Current Search: Power systems (x)
Pages
-
-
Title
-
Range assignment problem and security in wireless networks.
-
Creator
-
Pervaiz, Mohammad O., Florida Atlantic University, Cardei, Mihaela, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
This thesis considers two important issues in wireless networks. In first part, we address Energy-Efficient Range Assignment in Heterogeneous Wireless Sensor Networks (HRA) and in second part, we present a survey on security attacks in ad hoc wireless networks. We address the HRA problem by selecting the transmission range for each energy-constraint sensor node such that a multi-hop communication path exists between each sensor' node and a resource-rich supernode while maximum power required...
Show moreThis thesis considers two important issues in wireless networks. In first part, we address Energy-Efficient Range Assignment in Heterogeneous Wireless Sensor Networks (HRA) and in second part, we present a survey on security attacks in ad hoc wireless networks. We address the HRA problem by selecting the transmission range for each energy-constraint sensor node such that a multi-hop communication path exists between each sensor' node and a resource-rich supernode while maximum power required is minimized. This is the first work to address this problem. We propose several solutions: an Integer Programming approach, a distributed greedy protocol, and a minimum spanning tree protocol based on clustering. In second part of this thesis, a survey is carried out on security attacks on routing protocols in ad hoc wireless network. We examine and classify major routing attacks and present a comprehensive survey on the state-of-the-art mechanisms and solutions designed to defeat such attacks.
Show less
-
Date Issued
-
2006
-
PURL
-
http://purl.flvc.org/fcla/dt/13341
-
Subject Headings
-
Wireless communication systems--Security measures, Sensor networks, Wireless LANs--Security measures, Power resources--Efficiency
-
Format
-
Document (PDF)
-
-
Title
-
Energy cost evaluation of a secure 802.11 wireless transmission using NS-2.
-
Creator
-
Martins, Joao Marcelo Galindo., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
-
Abstract/Description
-
Mobile devices capable of transmitting and receiving data over an 802.11 network have become very common gadgets in our society. Most small mobile devices available in the market today come with integrated 802.11 radio. The extraordinary growth of this technology has also introduced several worries regarding the vulnerabilities that exist by transmitting data over the air. In order to minimize such problems, encryption algorithms were added as an option to be used with 802.11. Unfortunately,...
Show moreMobile devices capable of transmitting and receiving data over an 802.11 network have become very common gadgets in our society. Most small mobile devices available in the market today come with integrated 802.11 radio. The extraordinary growth of this technology has also introduced several worries regarding the vulnerabilities that exist by transmitting data over the air. In order to minimize such problems, encryption algorithms were added as an option to be used with 802.11. Unfortunately, the usage of encryption algorithms also causes a faster depletion of the energy resources available to a mobile device. Depending on the encryption algorithm implementation, a greater number of packets may be required in order to transmit the same amount of data that would be transmitted with less packets over a non-encrypted channel. The objective of this research is to analyze and evaluate the affects that the encryption algorithms used by wireless security protocols can have during data transmission over a wireless medium.
Show less
-
Date Issued
-
2005
-
PURL
-
http://purl.flvc.org/fcla/dt/13292
-
Subject Headings
-
Wireless communication systems--Security measurer--Evaluation, Coding theory--Evaluation, Computer architecture--Standards--Evaluation, IEEE 80211 (Standard), Mobile communication systems--Power supply--Evaluation
-
Format
-
Document (PDF)
Pages