To see the other types of publications on this topic, follow the link: Secure Networks.

Dissertations / Theses on the topic 'Secure Networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Secure Networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Tan, Hailun Computer Science &amp Engineering Faculty of Engineering UNSW. "Secure network programming in wireless sensor networks." Awarded By:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44835.

Full text
Abstract:
Network programming is one of the most important applications in Wireless Sensor Networks as It provides an efficient way to update program Images running on sensor nodes without physical access to them. Securing these updates, however, remains a challenging and important issue, given the open deployment environment of sensor nodes. Though several security schemes have been proposed to impose the authenticity and Integrity protection on network programming applications, they are either energy Inefficient as they tend to use digital signature or lacks the data confidentiality. In addition, due
APA, Harvard, Vancouver, ISO, and other styles
2

Yiu, Wai-Pun. "Secure overlay multicast /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20YIU.

Full text
Abstract:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004.<br>Includes bibliographical references (leaves 71-77). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
3

Paul, Greig. "Secure decentralised storage networks." Thesis, University of Strathclyde, 2017. http://digitool.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=28763.

Full text
Abstract:
In recent years, cloud-based computing and storage have become increasingly popular,as they remove the need for users and developers to buy or rent expensive dedicated hardware on an ongoing basis. This has led to the increasing centralisation of both services and storage, where users are reliant upon a small number of cloud-based providers to hold their data, and provide them with services they use. Recent events have shown that security breaches of centralised data stores can lead to significant quantities of personal data being revealed. This centralisation can also result in inconvenience
APA, Harvard, Vancouver, ISO, and other styles
4

Hia, Henry Erik. "Secure SNMP-Based Network Management in Low Bandwidth Networks." Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/32126.

Full text
Abstract:
This research focuses on developing a secure, SNMP-based network management system specifically tailored for deployment in internetworks that rely on low-bandwidth backbone networks. The network management system developed uses a two-level hierarchy of network management applications consisting of one top-level management application communicating with several mid-level management applications strategically distributed throughout the internetwork. Mid-level management applications conduct routine monitoring chores on behalf of the top-level management application and report results in a way
APA, Harvard, Vancouver, ISO, and other styles
5

Lim, Yu-Xi. "Secure Geolocation for Wireless Indoor Networks." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.

Full text
Abstract:
The objective of the research is to develop an accurate system for indoor location estimation using a secure architecture based on the IEEE 802.11 standard for infrastructure networks. Elements of this secure architecture include: server-oriented platform for greater trust and manageability; multiple wireless network parameters for improved accuracy; and Support Vector Regression (SVR) for accurate, high-resolution estimates. While these elements have been investigated individually in earlier research, none has combined them to a single security-oriented system. Thus this research investigates
APA, Harvard, Vancouver, ISO, and other styles
6

Bellardo, John Michael. "Secure and efficient wireless networks." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2006. http://wwwlib.umi.com/cr/ucsd/fullcit?p3220376.

Full text
Abstract:
Thesis (Ph. D.)--University of California, San Diego, 2006.<br>Title from first page of PDF file (viewed September 8, 2006). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references (p. 99-103).
APA, Harvard, Vancouver, ISO, and other styles
7

Friji, Hamdi. "Graph neural network-based intrusion detection for secure edge networks." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS030.

Full text
Abstract:
Face à l'escalade de la complexité et à la fréquence des cyberattaques, cette thèse propose des approches innovantes pour la détection d'intrusion dans les réseaux, en exploitant les capacités avancées des réseaux de neurones en graphe (Graph Neural Networks, GNNs) et de nouvelles représentations sous forme de graphes. Nous commençons par une analyse critique des jeux de données et des représentations de réseaux actuels, en abordant des questions clés sur leur efficacité. Nous introduisons une nouvelle représentation des flux de communication sous forme de graphes, offrant une plus grande robu
APA, Harvard, Vancouver, ISO, and other styles
8

Nawaz, Omer. "Secure Identification in Social Wireless Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4042.

