• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 95
  • 29
  • 27
  • 19
  • 8
  • 4
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 234
  • 234
  • 42
  • 37
  • 36
  • 35
  • 31
  • 31
  • 29
  • 27
  • 27
  • 27
  • 22
  • 21
  • 20
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
191

Měření teploty s přenosem dat přes sít WLAN / Temperature measurement with data transfer via WLAN

Müller, David January 2014 (has links)
This diploma thesis deals with the design of temperature sensor and display units, which communicate via a WLAN network. The theoretical part provides an overview of various methods of temperature measurement including several specific types of temperature sensors, and also introduces the WLAN standard as well as TCP and UDP protocols. The design solution is focuses first on the system architecture and design of the communication protocol, followed by the implementation of both types of equipment, starting with selection of components, through design diagrams and printed circuit board patterns, up to production and commissioning. The following parts of this thesis deal with the design of programs for the controlling microcontroller units of both units and the configuration application for PC.
192

Systém bezpečnosti informací ve firmě / Company Information Security System

Hála, Jaroslav January 2011 (has links)
This work deals with the introduction of information security system in a company that provides internet. It is a hardware and software solutions for the benefit of quality information needed to monitor and manage networks on a professional level. Used solutions are versatile with regard to the diversity of the market and the speed of technology development.
193

Webové služby pro podporu geolokace v rozsáhlých sítích / Web-Services for Geo-Location Support in Wide-Area Networks

Imlauf, Michal January 2012 (has links)
The goal of this master's thesis is to describe geolocation techniques in wireless wide-area networks and the ways of expressing the individual node location. Practical part describes implementation of web services that simulate the node movement in these wireless networks and implementation of web service that is going to agregate the coordinate systems of these wireless networks.
194

Diseño de red inalámbrica para una compañía del sector minero

Pascual Mendoza, Christian José 24 April 2021 (has links)
La siguiente tesis, es sobre el diseño de la red inalámbrica para una compañía del sector minero, utilizando fórmulas, estándares y buenas prácticas brindadas por diversas entidades internacionales, que nos permiten el mejor diseño posible. En el capítulo 1 se dará aspectos introductorios acerca de la compañía y los objetivos planteados. En el capítulo 2, se da soporte científico y teórico a la tecnología, estándares y especificaciones empleadas. En el capítulo 3, se plantea el problema a resolver, sus causas, consecuencias, requerimientos y posible solución. En el capítulo 4, a nivel técnico, se propone las especificaciones y mejores prácticas en el desarrollo del diseño como es: las frecuencias libres de 2.4 GHz para acceso a la red, 5 GHz para la utilización de mesh y la frecuencia de 60 GHz para los enlaces microondas. En el capítulo 5, se validará el diseño propuesto contra los objetivos específicos propuestos en el capítulo 1. Finalmente, en el capítulo 6 y 7, se da recomendaciones y conclusiones. / The following thesis is about the design of the wireless network for one mining company, using formulas, standards and good practices provided by various international entities, which allow us the best possible design. In chapter 1 introductory aspects about the company and its objectives will be given. In Chapter 2, scientific and theoretical support is given to the technology, standards and specifications used. In chapter 3, the problem to be solved, its causes, consequences, requirements and possible solution are presented. In chapter 4, at a technical level, the specifications and best practices in the development of the design are proposed, such as: the free frequencies of 2.4 GHz for network access, 5 GHz for the use of mesh and the frequency of 60 GHz for microwave links. In Chapter 5, the proposed design will be validated against the specific objectives proposed in Chapter 1. Finally, in Chapter 6 and 7, recommendations and conclusions are given. / Tesis
195

Décisions multicritères dans les réseaux de télécommunications autonomes / Multicriteria decision making in autonomous networks

