To see the other types of publications on this topic, follow the link: Security of routing in MANETs.

Dissertations / Theses on the topic 'Security of routing in MANETs'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security of routing in MANETs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Almotiri, Sultan H. "Design and Evaluation of Security Mechanism for Routing in MANETs. Elliptic Curve Diffie-Hellman cryptography mechanism to secure Dynamic Source Routing protocol (DSR) in Mobile Ad Hoc Network (MANET)." Thesis, University of Bradford, 2013. http://hdl.handle.net/10454/5718.

Full text
Abstract:
Ensuring trustworthiness through mobile nodes is a serious issue. Indeed, securing the routing protocols in Mobile Ad Hoc Network (MANET) is of paramount importance. A key exchange cryptography technique is one such protocol. Trust relationship between mobile nodes is essential. Without it, security will be further threatened. The absence of infrastructure and a dynamic topology changing reduce the performance of security and trust in mobile networks. Current proposed security solutions cannot cope with eavesdroppers and misbehaving mobile nodes. Practically, designing a key exchange cryptogra
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Hang [Verfasser], Dieter [Akademischer Betreuer] Hogrefe, Dieter [Gutachter] Hogrefe, and Xiaoming [Gutachter] Fu. "A Security Aware Fuzzy Enhanced ACO Routing Protocol in MANETs / Hang Zhang ; Gutachter: Dieter Hogrefe, Xiaoming Fu ; Betreuer: Dieter Hogrefe." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2018. http://d-nb.info/1173975047/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Biswas, Kamanashis, and Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic
APA, Harvard, Vancouver, ISO, and other styles
4

Gironés, Quesada Luis. "A Routing Protocol for MANETs." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9513.

Full text
Abstract:
<p>In this master thesis there has been a description of what MANETs are and why they are so interesting. Because of its characteristics, the tradicional routing protocols for wired networks are not advisable for them. A specific routing protocol for MANETs is necessary. In this thesis the main groups of these protocols have been explained and some of the most commonly used of them were studied. We saw that each protocol is better in a specific environment. None of them are perfect for all the ranges of nodes mobility, traffic, number of nodes, etc. The two main groups of protocols studied
APA, Harvard, Vancouver, ISO, and other styles
5

CHENG, YI. "Security Mechanisms for Mobile Ad Hoc and Wireless Sensor Networks." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1212076752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Sanlin, and SanlinXu@yahoo com. "Mobility Metrics for Routing in MANETs." The Australian National University. Faculty of Engineering and Information Technology, 2007. http://thesis.anu.edu.au./public/adt-ANU20070621.212401.

Full text
Abstract:
A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without the need for base stations or any other pre–existing network infrastructure. In a peer-to-peer fashion, mobile nodes can communicate with each other by using wireless multihop communication. Due to its low cost, high flexibility, fast network establishment and self-reconfiguration, ad hoc networking has received much interest during the last ten years. However, without a fixed infrastructure, frequent path changes cause significant numbers of routing packets to discover new paths, leadi
APA, Harvard, Vancouver, ISO, and other styles
7

Xu, Sanlin. "Mobility metrics for routing in MANETs /." View thesis entry in Australian Digital Theses Program, 2007. http://thesis.anu.edu.au/public/adt-ANU20070621.212401/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shariat, Shahin. "Spectrum-aware routing in cognitive radio MANETs." Thesis, University of Surrey, 2018. http://epubs.surrey.ac.uk/845510/.

Full text
Abstract:
Cognitive Radio (CR) provides a promising means to the more efficient use of available spectrum. Routing in multi-hop wireless networks remains challenging and introduction of CR technology has created additional demands on routing within Cognitive Radio Mobile Ad-hoc Networks (CR-MANETs). To address these challenges, spectrum-aware routing protocols aiming at dynamic utilization of the so-called spectrum opportunities have been developed recently to improve end-to-end performance of the network for example in terms of Delay, Packet Loss and Throughput. One of the bottlenecks in the performanc
APA, Harvard, Vancouver, ISO, and other styles
9

Jazyah, Yahia Hasan. "Modified location aided routing protocol for UWB MANETs." Thesis, University of Salford, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.543508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Parthasarathy, Madhusoodan. "Routing in the presence of groups in MANETs." Pullman, Wash. : Washington State University, 2009. http://www.dissertations.wsu.edu/Thesis/Spring2009/m_parthasarathy_020409.pdf.

