966 resultados para VANet, gps, algoritmi distribuiti, V2V, 802.11p, I2V
Resumo:
En el contexto de las redes vehiculares, analizamos una aplicación de descarga de mapas, donde cada vehículo descarga datos de mapas relevantes según su posición. Entre las estrategias propuestas está la de utilizar las redes con infraestructura (I2V) además de las redes vehículo a vehículo (V2V). En este trabajo comparamos dos métodos de fragmentación de archivos, para el segmento I2V; los métodos son Random Sort Strategy (RSS) y Network Coding (NC). Encontramos que: cuando se utiliza NC la distribución de los diferentes fragmentos recibidos es independiente del tamaño del archivo. Cuando se utiliza RSS, la media y la desviación estándar dependen del tamaño del archivo. Estos resultados serán utilizados para el análisis del segmento V2V de la red.
Resumo:
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usability, robustness and accuracy of these intrusion detection techniques by applying them to eight distinct test scenarios. A correlation engine has also been introduced to maintain the false positives and false negatives at a manageable level. We also explore the process of selecting optimum thresholds for both detection techniques. For the purposes of our experiments, Snort-Wireless open source wireless intrusion detection system was extended to implement these new techniques and the correlation engine. Absence of any false negatives and low number of false positives in all eight test scenarios successfully demonstrated the effectiveness of the correlation engine and the accuracy of the detection techniques.
Resumo:
In this paper we propose an efficient authentication and integrity scheme to support DGPS corrections using the RTCM protocol, such that the identified vulnerabilities in DGPS are mitigated. The proposed scheme is based on the TESLA broadcast protocol with modifications that make it suitable for the bandwidth and processor constrained environment of marine DGPS.