Aissanou, Farouk 19 June 2012 (has links)
Les réseaux de données actuels sont des entités complexes qui opèrent dans des environnements dynamiques et hétérogènes. L'architecture et les protocoles de ces réseaux doivent faire face à plusieurs défis, notamment l'adaptation dynamique et la prise de décisions autonome en présence de plusieurs critères, souvent contradictoires, tels que le délai, le taux de perte, la gigue, l'énergie, etc. Cependant, les problèmes de décision multicritère ont généralement de multiples solutions. Ces problèmes sont résolus par des méthodes qui utilisent des paramètres dont les choix ont des conséquences difficiles à prévoir. De ce fait, la plupart des méthodes de décision multicritère proposées dans la littérature supposent la présence d'un décideur qui guide le processus de décision. Enfin, le choix des paramètres suppose souvent une interactivité avec le décideur, ce qui est difficile, voire impossible, à envisager dans un contexte autonome. Dans cette thèse, nous proposons une nouvelle méthode de décision multicritère adaptée aux systèmes autonomes en général et aux réseaux autonomes en particulier. La méthode de décision multicritère de type ``poupée russe'' que nous introduisons utilise un ensemble de boîtes de qualité englobantes, définies dans l'espace des critères, afin d'estimer une large gamme de fonctions d'utilité. D'une part, la méthode proposée s'adapte au caractère dynamique des réseaux autonomes, afin de maximiser la satisfaction des utilisateurs. D'autre part, elle utilise des paramètres qui sont soit directement déduits de faits objectifs, tels que des normes ou spécifications techniques, soit obtenus à l'aide d'une expérience de type MOS (Mean Opinion Score) au moyen d'une méthode de classification automatique. Nous avons testé les performances de la méthode de la poupée russe sur un cas pratique de routage dans les réseaux ad hoc sans fil. Les expérimentations ont montré que le routage réalisé avec la méthode de la poupée russe est toujours meilleur ou similaire à celui de la méthode de la somme pondérée qui est largement utilisée. Cela est dû à la capacité d'adaptation de la décision offerte par cette nouvelle méthode de décision multicritère / Today's data networks are complex entities that operate in dynamic and heterogeneous environments. The architecture and protocols of these networks have to face several challenges such as dynamic adaptation and autonomous decision-making in the presence of several, often conflicting, criteria such as delay, loss rate, jitter, energy, etc. However, multicriteria decision making problems usually have multiple solutions. These problems are solved by methods that use parameters whose choices have consequences difficult to predict. Thus, most multicriteria decision making methods proposed in the literature assume the presence of a decision maker who guides the decision process. Finally, the choice of parameter values often involves an interaction with the decision maker, which is difficult or impossible to do in an autonomous context. In this thesis, we propose a new multicriteria decision making method suitable for autonomous systems in general and autonomous networks in particular. The Russian doll like method we propose uses a set of nested quality boxes (like Russian dolls) defined in the criteria space, in order to approximate a wide range of utility functions. First, the proposed method adapts to the dynamic nature of autonomous networks in order to maximize user satisfaction. Second, it uses parameters that are directly deduced from objective facts such as technical standards or specifications, or obtained from a MOS (Mean Opinion Score) experiment using an automatic classification method. We tested the performance of the Russian doll like method in a case of routing in wireless ad hoc networks. Experiments have shown that routing done with the Russian doll like method is always better or similar to the one done by the weighted sum method which is widely used. This is due to the adaptation ability of the decision provided by this new multicriteria decision making method
196

Analyse et modélisation du canal radio pour la génération de clés secrètes / Analysis and modeling of the radio channel for secret key generation