Full text
Abstract:
The applications based on social networking have brought revolution towards social life and are continuously gaining popularity among the Internet users. Due to the advanced computational resources offered by the innovative hardware and nominal subscriber charges of network operators, most of the online social networks are transforming into the mobile domain by offering exciting applications and games exclusively designed for users on the go. Moreover, the mobile devices are considered more personal as compared to their desktop rivals, so there is a tendency among the mobile users to store sen
APA, Harvard, Vancouver, ISO, and other styles
9

Mirzadeh, Shahab. "Secure key management for personal networks." Thesis, University of Surrey, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.543916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mehta, Haripriya(Haripriya P. ). "Secure inference of quantized neural networks." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127663.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, May, 2020<br>Cataloged from the official PDF of thesis.<br>Includes bibliographical references (pages 63-65).<br>Running image recognition algorithms on medical datasets raises several privacy concerns. Hospitals may not have access to an image recognition model that a third party may have developed, and medical images are HIPAA protected and thus, cannot leave hospital servers. However, with secure neural network inference, hospitals can send encrypted medical images as input to
APA, Harvard, Vancouver, ISO, and other styles
11

Tin, Yiu Shing (Terry). "Secure key establishment for mobile networks." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16035/1/Yiu_Shing_Tin_Thesis.pdf.

Full text
Abstract:
Informal analysis of authenticated key establishment (ake) protocols was commonly accepted as the valid argument for their security in the past. Although it can provide some confidence in protocol correctness, experience has shown time and again that ake protocols are likely to contain flaws even after an informal analysis is completed. Therefore, it has become increasingly common to expect a formal analysis, and preferably a mathematical proof, of any published ake protocol in order to obtain increased confidence in its security. In this research we use an appropriate model for analy
APA, Harvard, Vancouver, ISO, and other styles
12

Tin, Yiu Shing (Terry). "Secure Key Establishment for Mobile Networks." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16035/.

Full text
Abstract:
Informal analysis of authenticated key establishment (ake) protocols was commonly accepted as the valid argument for their security in the past. Although it can provide some confidence in protocol correctness, experience has shown time and again that ake protocols are likely to contain flaws even after an informal analysis is completed. Therefore, it has become increasingly common to expect a formal analysis, and preferably a mathematical proof, of any published ake protocol in order to obtain increased confidence in its security. In this research we use an appropriate model for analy
APA, Harvard, Vancouver, ISO, and other styles
13

Rigby, Simon. "Key management in secure data networks." Thesis, Queensland University of Technology, 1987. https://eprints.qut.edu.au/36825/1/36825_Rigby_1987.pdf.

Full text
Abstract:
Key management is one of the major proolem areas in today's secure data communications networks. Many of the problems may be solved with a device known as a security module. The security module must be designed to meet the requirements of a key management system, and also be capable of preventing abuses of it. It has been discovered that rule-based programming languages are particularly suited to modelling the functionality of security modules and their role in cryptographic key management. In this work automated techniques for analyzing security systems which employ security modules are prese
APA, Harvard, Vancouver, ISO, and other styles
14

Chen, Lei Lee Chung-wei. "On secure media streaming with path diversity in MANETs." Auburn, Ala., 2007. http://repo.lib.auburn.edu/Send%2002-04-08/CHEN_LEI_20.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Sullivan, Mark P. "Secure remote network administration and power management." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FSullivan.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kim, Hyoungshick. "Complex network analysis for secure and robust communications." Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Dong, Renren. "Secure multiparty computation." Bowling Green, Ohio : Bowling Green State University, 2009. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=bgsu1241807339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Guerreiro, João. "Secure Web Services for Wireless Sensor Networks." Thesis, Uppsala University, Department of Information Technology, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-129474.

Full text
Abstract:
<p>Sensor deployments are becoming more and more common nowadays and the ways to access them are becoming more standardized. Indeed, users want to access sensor data via the Internet and without using some complex and unknown protocol; enter Web Services. By observing the typical system architecture for relaying sensor information to the web, we identified out of a large group of security issues a particular one. The issue in question is user privacy.</p><p>In this thesis we focus on hiding the activity of a user who queries a sensor deployment, from an attacker that can listen to communicatio
APA, Harvard, Vancouver, ISO, and other styles
19

Tang, Jin. "Mobile IPv4 Secure Access to Home Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11536.