Full text
Abstract:
Thesis (M.S. in computer science)--Washington State University, May 2009.<br>Title from PDF title page (viewed on July 21, 2009). "School of Electrical Engineering and Computer Science." Includes bibliographical references (p. 113-117).
APA, Harvard, Vancouver, ISO, and other styles
11

Hurley-Smith, Darren. "Virtual closed networks : optimised security for autonomous MANETs." Thesis, University of Greenwich, 2015. http://gala.gre.ac.uk/20953/.

Full text
Abstract:
Autonomous mobile platforms (such as Unmanned Aerial Vehicles, also known as UAVs) have become a popular tool in exploration, disaster management, civil-engineering, agricultural and military scenarios. Their endurance, low-cost, high mobility and ability to reduce human involvement in prolonged or hazardous activities have proven attractive to both commercial and military sectors. In such domains, security is required to protect the data, functionality and performance of the network, making it a vital consideration when developing such systems. Systems capable of independent action, following
APA, Harvard, Vancouver, ISO, and other styles
12

Tachtatzis, Christos. "Load distribution and energy awareness in manets using multipath routing." Thesis, University of Strathclyde, 2008. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=21972.

Full text
Abstract:
Wireless ad-hoc networks are characterised by lack of infrastructure and frequent topological changes. Traditional routing protocols seek only single paths to the desired destinations, while multipath routing obtains multiple paths for only marginal additional overhead. This work argues that multipath routing is advantageous, even allowing for the additional overheads, because of the improved network load distribution. The merits of multipath routing are shown through extensive performance evaluation considering packet delivery ratio, average end-to-end delay and routing efficiency, for both m
APA, Harvard, Vancouver, ISO, and other styles
13

Al-Qassas, Raad S. "On the performance of traffic-aware reactive routing in MANETs." Thesis, University of Glasgow, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.443330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Abbas, Sohail. "A layered security approach for cooperation enforcement in MANETs." Thesis, Liverpool John Moores University, 2011. http://researchonline.ljmu.ac.uk/6091/.

Full text
Abstract:
In fully self-organized MANETs, nodes are naturally reluctant to spend their precious resources forwarding other nodes' packets and are therefore liable to exhibit selfish or sometimes malicious behaviour. This selfishness could potentially lead to network partitioning and network performance degradation. Cooperation enforcement schemes, such as reputation and trust based schemes have been proposed to counteract the issue of selfishness. The sole purpose of these schemes is to ensure selfish nodes bear the consequences of their bad actions. However, malicious nodes can exploit mobility and fre
APA, Harvard, Vancouver, ISO, and other styles
15

Said, Aicha. "Routing protocols performance and intelligent quality of service applied to MANETs." Thesis, Sheffield Hallam University, 2008. http://shura.shu.ac.uk/20310/.

Full text
Abstract:
The wireless revolution prompted by the success of IEEE 802.11 standard has pressed the research community to deal with requirements of new wireless networks. In particular, wireless ad-hoc networks which are, specifically, a collection of wireless mobile nodes dynamically forming a temporary network without the use of any preexisting infrastructure or centralised administration. Routing protocols used in ad-hoc networks must automatically and continually adjust to environments. Most emerging network services require specialised Quality-of-Service (QoS) functionalities that cannot be provided
APA, Harvard, Vancouver, ISO, and other styles
16

Vaddhireddy, Jyothirmye. "A Novel Swarm Intelligence based IWD Algorithm for Routing in MANETs." University of Toledo / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1321589580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Lu, Bin. "Quality of Service (QoS) security in mobile ad hoc networks." Texas A&M University, 2005. http://hdl.handle.net/1969.1/4295.