Mazloum, Taghrid 12 February 2016 (has links)
La sécurité des communications sans fil omniprésentes devient, ces dernières années, de plus en plus une exigence incontournable. Bien que la cryptographie symétrique assure largement la confidentialité des données, la difficulté concerne la génération et la distribution de clés secrètes. Récemment, des études indiquent que les caractéristiques inhérentes du canal de propagation peuvent être exploitées afin de consolider la sécurité. En particulier, le canal radio fournit en effet une source d'aléa commune à deux utilisateurs à partir de laquelle des clés secrètes peuvent être générées. Dans la présente dissertation, nous nous intéressons au processus de génération de clés secrètes (SKG), tout en reliant les propriétés du canal radio à la qualité des clés générées. D'abord nous développons un modèle du canal stochastique, traitant la sécurité du point de vue de l'espion, qui montre une mémoire de canal résiduelle bien au-delà d'une distance de quelques longueurs d'onde (scénarios spatialement non-stationnaires). Ensuite, nous exploitons les degrés de liberté (DOF) du canal et analysons leur impact sur la performance de SKG dans différentes conditions, tout en considérant des canaux plus réalistes en environnements extérieur et intérieur (respectivement grâce à des données déterministes simulées et à des mesures). Les résultats montrent que, même pour des bandes modérées (comme standardisées dans la norme IEEE 802.11), le seul DoF de fréquence ou de son association avec le DoF spatial est souvent suffisant pour générer des longues clés, à condition d'utiliser une méthode efficace de quantification des coefficients complexes du canal. / Nowadays, the security of ubiquitous wireless communications becomes more and more a crucial requirement. Even though data is widely protected via symmetric ciphering keys, a well-known difficulty is the generation and distribution of such keys. In the recent years therefore, a set of works have addressed the exploitation of inherent characteristics of the fading propagation channel for security. In particular, secret keys could be generated from the wireless channel, considered as a shared source of randomness, available merely to a pair of communicating entities. ln the present dissertation, we are interested in the approach of secret key generation (SKG) from wireless channels, especially in relating the radio channel properties to the generated keys quality. We first develop a stochastic channel model, focusing on the security with respect to the eavesdropper side, which shows a residual channel memory weil beyond a few wavelengths distance (spatially nonstationary scenarios). Then, we analyze the channel degrees of freedom (DoF) and their impact on the SKG performance in different channel conditions, especially by considering more realistic channels in both outdoor and indoor environments (respectively through simulated ray tracing data and through measurements). The results show that, even for moderately wide band (such as standardized in IEEE 802.11), the sole frequency DOF or its association with the spatial DOF is often enough for generating long keys, provided an efficient quantization method of the complex channel coefficients is used.
197

Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks

Spångberg, Josephine, Mikelinskas, Vainius January 2023 (has links)
The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. As a result, Signature Based Detection and Anomaly Detection are two of many advanced techniques that have become crucial to defend against cyber threats such as malware, but even these are sometimes not enough to stop modern cyberattacks. In this literature review the goal is to discuss how trustworthy each of the mentioned malware detection techniques are at detecting malware in wireless networks. The study will measure trustworthiness by looking further into scalability, adaptability and robustness and resource consumption. This study concludes that both anomaly and signature-based malware detection methods exhibit strengths and weaknesses in scalability, robustness, adaptability, and resource consumption. Furthermore, more research is needed and as malware becomes more sophisticated and an increased threat to the world it is an area that is highly relevant.
198

Quantifying Trust and Reputation for Defense against Adversaries in Multi-Channel Dynamic Spectrum Access Networks

