A partir de cette page vous pouvez :
Retourner au premier écran avec les étagères virtuelles... |
DĂ©tail de l'indexation
Doct/190
Doc/113
Doc/114
Doc/259
Doc/47
Doc/77
Doct/113
Doct/114
Doct/133
Doct/134
Doct/135
Doct/144
Doct/145
Doct/173
Doct/174
Doct/176
Doct/177
Doct/178
Doct/179
Doct/180
Doct/181
Doct/184
Doct/185
Doct/186
Doct/187
Doct/188
Doct/189
Doct/191
Doct/192
Doct/193
Doct/194
Doct/195
doct/196
Doct/198
Doct/199
Doct/200
Doct/201
Doct/202
Doct/203
Doct/204
Doct/205
Doct/206
Doct/207
Doct/208
Doct/209
Doct/210
Doct/222
Doct/226
Doct/237
Doct/238
Doct/239
Doct/240
Doct/241
Doct/242
Doct/243
Doct/245
Doct/246
Doct/247
Doct/248
Doct/251
Doct/252
Doct/253
Doct/254
Doct/255
Doct/256
Doct/257
Doct/258
Doct/260
Doct/261
Doct/262
Doct/263
Doct/264
Doct/265
Doct/266
Doct/267
Doct/268
Doct/269
Doct/270
Doct/271
Doct/272
Doct/273
Doct/274
Doct/275
Doct/276
Doct/277
Doct/278
Doct/279
Doct/280
Doct/281
Doct/282
Doct/283
Doct/284
Doct/285
Doct/286
Doct/287
Doct/288
Doct/289
Doct/290
Doct/291
Doct/292
Doct/293
Doct/294
Doct/295
Doct/296
Doct/297
Doct/298
Doct/299
Doct/300
Doct/302
Doct/303
Doct/304
Doct/305
Doct/306
Doct/307
Doct/308
Doct/309
Doct/310
Doct/311
Doct/312
Doct/313
Doct/314
Doct/315
Doct/316
Doct/317
Doct/318
Doct/319
Doct/320
Doct/321
Doct/322
Doct/323
Doct/324
Doct/325
Doct/326
Doct/327
Doct/328
Doct/329
Doct/330
Doct/331
Doct/332
Doct/333
Doct/334
Doct/335
Doct/336
Doct/337
Doct/338
Doct/339
Doct/34
Doct/340
Doct/341
Doct/342
Doct/343
Doct/344
Doct/345
Doct/346
Doct/347
Doct/348
doct/349
Doct/350
Doct/351
Doct/352
Doct/353
Doct/354
Doct/355
Doct/356
Doct/357
Doct/358
Doct/359
Doct/36
Doct/360
Doct/361
Doct/38
Doct/39
Doct/40
Doct/41
Doct/42
Doct/43
Doct/44
Doct/45
Doct/46
Doct/47
Doct/48
Doct/49
Doct/50
Doct/7
Doct/76
Doct/79
Doct/80
Doct/81
Doc/114
Doc/259
Doc/47
Doc/77
Doct/113
Doct/114
Doct/133
Doct/134
Doct/135
Doct/144
Doct/145
Doct/173
Doct/174
Doct/176
Doct/177
Doct/178
Doct/179
Doct/180
Doct/181
Doct/184
Doct/185
Doct/186
Doct/187
Doct/188
Doct/189
Doct/191
Doct/192
Doct/193
Doct/194
Doct/195
doct/196
Doct/198
Doct/199
Doct/200
Doct/201
Doct/202
Doct/203
Doct/204
Doct/205
Doct/206
Doct/207
Doct/208
Doct/209
Doct/210
Doct/222
Doct/226
Doct/237
Doct/238
Doct/239
Doct/240
Doct/241
Doct/242
Doct/243
Doct/245
Doct/246
Doct/247
Doct/248
Doct/251
Doct/252
Doct/253
Doct/254
Doct/255
Doct/256
Doct/257
Doct/258
Doct/260
Doct/261
Doct/262
Doct/263
Doct/264
Doct/265
Doct/266
Doct/267
Doct/268
Doct/269
Doct/270
Doct/271
Doct/272
Doct/273
Doct/274
Doct/275
Doct/276
Doct/277
Doct/278
Doct/279
Doct/280
Doct/281
Doct/282
Doct/283
Doct/284
Doct/285
Doct/286
Doct/287
Doct/288
Doct/289
Doct/290
Doct/291
Doct/292
Doct/293
Doct/294
Doct/295
Doct/296
Doct/297
Doct/298
Doct/299
Doct/300
Doct/302
Doct/303
Doct/304
Doct/305
Doct/306
Doct/307
Doct/308
Doct/309
Doct/310
Doct/311
Doct/312
Doct/313
Doct/314
Doct/315
Doct/316
Doct/317
Doct/318
Doct/319
Doct/320
Doct/321
Doct/322
Doct/323
Doct/324
Doct/325
Doct/326
Doct/327
Doct/328
Doct/329
Doct/330
Doct/331
Doct/332
Doct/333
Doct/334
Doct/335
Doct/336
Doct/337
Doct/338
Doct/339
Doct/34
Doct/340
Doct/341
Doct/342
Doct/343
Doct/344
Doct/345
Doct/346
Doct/347
Doct/348
doct/349
Doct/350
Doct/351
Doct/352
Doct/353
Doct/354
Doct/355
Doct/356
Doct/357
Doct/358
Doct/359
Doct/36
Doct/360
Doct/361
Doct/38
Doct/39
Doct/40
Doct/41
Doct/42
Doct/43
Doct/44
Doct/45
Doct/46
Doct/47
Doct/48
Doct/49
Doct/50
Doct/7
Doct/76
Doct/79
Doct/80
Doct/81
Ouvrages de la bibliothèque en indexation Doct/190
Faire une suggestion Affiner la rechercheMobility and Security in OLSR / Baayer Aziz
Titre : Mobility and Security in OLSR Type de document : thèse Auteurs : Baayer Aziz, Auteur Année de publication : 2013 Langues : Anglais (eng) Catégories : Informatique Mots-clés : Keywords: MANET Replay Attack Denial-of-Service (DoS) 802.11 MAC layer Network Allocation Vector (NAV) Security Countermeasure routing protocols, MANET performance, mobility metric, node mobility degree, mobility model. Index. décimale : Doct/190 Résumé : Abstract:
Mobile Ad hoc NETworks (MANETs), represent an emerging class of networks in which wireless mobile nodes operate independent of a backbone infrastructure. While hosts in traditional networks often rely on a designated router to forward data, every host in a MANET is required to route and forward data.
