsen, det skulle anpassa sig och förbli tillförlitligt under de svåra miljöerna. Detta arbete har huvudmål att presentera en analys av den nuvarande trådlösa tekniken, deras fördelar och nackdelar och en jämförelse mellan dem samtidigt bygga en ny lösning och presentera resultaten av nätverkets prestanda. Testen modellerar egenskaperna hos det underjordiska territoriet och presenterar en bra analys av systemet. Detta arbete rapporterar processen för att bygga ett skalbart, anpassningsbart och pålitligt trådlöst nätverk som ska användas som ett ramverk för ett positioneringssystem. Systemet är konstruerat med ZigBee-protokollstacken och hårdvaran nRF52840. Ett grafiskt användargränssnitt utvecklas för att underlätta konfigurationen av nätverket. Resultatet bevisar att systemet kan användas vid de underjordiska anläggningarna så länge nätverket distribueras noggrant.
115

Development and Analysis of a Model for Assessing Perceived Security Threats and Characteristics of Innovating for Wireless Networks

Schmidt, Mark Bradley 13 May 2006 (has links)
This dissertation employed a two prong approach, whereby the survey and case study methods were used to investigate security issues regarding wireless networks. The survey portion draws together two previously unrelated research streams. Given the recent increased concern for security in the computing milieu, Innovation Diffusion Theory and security factor constructs were merged and synthesized to form a new instrument. This instrument is useful in an effort to understand what role security concerns play in the adoption and diffusion of technology. In development of the new instrument, 481 usable surveys were collected and analyzed. Factor analysis revealed favorable factor loadings in the data. Further analysis was then conducted utilizing multiple regression analysis. This analysis led to the discovery that the constructs of Susceptibility and Severity of Threat, Improvement Potential, and Visibility are significant predictors in regard to level of concern when using wireless networks. Case studies were conducted with a goal to gain a deep knowledge of IT professionals? concerns, attitudes, and best practices toward wireless security. To this end, seven IT professionals were personally interviewed regarding their perceptions and attitudes toward wireless security. In an effort to compare IT professional and end user opinions, 30 IT professionals also completed a paper based survey regarding their perceptions about security. Findings indicate that security professionals are very optimistic for the future of wireless computing. However, that optimism is tempered by a realization that there are a myriad of potential threats that might exploit weakness in wireless security. To determine differences and similarities between users? perspectives and managers? perspectives regarding wireless network security, the results from the survey and case study were synthesized. Most IT professionals (76.19%) reported that, all factors considered, they prefer to use wired networks as opposed to wireless networks; whereas, substantially fewer (44.86%) of the end user respondents reported that they preferred wired over wireless networks. Overall, results suggest that IT professionals are more concerned about security than are end users. However, a challenge remains to make administrators and users aware of the full effect of security threats present in the wireless computing paradigm.
116

Methods and Tools for Battery-free Wireless Networks

Geißdörfer, Kai 15 November 2022 (has links)
Embedding small wireless sensors into the environment allows for monitoring physical processes with high spatio-temporal resolutions. Today, these devices are equipped with a battery to supply them with power. Despite technological advances, the high maintenance cost and environmental impact of batteries prevent the widespread adoption of wireless sensors. Battery-free devices that store energy harvested from light, vibrations, and other ambient sources in a capacitor promise to overcome the drawbacks of (rechargeable) batteries, such as bulkiness, wear-out and toxicity. Because of low energy input and low storage capacity, battery-free devices operate intermittently; they are forced to remain inactive for most of the time charging their capacitor before being able to operate for a short time. While it is known how to deal with intermittency on a single device, the coordination and communication among groups of multiple battery-free devices remain largely unexplored. For the first time, the present thesis addresses this problem by proposing new methods and tools to investigate and overcome several fundamental challenges.
117

Network Selection Algorithm for Satisfying Multiple User Constraints Under Uncertainty in a Heterogeneous Wireless Scenario

Mahadevan, Srisudha 20 September 2011 (has links)
No description available.
118

Clock synchronization and dominating set construction in ad hoc wireless networks

Zhou, Dong 22 November 2005 (has links)
No description available.
119

Opportunistic Computing in Wireless Networks

Yang, Zhimin 23 August 2010 (has links)
No description available.
120

Exploring Performance Limits of Wireless Networks with Advanced Communication Technologies

Qin, Xiaoqi 13 October 2016 (has links)
Over the past decade, wireless data communication has experienced a phenomenal growth, which is driven by the popularity of wireless devices and the growing number of bandwidth hungry applications. During the same period, various advanced communication technologies have emerged to improve network throughput. Some examples include multi-input multi-output (MIMO), full duplex, cognitive radio, mmWave, among others. An important research direction is to understand the impacts of these new technologies on network throughput performance. Such investigation is critical not only for theoretical understanding, but also can be used as a guideline to design algorithms and network protocols in the field. The goal of this dissertation is to understand the impact of some advanced technologies on network throughput performance. More specifically, we investigate the following three technologies: MIMO, full duplex, and mmWave communication. For each technology, we explore the performance envelope of wireless networks by studying a throughput maximization problem. / Ph. D.

Page generated in 0.0555 seconds