Full text
Abstract:
With the fast development of wireless networks and devices, Mobile IP is expected to be used widely so that mobile users can access the Internet anywhere, anytime without interruption. However, some problems, such as firewall traversal and use of private IP addresses, restrict use of Mobile IP. The objective of this thesis is to design original schemes that can enable a mobile node at abroad to access its home network as well as the Internet securely and that can help Mobile IP to be used widely and commercially. Our solutions are secure, efficient, and scalable. They can be implemented and ma
APA, Harvard, Vancouver, ISO, and other styles
20

Karadag, Gokdeniz. "Secure Communication Channel Mechanisms For Isolated Networks." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12611436/index.pdf.

Full text
Abstract:
Current network security solutions are consisted of a single host, with network interfaces of the host connected to protected and external networks at the same time. This design ensures security by restricting traffic flow to a single point, where it can be examined and acted on by a set of rules. However, this design also has a flaw and a single point of failure, that being the vulnerabilities in the security device itself. An adversary would have unhindered access to protected networks if a vulnerability in the security device itself leads to its compromise. To prevent this possibility, hig
APA, Harvard, Vancouver, ISO, and other styles
21

Alhakami, Wajdi. "Secure MAC protocols for cognitive radio networks." Thesis, University of Bedfordshire, 2016. http://hdl.handle.net/10547/621831.

Full text
Abstract:
With the rapid increase in wireless devices, an effective improvement in the demand of efficient spectrum utilisation for gaining better connectivity is needed. Cognitive Radio (CR) is an emerging technology that exploits the inefficient utilisation of the unused spectrum dynamically. Since spectrum sharing is responsible for coordinating channels’ access for Cognitive Users (CUs), the Common Control Channel (CCC) is one of the existing methods used to exchange the control information between CUs. However, the unique characteristics and parameters of Cognitive Radio Networks (CRNs) present sev
APA, Harvard, Vancouver, ISO, and other styles
22

Okano, Stephen Hiroshi. "Optimizing secure communication standards for disadvantaged networks." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/61316.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 137-140).<br>We present methods for optimizing standardized cryptographic message protocols for use on disadvantaged network links. We first provide an assessment of current secure communication message packing standards and their relevance to disadvantaged networks. Then we offer methods to reduce message overhead in packing Cryptographic Message Syntax (CMS) structures by using ZLIB compression
APA, Harvard, Vancouver, ISO, and other styles
23

Alqallaf, Maha. "Software Defined Secure Ad Hoc Wireless Networks." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1464020851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Roy, Sankardas. "Secure data aggregation in wireless sensor networks." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3360.

Full text
Abstract:
Thesis (Ph.D.)--George Mason University, 2008.<br>Vita: p. 124. Thesis directors: Sushil Jajodia, Sanjeev Setia Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed Jan. 11, 2009). Includes bibliographical references (p. 120-123). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
25

Alzaid, Hani Mohammed. "Secure data aggregation in wireless sensor networks." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/41843/1/Hani_Alzaid_Thesis.pdf.

Full text
Abstract:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8
APA, Harvard, Vancouver, ISO, and other styles
26

Saleh, Mohammad. "Secure communications in wireless networks for biomedical EEG sensor networks applications." Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCA024/document.

Full text
Abstract:
Le cadre général de la thèse concerne les réseaux de capteurs et la sécurisation des communications sans fil pour la mise en œuvre de systèmes fiables de surveillance orienté santé. Plus précisément, ce travail de thèse présente un nouveau système de surveillance biomédical à base de réseau de capteurs sans fil, pour la mesure de l'activité électrique du cerveau. Un réseau de capteurs sans fil de type EEG (électroencéphalogramme) permet de surveiller les ondes cérébrales spontanées, y compris les ondes normales et anormales, des patients souffrant de différents types d'épilepsie. Un capteur sa
APA, Harvard, Vancouver, ISO, and other styles
27

Chim, Tat-wing, and 詹達榮. "Secure and privacy-preserving protocols for VANETs." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46587755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Koneru, Sindoora. "SECURE BANDWIDTH EFFICIENT MULTICASTING FOR WIDE AREA NETWORKS." OpenSIUC, 2010. https://opensiuc.lib.siu.edu/theses/170.

