Search for dissertations about: "routing security"

Showing result 1 - 5 of 10 swedish dissertations containing the words routing security.

  1. 1. Collaborative Network Security: Targeting Wide-area Routing and Edge-network Attacks

    Author : Rahul Gokulchand Hiran; Nahid Shahmehri; Niklas Carlsson; Olaf Maennel; Linköpings universitet; []
    Keywords : NATURAL SCIENCES; NATURVETENSKAP; NATURVETENSKAP; NATURAL SCIENCES; Collaboration; network security; BGP attacks; routing security; hijack;

    Abstract : To ensure that services can be delivered reliably and continuously over theInternet, it is important that both Internet routes and edge networks aresecured. However, the sophistication and distributed nature of many at-tacks that target wide-area routing and edge networks make it difficult foran individual network, user, or router to detect these attacks. READ MORE

  2. 2. IP telephony : Mobility and security

    Author : Jon-Olov Vatn; Björn Pehrson; William Arbaugh; KTH; []
    Keywords : ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Telekommunikation; Telekommunikation; Telecommunication; Telekommunikation;

    Abstract : With the introduction of IP based telephony services, the Internet has started to challenge the traditional PSTN networks as an infrastructure for providing real-time interactive services. This upcoming paradigm shift is not only driven by the desire to provide cost efficient solutions, but by basing the communication on IP we expect that the end-users will experience a greater set of attractive services over a single connection compared to what is provided by a PSTN today. READ MORE

  3. 3. Design, analysis and simultion for optical access and wide-area networks

    Author : Jiajia Chen; Lena Wosinska; Hussein Mouftah; KTH; []
    Keywords : ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; fiber access networks; passive optical network; dynamic bandwidth allocation; reliability; switched optical networks; switching node; optical circuit switching; optical packet switching; routing and wavelength assignment; security; Telecommunication; Telekommunikation;

    Abstract : Due to the tremendous growth of traffic volume caused by both exponential increase of number of Internet users and continual emergence of new bandwidth demanding applications, high capacity networks are required in order to satisfactorily handle the extremely large amount of traffic. Hence, optical fiber communication is the key technology for the network infrastructure. READ MORE

  4. 4. Identity and Anonymity in Ad Hoc Networks

    Author : Leonardo Augusto Martucci; Simone Fischer-Hübner; Tuomas Aura; Karlstads universitet; []
    Keywords : NATURAL SCIENCES; NATURVETENSKAP; NATURVETENSKAP; NATURAL SCIENCES; privacy; identity; anonymity; pseudonymity; Sybil attack; security; ad hoc; coputer networks; Datavetenskap; Computer Science;

    Abstract : In ad hoc networks every device is responsible for its own basic computer services, including packet routing, data forwarding, security, and privacy. Most of the protocols used in wired networks are not suitable for ad hoc networks, since they were designed for static environments with defined borders and highly specialized devices, such as routers, authentication servers, and firewalls. READ MORE

  5. 5. Reliable and deterministic network services

    Author : Florian-Daniel Otel; Chalmers University of Technology; []
    Keywords : queuing delay guarantees; service curve; constraint-based routing; TCP; network security; arrival curve; network failure recovery; traffic engineering; network calculus; traffic envelope;

    Abstract : In a post Internet bubble economic environment the obvious lack of any disruptive new technologies that could give new impetus to network growth (as, for example, experienced after the appearance of the Web) lead to a trivialization of network services: Aside grass-roots, semi-subterranean applications like file sharing, entertainment content swapping and on-line gaming, it can be argued that network services are presently used in a manner not very different than a decade ago. In this respect, one of the factors that can be identified as limiting further development is the perceived lack of guarantees with regard to network services. READ MORE