Search for dissertations about: "routing security"

Showing result 6 - 10 of 11 swedish dissertations containing the words routing security.

  1. 6. Towards Secure Synchronous Communication Architectures for Wireless Networks

    Author : Kasun Hewage; Thiemo Voigt; Shahid Raza; Matthias Hollick; Uppsala universitet; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Datagram Transport Layer Security; Synchronous Transmissions; Denial-of-service Attacks; Transmission Control Protocol; Communication Security; Time Synchronisation; Optical Wireless Communication; Networked Embedded Systems; Internet of Things; Electrical Engineering with Specialisation in Networked Embedded Systems; Elektroteknik med inriktning mot nätverksbaserade inbyggda system;

    Abstract : The vision behind the Internet of Things (IoT) revolves around creating a connected ecosystem where devices, people, and systems collaborate seamlessly, unlocking new possibilities, improving efficiency, and enhancing our daily lives. IoT encloses many device classes, including low-power wireless devices that rely on batteries or energy harvesting. READ MORE

  2. 7. Provisioning Strategies for Transparent Optical Networks Considering Transmission Quality, Security, and Energy Efficiency

    Author : Amornrat Jirattigalachote; Lena Wosinska; Paolo Monti; Biswanath Mukherjee; KTH; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; transparent optical networks; routing and wavelength assignment; physical-layer impairments; signal quality; differentiation of services; physical-layer attacks; power equalizers; Greedy Randomized Adaptive Search Procedure GRASP ; green networks; energy awareness; dedicated path protection; shared path protection; survivable WDM networks;

    Abstract : The continuous growth of traffic demand driven by the brisk increase in number of Internet users and emerging online services creates new challenges for communication networks. The latest advances in Wavelength Division Multiplexing (WDM) technology make it possible to build Transparent Optical Networks (TONs) which are expected to be able to satisfy this rapidly growing capacity demand. READ MORE

  3. 8. Response of Bolivian Altiplano Lakes to Seasonal and Annual Climate Variations

    Author : Ramiro Pillco; Avdelningen för Teknisk vattenresurslära; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; ENSO; terminal lake; bathymetry; lake level; water balance; lake routing; paleolakes; climate change; precipitation pattern; intermittent rivers.; Desaguadero River; Lake Titicaca; Lake Poopó;

    Abstract : The Bolivian Altiplano is situated between two mountain ranges, the western and eastern central Andes in South America. It has two major lakes, Lake Titicaca to the north, and Lake Poopó to the south, which both are important for the nature as well as for the living conditions on the Altiplano. The two lakes are the remnants of large paleolakes. READ MORE

  4. 9. Mitigating Distributed Denial-of-Service Attacks: Application-defense and Network-defense Methods

    Author : Zhang Fu; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; Distributed Denial-of-Service; Network Security; Distributed Computing; System Design;

    Abstract : Distributed Denial of Service (DDoS) attacks can be so powerful that theycan easily deplete the computing resources or bandwidth of the potential targets.Based on the types of the targets, DDoS attacks can be addressed in two levels:application-level and network-level. READ MORE

  5. 10. Multifaceted Defense Against Distributed Denial of Service Attacks: Prevention, Detection, Mitigation

    Author : Zhang Fu; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Data Streaming; Network Security; Overlay; Distributed Denial-of-Service; System Design; DDoS Detection; Distributed Computing;

    Abstract : Distributed Denial of Service (DDoS) attacks can be so powerful that they can easily deplete the computing resources or bandwidth of the potential targets, by flooding massive packets. Internet infrastructures and network applications, including social services and communication systems for emergency management, are under the threat of the DDoS problem. READ MORE