Full text
Abstract:
Recently an efficient multicasting protocol has been reported which uses a concept known as pseudo diameter to reduce the number of duplicate packets generated during multicasting in wide area networks (WANs). This work is superior to the Distance Vector Multicast Routing protocols (DVMRP) from the viewpoint of better bandwidth utilization. In this thesis security aspect of the above mentioned multicast protocol has been considered. Asymmetric key cryptography concept has been used effectively to design the protocol.
APA, Harvard, Vancouver, ISO, and other styles
29

Pandey, Santosh Agrawal Prathima. "Secure localization and node placement strategies for wireless networks." Auburn, Ala., 2007. http://hdl.handle.net/10415/1388.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Gin, Andrew. "Building a Secure Short Duration Transaction Network." Thesis, University of Canterbury. Computer Science and Software Engineering, 2007. http://hdl.handle.net/10092/1188.

Full text
Abstract:
The objective of this project was to design and test a secure IP-based architecture suitable for short duration transactions. This included the development of a prototype test-bed in which various operating scenarios (such as cryptographic options, various IP-based architectures and fault tolerance) were demonstrated. A solution based on SIP secured with TLS was tested on two IP based architectures. Total time, CPU time and heap usage was measured for each architecture and encryption scheme to examine the viability of such a solution. The results showed that the proposed solution stack was abl
APA, Harvard, Vancouver, ISO, and other styles
31

Aringunram, Ravichandran. "Secure communication services for distributed conference system." [Gainesville, Fla.]: University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Antolino, Rivas David. "Reputation systems and secure communication in vehicular networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/117532.

Full text
Abstract:
A thorough review of the state of the art will reveal that most VANET applications rely on Public Key Infrastructure (PKI), which uses user certificates managed by a Certification Authority (CA) to handle security. By doing so, they constrain the ad-hoc nature of the VANET imposing a frequent connection to the CA to retrieve the Certificate Revocation List (CRL) and requiring some degree of roadside infrastructure to achieve that connection. Other solutions propose the usage of group signatures where users organize in groups and elect a group manager. The group manager will need to ensure that
APA, Harvard, Vancouver, ISO, and other styles
33

Vogt, Harald. "Protocols for secure communication in wireless sensor networks /." Zürich : ETH, 2009. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=18174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Uluagac, Arif Selcuk. "A secure communication framework for wireless sensor networks." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34713.

Full text
Abstract:
Today, wireless sensor networks (WSNs) are no longer a nascent technology and future networks, especially Cyber-Physical Systems (CPS) will integrate more sensor-based systems into a variety of application scenarios. Typical application areas include medical, environmental, military, and commercial enterprises. Providing security to this diverse set of sensor-based applications is necessary for the healthy operations of the overall system because untrusted entities may target the proper functioning of applications and disturb the critical decision-making processes by injecting false informatio
APA, Harvard, Vancouver, ISO, and other styles
35

Ren, Yonglin. "Towards Secure and Trustworthy Wireless Ad hoc Networks." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22909.

Full text
Abstract:
Due to the attractive advantages of wireless communication technologies, wireless networking and mobile computing has developed expeditiously and gained ample prevalence. Thereby, many practical applications are being designed for the use of wireless ad hoc networks in both military and civilian scenarios. However, some security concerns have arisen from such networks, especially in that misbehaving nodes pose a major threat during the construction of a trusted network. Therefore, security is one of the key challenges in wireless ad hoc networks, requiring significant attention due to their ow
APA, Harvard, Vancouver, ISO, and other styles
36