Full text
Abstract:
With the rapid proliferation of wireless networks and mobile computing applications, Quality of Service (QoS) for mobile ad hoc networks (MANETs) has received increased attention. Security is a critical aspect of QoS provisioning in the MANET environment. Without protection from a security mechanism, attacks on QoS signaling system could result in QoS routing malfunction, interference of resource reservation, or even failure of QoS provision. Due to the characteristics of the MANETs, such as rapid topology change and limited communication and computation capacity, the conventional security mea
APA, Harvard, Vancouver, ISO, and other styles
18

Guerrero, Zapata Manel. "Securing and enhancing routing protocols for mobile ad hoc networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2006. http://hdl.handle.net/10803/5994.

Full text
Abstract:
1. CONTEXTO<br/><br/>1.1. MANET<br/><br/>MANET (Mobile and Ad hoc NETworks) (Redes móviles sin cables) son redes formadas por nodos móviles. Se comunican sin cables i lo hacen de manera 'ad hoc'. En este tipo de redes, los protocolos de enrutamiento tienen que ser diferentes de los utilizados en redes fijas.<br/><br/>Hoy en día, existen protocolos de enrutamiento capaces de operar en este tipo de redes. No obstante, son completamente inseguras y confían en que los nodos no actuarán de manera malintencionada. En una red donde no se puede contar con la presencia de servidores centrales, se neces
APA, Harvard, Vancouver, ISO, and other styles
19

Kioumourtzis, Georgios A. "Simulation and evaluation of routing protocols for Mobile Ad Hoc Networks (MANETs)." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FKioumourtzis.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering and M.S. in Computer Science)--Naval Postgraduate School, September 2005.<br>Thesis Advisor(s): Gilbert M. Lundy, Rex Buddenberg. Includes bibliographical references (p.133-135). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
20

Ur-Rehman, Shoaib, and Irshan Ullah. "Analysis of Black Hole attack on MANETs Using different MANET routing protocol." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1151.

Full text
Abstract:
ABSTRACT Wireless networks are gaining popularity day by day, as users want wireless connectivity irrespective of their geographic position. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. In order to provide secure communi
APA, Harvard, Vancouver, ISO, and other styles
21

ULLAH, IRSHAD, and SHOAIB UR REHMAN. "Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2505.

Full text
Abstract:
Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. The node presents itself in such a way to the node that it can attack other nodes and networks knowing that it has the shortest path. MANETs must have a secu
APA, Harvard, Vancouver, ISO, and other styles
22

Osathanunkul, Kitisak. "A cross-layer and multi-metric routing decision making framework for MANETs." Thesis, University of Manchester, 2013. https://www.research.manchester.ac.uk/portal/en/theses/a-crosslayer-and-multimetric-routing-decision-making-framework-for-manets(747a6389-d354-4afc-8810-c4e781662107).html.

Full text
Abstract:
Mobile Ad hoc Networks (MANETs) are re-emerging as a popular networking facility for wireless device users. A growing number of diversified applications are now accessible via wireless devices. The different applications may have different Quality of Service (QoS) requirements, which may better be satisfied by using different routing methods or metric types. Existing ad hoc network routing solutions do not consider various application-level requirements when making a routing decision. They typically make routing decisions based upon limited information acquired at the network layer. Most of th
APA, Harvard, Vancouver, ISO, and other styles
23

Chen, Lei Lee Chung-wei. "On secure media streaming with path diversity in MANETs." Auburn, Ala., 2007. http://repo.lib.auburn.edu/Send%2002-04-08/CHEN_LEI_20.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Noureddine, Hadi. "Position-based routing and MAC protocols for wireless ad-hoc networks." Thesis, Brunel University, 2011. http://bura.brunel.ac.uk/handle/2438/5834.