Bhattacharjee, Shameek 01 January 2015 (has links)
Dynamic spectrum access enabled by cognitive radio networks are envisioned to drive the next generation wireless networks that can increase spectrum utility by opportunistically accessing unused spectrum. Due to the policy constraint that there could be no interference to the primary (licensed) users, secondary cognitive radios have to continuously sense for primary transmissions. Typically, sensing reports from multiple cognitive radios are fused as stand-alone observations are prone to errors due to wireless channel characteristics. Such dependence on cooperative spectrum sensing is vulnerable to attacks such as Secondary Spectrum Data Falsification (SSDF) attacks when multiple malicious or selfish radios falsify the spectrum reports. Hence, there is a need to quantify the trustworthiness of radios that share spectrum sensing reports and devise malicious node identification and robust fusion schemes that would lead to correct inference about spectrum usage. In this work, we propose an anomaly monitoring technique that can effectively capture anomalies in the spectrum sensing reports shared by individual cognitive radios during cooperative spectrum sensing in a multi-channel distributed network. Such anomalies are used as evidence to compute the trustworthiness of a radio by its neighbours. The proposed anomaly monitoring technique works for any density of malicious nodes and for any physical environment. We propose an optimistic trust heuristic for a system with a normal risk attitude and show that it can be approximated as a beta distribution. For a more conservative system, we propose a multinomial Dirichlet distribution based conservative trust framework, where Josang*s Belief model is used to resolve any uncertainty in information that might arise during anomaly monitoring. Using a machine learning approach, we identify malicious nodes with a high degree of certainty regardless of their aggressiveness and variations introduced by the pathloss environment. We also propose extensions to the anomaly monitoring technique that facilitate learning about strategies employed by malicious nodes and also utilize the misleading information they provide. We also devise strategies to defend against a collaborative SSDF attack that is launched by a coalition of selfish nodes. Since, defense against such collaborative attacks is difficult with popularly used voting based inference models or node centric isolation techniques, we propose a channel centric Bayesian inference approach that indicates how much the collective decision on a channels occupancy inference can be trusted. Based on the measured observations over time, we estimate the parameters of the hypothesis of anomalous and non-anomalous events using a multinomial Bayesian based inference. We quantitatively define the trustworthiness of a channel inference as the difference between the posterior beliefs associated with anomalous and non-anomalous events. The posterior beliefs are updated based on a weighted average of the prior information on the belief itself and the recently observed data. Subsequently, we propose robust fusion models which utilize the trusts of the nodes to improve the accuracy of the cooperative spectrum sensing decisions. In particular, we propose three fusion models: (i) optimistic trust based fusion, (ii) conservative trust based fusion, and (iii) inversion based fusion. The former two approaches exclude untrustworthy sensing reports for fusion, while the last approach utilizes misleading information. All schemes are analyzed under various attack strategies. We propose an asymmetric weighted moving average based trust management scheme that quickly identifies on-off SSDF attacks and prevents quick trust redemption when such nodes revert back to temporal honest behavior. We also provide insights on what attack strategies are more effective from the adversaries* perspective. Through extensive simulation experiments we show that the trust models are effective in identifying malicious nodes with a high degree of certainty under variety of network and radio conditions. We show high true negative detection rates even when multiple malicious nodes launch collaborative attacks which is an improvement over existing voting based exclusion and entropy divergence techniques. We also show that we are able to improve the accuracy of fusion decisions compared to other popular fusion techniques. Trust based fusion schemes show worst case decision error rates of 5% while inversion based fusion show 4% as opposed majority voting schemes that have 18% error rate. We also show that the proposed channel centric Bayesian inference based trust model is able to distinguish between attacked and non-attacked channels for both static and dynamic collaborative attacks. We are also able to show that attacked channels have significantly lower trust values than channels that are not– a metric that can be used by nodes to rank the quality of inference on channels.
199

Development of an antenna system for a relay-based wireless network

Petropoulos, Ioannis January 2012 (has links)
The proliferation of modern wireless networks increases demand for high capacity and throughput in order to provide faster, more robust, efficient and broadband services to end users. Mobile WiMAX and LTE are examples of such networks in which for some cases they have exposed limited connectivity due to harsh environment. Relay stations are preferred to overcome problems of weak or no access for such network devices, that are placed in specific positions to maintain high quality of data transfer at low cost and provide the required connectivity anywhere anytime. These stations should be equipped with an antenna system capable of establishing communication between base station (backhaul link) and end users (access link). This thesis focuses on the design and development of a new antenna system that is suitable for a relay-based wireless network. Planar geometries of microstrip patch antennas are utilized. The antenna system comprises two antenna modules: a new design of a single antenna for access link and a new design of an antenna array for backhaul link realization. Both antenna specifications are compatible with the IEEE802.16j protocol standard. Hence, relay station should be capable of pointing its radiation pattern to the base station antenna, thus to achieve the desired radiation pattern of the relay station, a new beam-forming module is proposed, designed and developed to generate the proper radiation pattern. The beam-forming module incorporating digital phase shifters and attenuator chips is fabricated and tested. The optimization process using the Least Mean Square (LMS) algorithm is considered in this study to assign the proper phase and amplitude that is necessary to each radiation element excitation current, to produce the desired steered radiation pattern. A comprehensive study on the coupling effects for several relative positions between two new backhaul and access link antenna elements is performed. Two new antenna configurations for coupling reduction are tested and the simulated and measured results in terms of antenna radiation performances were compared and commented.
200

ON-DEMAND MEDIUM ACCESS IN HETEROGENEOUS MULTIHOP WIRELESS NETWORKS

JAIN, VIVEK 02 July 2007 (has links)
No description available.

Page generated in 0.0554 seconds