Pinto, Pedro C. (Pedro Correia). "Intrinsically secure communication in large-scale wireless networks." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/60173.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 169-181).<br>The ability to exchange secret information is critical to many commercial, governmental, and military networks. Information-theoretic security - widely accepted as the strictest notion of security - relies on channel coding techniques that exploit the inherent randomness of the propagation channels to significantly strengthen the security of digital communications systems. Motivated b
APA, Harvard, Vancouver, ISO, and other styles
37

Kifayat, Kashif. "Group-based secure communication for wireless sensor networks." Thesis, Liverpool John Moores University, 2008. http://researchonline.ljmu.ac.uk/5899/.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are a newly developed networking technology consisting of multifunctional sensor nodes that are small in size and communicate over short distances. Continuous growth in the use of Wireless Sensor Networks (WSN) in sensitive applications such as military or hostile environments and also generally has resulted m a requirement for effective security mechanisms in the system design In order to protect the sensitive data and the sensor readings, shared keys should be used to encrypt the exchanged messages between communicating nodes. Many key management schemes have
APA, Harvard, Vancouver, ISO, and other styles
38

Biswas, Kamanashis. "Energy Efficient Secure Routing in Wireless Sensor Networks." Thesis, Griffith University, 2016. http://hdl.handle.net/10072/365658.

Full text
Abstract:
Wireless Sensor Networks (WSNs) can contain thousands of small, inexpensive sensors that are randomly deployed in open and harsh environments to collect data. The short lifespan of the battery-operated sensors and the hostile environments necessitate the development of energy ecient and secure protocols in sensor networks. Among the wide variety of network protocols, routing plays the most signicant role in energy consumption since 70% of the total energy is consumed for data transmission in WSNs. Therefore, it is necessary to design energy ecient routing schemes to conserve energy and prolong
APA, Harvard, Vancouver, ISO, and other styles
39

Petagna, Fabio. "Secure End-to-End Communications in Mobile Networks." Doctoral thesis, Universita degli studi di Salerno, 2011. http://hdl.handle.net/10556/1524.

Full text
Abstract:
2009 - 2010<br>Cellular communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send voice, video and text messages and new services continue to be added. The frequencies over which voice is transmitted are public, so voice encryption is necessary to avoid interception of the signal over the air. But once the signal reaches the operators Base Station (BS), it will be transmitted to the receiver over a wired or wireless mean. In either case, no protection is de
APA, Harvard, Vancouver, ISO, and other styles
40

Brahmadesam, Murali M. "Framework for scalable secure source specific multicast." [Gainesville, Fla.]: University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Benbrook, Jimmie Glen 1943. "A SYSTEM ANALYSIS OF A MULTILEVEL SECURE LOCAL AREA NETWORK (COMPUTER)." Thesis, The University of Arizona, 1986. http://hdl.handle.net/10150/275531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Singh, Aameek. "Secure Management of Networked Storage Services: Models and Techniques." Diss., Available online, Georgia Institute of Technology, 2007, 2007. http://etd.gatech.edu/theses/available/etd-04092007-004039/.

Full text
Abstract:
Thesis (Ph. D.)--Computing, Georgia Institute of Technology, 2008.<br>Liu, Ling, Committee Chair ; Aberer, Karl, Committee Member ; Ahamad, Mustaque, Committee Member ; Blough, Douglas, Committee Member ; Pu, Calton, Committee Member ; Voruganti, Kaladhar, Committee Member.
APA, Harvard, Vancouver, ISO, and other styles
43

Khabbazian, Majid. "Secure and efficient wireless ad hoc networking." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/2847.

Full text
Abstract:
Wireless ad hoc networks have been emerged to support applications, in which it is required/desired to have wireless ommunications among a variety of devices without relying on any infrastructure or central managements. In ad hoc networks, wireless devices, simply called nodes, have limited transmission range. Therefore, each node can directly communicate with only those within its transmission range and requires other nodes to act as routers in order to communicate with out-of-range estinations. One of the fundamental operations in ad hoc networks is broadcasting, where a node sends a messa
APA, Harvard, Vancouver, ISO, and other styles
44

Domingo, Prieto Marc. "Integrating secure mobile P2P systems and Wireless Sensor Networks." Doctoral thesis, Universitat Oberta de Catalunya, 2017. http://hdl.handle.net/10803/404534.