Full text
Abstract:
This thesis presents the Forecasting Routing Technique (FORTEL), a routing protocol for Mobile Ad-Hoc Networks (MANETs) based on the nodes' Location Information. FORTEL stores the nodes' location information in the Location Table (LT) in order to construct routes between the source and the destination nodes. FORTEL follows the source routing strategy, which has rarely been applied in position-based routing. According to the source routing strategy, the end-to-end route is attached to the packet, therefore, the processing cost, in regards to the intermediate nodes that simply relay the packet a
APA, Harvard, Vancouver, ISO, and other styles
25

Kiourktsidis, Ilias. "Flexible cross layer design for improved quality of service in MANETs." Thesis, Brunel University, 2011. http://bura.brunel.ac.uk/handle/2438/7464.

Full text
Abstract:
Mobile Ad hoc Networks (MANETs) are becoming increasingly important because of their unique characteristics of connectivity. Several delay sensitive applications are starting to appear in these kinds of networks. Therefore, an issue in concern is to guarantee Quality of Service (QoS) in such constantly changing communication environment. The classical QoS aware solutions that have been used till now in the wired and infrastructure wireless networks are unable to achieve the necessary performance in the MANETs. The specialized protocols designed for multihop ad hoc networks offer basic connecti
APA, Harvard, Vancouver, ISO, and other styles
26

Tamrakar, Sandeep. "Study of TCP friendliness of CEAS routing system in comparison with Distance Vector Routing and Link State Routing." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9043.

Full text
Abstract:
<p>With the continuous development of the Internet technologies new routing requirements have surfaced. In response, several adaptive, stochastic routing algorithms have been purposed. The Cross Entropy Ant System (CEAS) is an adaptive, robust and distributed routing and management system based on the swarm intelligence. Several prototype implementations and enhancements have been made on this system, however the level of TCP friendliness the CEAS may provide is yet an important issue. In order to investigate the level of TCP friendliness, the behavior of the CEAS system during different net
APA, Harvard, Vancouver, ISO, and other styles
27

Hanashi, Abdalla Musbah Omar. "Enhanced Probabilistic Broadcasting Scheme for Routing in MANETs. An investigation in the design analysis and performance evaluation of an enhanced probabilistic broadcasting scheme for on-demand routing protocols in mobile ad-hoc networks." Thesis, University of Bradford, 2009. http://hdl.handle.net/10454/4321.

Full text
Abstract:
Broadcasting is an essential and effective data propagation mechanism with several important applications, such as route discovery, address resolution and many other network services. Though data broadcasting has many advantages, it can also cause a high degree of contention, collision and congestion, leading to what is known as 'broadcast storm problems'. Broadcasting has traditionally been based on the flooding protocol, which simply overflows the network with a high number of rebroadcast messages until these reach all the network nodes. A good probabilistic broadcast protocol can achieve hi
APA, Harvard, Vancouver, ISO, and other styles
28

Colbert, Garry M. "Getting MANETs to communicate efficiently: an analysis of mobile Ad Hoc network routing schemes in tactical communications." Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34646.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Warfighting based on Commanders Intent and Mission Tactics will remain the foundation of command and control, but the information structure that supports Marine Corps tactical units will continuously undergo changes based on developments in information technology. Mobile Ad Hoc Networking is one of the information technology developments that the Marine Corps is currently studying. Mobile Ad Hoc Networks (MANETs) are infrastructureless, highly mobile communications and their multi-hop routing capabilities have the potential to reliably
APA, Harvard, Vancouver, ISO, and other styles
29

Darwish, Salaheddin. "A simulation-based methodology for the assessment of server-based security architectures for mobile ad hoc networks (MANETs)." Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/13823.

Full text
Abstract:
A Mobile Ad hoc Network (MANET) is typically a set of wireless mobile nodes enabled to communicate dynamically in a multi-hop manner without any pre-existing network infrastructure. MANETs have several unique characteristics in contrast to other typical networks, such as dynamic topology, intermittent connectivity, limited resources, and lack of physical security. Securing MANETs is a critical issue as these are vulnerable to many different attacks and failures and have no clear line of defence. To develop effective security services in MANETs, it is important to consider an appropriate trust
APA, Harvard, Vancouver, ISO, and other styles
30

Leite, Luis Felipe Formiga. "Melhorando o desempenho do ZRP em um cenário emergencial usando redes AD HOC." Universidade Federal de Pernambuco, 2014. https://repositorio.ufpe.br/handle/123456789/13891.

