Essays about: "SECURITY OF WIRELESS AD HOC NETWORK"

Showing result 1 - 5 of 13 essays containing the words SECURITY OF WIRELESS AD HOC NETWORK.

  1. 1. Attribute-Based Encryption with dynamic attribute feature applied in Vehicular Ad Hoc Networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zijian Huang; [2022]
    Keywords : Ciphertext-Policy Attribute-based encryption; Dynamic Attributes; Network Security; Vehicular Ad Hoc Networks; Ciphertext-Policy Attributbaserad kryptering; dynamiska attribut; nätverkssäkerhet; fordonsbaserade ad hoc-nätverk;

    Abstract : The Vehicular Ad Hoc Network (VANET) is a promising approach for future Intelligent Transportation Systems (ITS) implementation. The data transmission is wireless primarily in the VANET system. The secure data transmission in VANET attracts research attention without any doubt. READ MORE

  2. 2. VePMAD: A Vehicular Platoon Management Anomaly Detection System : A Case Study of Car-following Mode, Middle Join and Exit Maneuvers

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Weaam Bayaa; [2021]
    Keywords : MDS; GMMHMM; PMP; Machine Learning; Bayesian information Criterion BIC ; Platoon Behavior Recognition; MDS; GMMHMM; PMP; Maskininlärnings; BIC; Plutonbeteendeigenkänning;

    Abstract : Vehicle communication using sensors and wireless channels plays an important role to allow exchanging information. Adding more components to allow exchanging more information with infrastructure enhanced the capabilities of vehicles and enabled the rise of Cooperative Intelligent Transport Systems (C-ITS). READ MORE

  3. 3. Comparison and Evaluation of Routing Mechanisms for Wi-Fi Mesh Networks

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Arda Yagci; [2011]
    Keywords : B.A.T.M.A.N; Performance; Routing; Wireless Mesh Networks;

    Abstract : Wireless mesh networks are communication networks possessing radio nodes with mesh organization structure. They are expected to be widely employed by personal, local, campus and metropolitan area applications. Most of the needed components for the deployment of WMNs; such as ad-hoc network routing protocols, wireless security protocols, IEEE 802. READ MORE

  4. 4. Analysis of Black Hole attack on MANETs Using different MANET routing protocol

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Shoaib Ur-Rehman; Irshan Ullah; [2010]
    Keywords : MANET; Black Hole; Routing Protocols.;

    Abstract : ABSTRACT Wireless networks are gaining popularity day by day, as users want wireless connectivity irrespective of their geographic position. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). READ MORE

  5. 5. Evaluating Kismet and NetStumbler as Network Security Tools & Solutions.

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Stephen Ekhator; [2010]
    Keywords : data; traffic; exploit; kismet; netsh;

    Abstract : ABSTRACT Despite advancement in computer firewalls and intrusion detection systems, wired and wireless networks are experiencing increasing threat to data theft and violations through personal and corporate computers and networks. The ubiquitous WiFi technology which makes it possible for an intruder to scan for data in the air, the use of crypto-analytic software and brute force application to lay bare encrypted messages has not made computers security and networks security safe more so any much easier for network security administrators to handle. READ MORE