Full text
Abstract:
Aquesta tesi tracta de les diferents limitacions trobades a WSN per a habilitar-ne el desplegament en nous escenaris i facilitar la difusió de la informació obtinguda. A un nivell baix, ens centrem en el consum d’energia, mentre que, a un nivell més alt, ens focalitzem en la difusió i la seguretat de la informació. Reduïm el consum d’una mote individual en xarxes amb patrons de trànsit dinàmic mitjançant la definició d’una funció de planificació basada en el conegut controlador PID i allarguem la vida d’una WSN globalment distribuint equitativament el consum energètic de totes les motes, dismi
APA, Harvard, Vancouver, ISO, and other styles
45

Chen, Hejun. "A framework for secure mobility in wireless overlay networks." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/819.

Full text
Abstract:
Various wireless networks are widely deployed world wide. Current technologies employed in these networks vary widely in terms of bandwidths, latencies, frequencies, and media access methods. Most existing wireless network technologies can be divided into two categories: those that provide a low-bandwidth service over a wide geographic area, for example UMTS, and those that provide a high bandwidth service over a narrow geographic area, for example 802.11. Although it would be desirable to provide a high- bandwidth service over a wide coverage region to mobile users all the time, no single wir
APA, Harvard, Vancouver, ISO, and other styles
46

Li, Xu. "Secure and anonymous routing in wireless ad-hoc networks." Thesis, University of Ottawa (Canada), 2005. http://hdl.handle.net/10393/26955.

Full text
Abstract:
In wireless ad-hoc networks, malicious nodes can constitute a threat to the security and/or anonymity of the exchanged data between communicating nodes. While data encryption can protect traffic content, plain routing headers may reveal valuable information about end nodes and their relationship. The main purposes of this thesis are to study the feasibility of achieving anonymity in wireless ad-hoc networks, and to propose a secure distributed anonymous routing protocol (SDAR), which is similar to the onion routing concept used in wired networks. SDAR employs a special mechanism to establish t
APA, Harvard, Vancouver, ISO, and other styles
47

Granlund, Daniel. "Secure and scalable roaming support in heterogeneous access networks." Licentiate thesis, Luleå tekniska universitet, Datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-17883.

Full text
Abstract:
Mobility support for users connecting to the Internet is an increasing trend. Different types of access networks like WiFi, CDMA, and UMTS are available, creating a heterogeneous access network environment. In the Internet today, there are a number of providers of various sizes supporting different technologies. Moving between such operators different types of authentication methods are often used interrupting ongoing services. This, in combination with lacking roaming agreements makes mobility among them with maintained connectivity and uninterrupted services difficult or even impossible.This
APA, Harvard, Vancouver, ISO, and other styles
48

Bassi, German. "Secure Communication and Cooperation in Interference-Limited Wireless Networks." Thesis, CentraleSupélec, 2015. http://www.theses.fr/2015SUPL0018/document.

Full text
Abstract:
Dans cette thèse, nous menons une étude dans le cadre de la théorie de l'information sur deux questions importantes de la communication sans fil : l'amélioration du débit de données dans les réseaux avec interférence grâce à la coopération entre utilisateurs et le renforcement de la sécurité des transmissions à l'aide d'un signal de rétroaction.Dans la première partie de la thèse, nous nous concentrons sur le modèle le plus simple qui intègre à la fois l'interférence et la coopération, le canal à relais et interférence ou IRC (Interference Relay Channel). Notre objectif est de caractériser dan
APA, Harvard, Vancouver, ISO, and other styles
49

Chen, Changlong. "Robust and Secure Spectrum Sensing in Cognitive Radio Networks." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1383316543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Taban, Gelareh. "Secure and private data aggregation in wireless sensor networks." College Park, Md.: University of Maryland, 2008. http://hdl.handle.net/1903/8884.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2008.<br>Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!