Full text
Abstract:
Submitted by Matheus Alves Bulhoes (matheus.bulhoes@ufpe.br) on 2015-05-12T14:36:25Z No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Dissertação_Luis_Final.pdf: 2794061 bytes, checksum: ca38ae8cdb5e52a8b28f84163a66bc6b (MD5)<br>Made available in DSpace on 2015-05-12T14:36:25Z (GMT). No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Dissertação_Luis_Final.pdf: 2794061 bytes, checksum: ca38ae8cdb5e52a8b28f84163a66bc6b (MD5) Previous issue date: 2014-08-29<br>Redes emergenciais são redes móveis utilizad
APA, Harvard, Vancouver, ISO, and other styles
31

Elazhari, Mohamed S. "Performance Analysis of New Algorithms for Routing in Mobile Ad-hoc Networks. The development and performance evaluation of some new routing algorithms for mobile ad-hoc networks based on the concepts of angle direction and node density." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4914.

Full text
Abstract:
Mobile Ad hoc Networks (MANETs) are of great interest to researchers and have become very popular in the last few years. One of the great challenges is to provide a routing protocol that is capable of offering the shortest and most reliable path in a MANET in which users are moving continuously and have no base station to be used as a reference for their position. This thesis proposes some new routing protocols based on the angles (directions) of the adjacent mobile nodes and also the node density. In choosing the next node in forming a route, the neighbour node with the closest heading angle
APA, Harvard, Vancouver, ISO, and other styles
32

Fernandes, Ramon Costi. "A security-aware routing approach for networks-on-chip." Pontif?cia Universidade Cat?lica do Rio Grande do Sul, 2017. http://tede2.pucrs.br/tede2/handle/tede/7431.

Full text
Abstract:
Submitted by Caroline Xavier (caroline.xavier@pucrs.br) on 2017-06-30T13:50:31Z No. of bitstreams: 1 DIS_RAMON_COSTI_FERNANDES_COMPLETO.pdf: 4552821 bytes, checksum: 31f78eb686d2c3126cf0abf4584de386 (MD5)<br>Made available in DSpace on 2017-06-30T13:50:31Z (GMT). No. of bitstreams: 1 DIS_RAMON_COSTI_FERNANDES_COMPLETO.pdf: 4552821 bytes, checksum: 31f78eb686d2c3126cf0abf4584de386 (MD5) Previous issue date: 2017-03-13<br>A pr?xima gera??o de sistemas multiprocessados intra-chip, do ingl?s MultiProcessor Systems-on-Chip (MPSoC), comportar? centenas de elementos de processamento num ?nico chi
APA, Harvard, Vancouver, ISO, and other styles
33

Goold, Jeremy C. "Improving Routing Security Using a Decentralized Public Key Distribution Algorithm." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd797.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Hiran, Rahul Gokulchand. "Collaborative Network Security: Targeting Wide-area Routing and Edge-network Attacks." Doctoral thesis, Linköpings universitet, Databas och informationsteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-131959.

Full text
Abstract:
To ensure that services can be delivered reliably and continuously over theInternet, it is important that both Internet routes and edge networks aresecured. However, the sophistication and distributed nature of many at-tacks that target wide-area routing and edge networks make it difficult foran individual network, user, or router to detect these attacks. Thereforecollaboration is important. Although the benefits of collaboration betweendifferent network entities have been demonstrated, many open questionsstill remain, including how to best design distributed scalable mechanismsto mitigate att
APA, Harvard, Vancouver, ISO, and other styles
35

Chalabianloo, Niaz. "Routing And Security In Wireless Sensor Networks, An Experimental Evaluation Of A Proposed Trust Based Routing Protocol." Master's thesis, METU, 2013. http://etd.lib.metu.edu.tr/upload/12615749/index.pdf.