The network hosts, such as laptops and personal digital assistants, operate on constrained battery power, and limited CPU and storage capacity. These networks suffer: First from trivial Denial-of-Service (DoS) attacks such as replay attacks that perform attack at anytime and anywhere in the network by interception and retransmission of the valid signed messages. Consequently, the MANET performance is severally degraded by the overhead produced by the redundant valid messages. Second, from the unpredictable changes of topology network and link status due to the free move of mobile nodes in the network. Thus, the performance of a mobile ad hoc network is closely related to the capability of routing protocols to adapt themselves to the mobility caused by mobile nodes and also the capacity of the 802.11 MAC layer to limit replayed messages.
Our first achievement in this thesis is to propose a new approach for quantifying and measuring the mobility in the network in order to enhance the performance of the mobile ad hoc routing protocols. Each mobile node in the network can evaluate its mobility independently of any other node in the network as a link change rate with its neighboring nodes. Furthermore, a compromise must be made between the strength in term of safety and performance of the Protocol. Also, we treat the routing security by proposing a new solution of control messages signing in OLSR Routing Protocol.
Our second achievement in this thesis is to propose a new enhancement of timestamp discrepancy used to validate a signed message and consequently limiting the impact of a replay attack. Our proposed timestamp concept estimates approximately the time where the message is received and validated by the received node. This estimation is based on the existing parameters defined at the 802.11 MAC layer and it independent toward any routing protocols.
Mobility and Security in OLSR [thèse] / Baayer Aziz, Auteur . - 2013.
Langues : Anglais (eng)
Catégories : Informatique Mots-clés : Keywords: MANET Replay Attack Denial-of-Service (DoS) 802.11 MAC layer Network Allocation Vector (NAV) Security Countermeasure routing protocols, MANET performance, mobility metric, node mobility degree, mobility model. Index. décimale : Doct/190 Résumé : Abstract:
Mobile Ad hoc NETworks (MANETs), represent an emerging class of networks in which wireless mobile nodes operate independent of a backbone infrastructure. While hosts in traditional networks often rely on a designated router to forward data, every host in a MANET is required to route and forward data.
The network hosts, such as laptops and personal digital assistants, operate on constrained battery power, and limited CPU and storage capacity. These networks suffer: First from trivial Denial-of-Service (DoS) attacks such as replay attacks that perform attack at anytime and anywhere in the network by interception and retransmission of the valid signed messages. Consequently, the MANET performance is severally degraded by the overhead produced by the redundant valid messages. Second, from the unpredictable changes of topology network and link status due to the free move of mobile nodes in the network. Thus, the performance of a mobile ad hoc network is closely related to the capability of routing protocols to adapt themselves to the mobility caused by mobile nodes and also the capacity of the 802.11 MAC layer to limit replayed messages.
Our first achievement in this thesis is to propose a new approach for quantifying and measuring the mobility in the network in order to enhance the performance of the mobile ad hoc routing protocols. Each mobile node in the network can evaluate its mobility independently of any other node in the network as a link change rate with its neighboring nodes. Furthermore, a compromise must be made between the strength in term of safety and performance of the Protocol. Also, we treat the routing security by proposing a new solution of control messages signing in OLSR Routing Protocol.
Our second achievement in this thesis is to propose a new enhancement of timestamp discrepancy used to validate a signed message and consequently limiting the impact of a replay attack. Our proposed timestamp concept estimates approximately the time where the message is received and validated by the received node. This estimation is based on the existing parameters defined at the 802.11 MAC layer and it independent toward any routing protocols.
RĂ©servation
RĂ©server ce document
Exemplaires
Code barre Cote Support Localisation Section DisponibilitĂ© Doct/190 Doct/190 BAA Texte imprimé unité des thèses UFR Doctorat Disponible