Full text
Abstract:
Satisfactory results obtained from sensor networks and the ongoing development in electronics and wireless communications have led to an impressive boost in the number of applications based on WSNs. Along with the growth in popularity of WSNs, previously implemented solutions need further improvements and new challenges arise which need to be solved. One of the main concerns regarding WSNs is the existence of security threats against their routing operations. Likelihood of security attacks in a structure suffering from resource constraints makes it an important task to choose proper security
APA, Harvard, Vancouver, ISO, and other styles
36

Lychev, Robert D. "Evaluating security-enhanced interdomain routing protocols in full and partial deployment." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52325.

Full text
Abstract:
The Internet consists of over 50 thousand smaller networks, called Autonomous Systems (ASes) (e.g., AT&T, Sprint, Google), that use the Border Gateway Protocol (BGP) to figure out how to reach each other. One way or another, we all rely on BGP because it is what glues the Internet together, but despite its crucial role, BGP remains vulnerable to propagation of bogus routing information due to malicious attacks or unintentional misconfigurations. The United States Department of Homeland Security (DHS) views BGP security as part of its national strategy for securing the Internet, and there is a
APA, Harvard, Vancouver, ISO, and other styles
37

Deccio, Casey T. "Network-layer Selective Security." Diss., CLICK HERE for online access, 2004. http://contentdm.lib.byu.edu/ETD/image/etd560.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Akinola, Azeez Paul, and zhang chong. "Tunnel comparison between Generic Routing Encapsulation (GRE) and IP Security (IPSec)." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17610.

Full text
Abstract:
Since the introduction of networks, they have been used amongst home users, companies and organizations and most damage on the network is due to inappropriate security configurations. To secure networks, a protocol suite can be used to encrypt and authenticate all IP packets of a session. Therefore, this report will include the advantages and possible solution of some techniques used to offer increased network security such as scalability and data confidentiality. Captures of traffic sent using the two security techniques, IPSec/VPN and GRE-Tunnel will be monitored. The objective behind this p
APA, Harvard, Vancouver, ISO, and other styles
39

Zhao, Li. "Enhance communication security in wireless ad hoc networks through multipath routing." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Dissertations/Summer2007/L_Zhao_072407.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Kulkarni, Aditya. "Study on Routing Protocols for the Security of Wireless Sensor Networks." International Foundation for Telemetering, 2013. http://hdl.handle.net/10150/579643.

Full text
Abstract:
ITC/USA 2013 Conference Proceedings / The Forty-Ninth Annual International Telemetering Conference and Technical Exhibition / October 21-24, 2013 / Bally's Hotel & Convention Center, Las Vegas, NV<br>This paper describes some of the security challenges faced by Wireless Sensor Networks (WSN). A classification and analysis of prominent attacks on the routing protocols of WSN is provided, along with a review of recent developments in the field to help mitigate the impact of these attacks.
APA, Harvard, Vancouver, ISO, and other styles
41

Zeng, Kai. "Opportunistic Routing in Multihop Wireless Networks: Capacity, Energy Efficiency, and Security." Worcester, Mass. : Worcester Polytechnic Institute, 2008. http://www.wpi.edu/Pubs/ETD/Available/etd-072408-231438/.

Full text
Abstract:
Dissertation (Ph.D.)--Worcester Polytechnic Institute.<br>Keywords: opportunistic routing; security; energy efficiency; medium access control; capacity; throughput. Includes bibliographical references (leaves 192-201).
APA, Harvard, Vancouver, ISO, and other styles
42

Pirzada, Asad Amir. "Trust-based routing in pure ad-hoc wireless networks." University of Western Australia. School of Computer Science and Software Engineering, 2007. http://theses.library.uwa.edu.au/adt-WU2007.0193.

Full text
Abstract:
[Truncated abstract] An ad-hoc network of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. Due to its peculiar establishment and operational properties it is also often termed an infrastructure-less, self-organised, or spontaneous network. In order to extend the communication range of the nodes, beyond a single hop, specially configured routing protocols are used. The unique feature of these protocols is their ability to form routes in spite of a dynamic topology. For effective functioning of the network it is essential that the network nod
APA, Harvard, Vancouver, ISO, and other styles
43

Stevanato, Alberto <1989&gt. "Protect-to-Prevent: Security of Routing Mechanisms in Peer-to-Peer Networks." Master's Degree Thesis, Università Ca' Foscari Venezia, 2013. http://hdl.handle.net/10579/3473.

Full text
Abstract:
In the last twenty years P2P technology has begun to spread, mainly because of the increasing need of sharing a large quantity of files. Critical operations such as the exchanging of messages or the search of a file are governed by specific routing mechanisms, that depend on the different P2P structures which are involved. In this thesis we will first present different types of routing protocols, and we will highlight the structure and the mechanisms by which they carry out the update of the contacts and the transfer of files over a network. We will then present some of the weaknesses of whic
APA, Harvard, Vancouver, ISO, and other styles
44

Fredriksson, Tony, and Niklas Ljungberg. "Security in low power wireless networks : Evaluating and mitigating routing attacks in a reactive, on demand ad-hoc routing protocol." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-145362.

Full text
Abstract:
Using low energy devices to communicate over the air presents many challenges to reach security as resources in the world of Internet Of Things (IoT) are limited. Any extra overhead of computing or radio transmissions that extra security might add affects cost of both increased computing time and energy consumption which are all scarce resources in IoT. This thesis details the current state of security mechanisms built into the commercially available protocol stacks Zigbee, Z-wave, and Bluetooth Low Energy, and collects implemented and proposed solutions to common ways of attacking systems bui
APA, Harvard, Vancouver, ISO, and other styles
45

Salehi, Mahmood. "Trust Management and Security Analysis of Opportunistic Routing Protocols in Multihop Wireless Networks." Thesis, Université d'Ottawa / University of Ottawa, 2017. http://hdl.handle.net/10393/35761.

Full text
Abstract:
Routing in wireless sensor, mobile ad-hoc, and vehicular networks is a crucial operation having significantly attracted scientists' attention during the past years. Opportunistic routing, however, is a novel and promising approach, which is still an ongoing research paradigm. The purpose of opportunistic routing protocols is to increase the reliability of delivering data packets to their destination by utilizing the broadcast nature of wireless networks and selecting a set of nodes, instead of only one, as potential next-hop candidates. Apart from the reliability, security and trustworthiness
APA, Harvard, Vancouver, ISO, and other styles
46

Vilela, João Paulo. "Reputation-based security for optimized link state routing in wireless ad-hoc networks." Master's thesis, Porto : [s. n.], 2006. http://hdl.handle.net/10216/64164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Vilela, João Paulo. "Reputation-based security for optimized link state routing in wireless ad-hoc networks." Dissertação, Porto : [s. n.], 2006. http://catalogo.up.pt/F?func=find-b&local_base=FCB01&find_code=SYS&request=000101377.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Chen, Xiangqian. "Defense Against Node Compromise in Sensor Network Security." FIU Digital Commons, 2007. http://digitalcommons.fiu.edu/etd/7.

Full text
Abstract:
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deploy
APA, Harvard, Vancouver, ISO, and other styles
49

Mehendale, Hrushikesh Sanjay. "Lifenet: a flexible ad hoc networking solution for transient environments." Thesis, Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/42781.

Full text
Abstract:
In the wake of major disasters, the failure of existing communications infrastructure and the subsequent lack of an effective communication solution results in increased risks, inefficiencies, damage and casualties. Currently available options such as satellite communication are expensive and have limited functionality. A robust communication solution should be affordable, easy to deploy, require little infrastructure, consume little power and facilitate Internet access. Researchers have long proposed the use of ad hoc wireless networks for such scenarios. However such networks have so far fa
APA, Harvard, Vancouver, ISO, and other styles
50

Gossain, Hrishikesh. "Power Control and Spatial Reusability in Mobile Ad Hoc Networks." University of Cincinnati / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1115308673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!