Search Results

Secret Key Agreement without Public-Key Cryptography

Description: Secure communication is the primary challenge in today's information network. In this project an efficient secret key agreement protocol is described and analyzed along with the other existing protocols. We focus primarily on Leighton and Micali's secret-key agreement without the use of public-key encryption techniques. The Leighton-Micali protocol is extremely efficient when implemented in software and has significant advantages over existing systems like Kerberos. In this method the secret ke… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: August 2003
Creator: Surapaneni, Smitha
Partner: UNT Libraries
open access

The Feasibility of Multicasting in RMI

Description: Due to the growing need of the Internet and networking technologies, simple, powerful, easily maintained distributed applications needed to be developed. These kinds of applications can benefit greatly from distributed computing concepts. Despite its powerful mechanisms, Jini has yet to be accepted in mainstream Java development. Until that happens, we need to find better Remote Method Invocation (RMI) solutions. Feasibility of implementation of Multicasting in RMI is worked in this paper. Mult… more
Date: May 2003
Creator: Ujjinihavildar, Vinay
Partner: UNT Libraries

A Multi-Variate Analysis of SMTP Paths and Relays to Restrict Spam and Phishing Attacks in Emails

Description: The classifier discussed in this thesis considers the path traversed by an email (instead of its content) and reputation of the relays, features inaccessible to spammers. Groups of spammers and individual behaviors of a spammer in a given domain were analyzed to yield association patterns, which were then used to identify similar spammers. Unsolicited and phishing emails were successfully isolated from legitimate emails, using analysis results. Spammers and phishers are also categorized into se… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: December 2006
Creator: Palla, Srikanth
Partner: UNT Libraries
open access

System and Methods for Detecting Unwanted Voice Calls

Description: Voice over IP (VoIP) is a key enabling technology for the migration of circuit-switched PSTN architectures to packet-based IP networks. However, this migration is successful only if the present problems in IP networks are addressed before deploying VoIP infrastructure on a large scale. One of the important issues that the present VoIP networks face is the problem of unwanted calls commonly referred to as SPIT (spam over Internet telephony). Mostly, these SPIT calls are from unknown callers who … more
Date: December 2007
Creator: Kolan, Prakash
Partner: UNT Libraries

Automated Defense Against Worm Propagation.

Description: Worms have caused significant destruction over the last few years. Network security elements such as firewalls, IDS, etc have been ineffective against worms. Some worms are so fast that a manual intervention is not possible. This brings in the need for a stronger security architecture which can automatically react to stop worm propagation. The method has to be signature independent so that it can stop new worms. In this thesis, an automated defense system (ADS) is developed to automate defense… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: December 2005
Creator: Patwardhan, Sudeep
Partner: UNT Libraries
open access

The Design and Implementation of an Intelligent Agent-Based File System

Description: As bandwidth constraints on LAN/WAN environments decrease, the demand for distributed services will continue to increase. In particular, the proliferation of user-level applications requiring high-capacity distributed file storage systems will demand that such services be universally available. At the same time, the advent of high-speed networks have made the deployment of application and communication solutions based upon an Intelligent Mobile Agent (IMA) framework practical. Agents have prove… more
Date: May 2000
Creator: Hopper, S. Andrew
Partner: UNT Libraries
open access

Mobile agent security through multi-agent cryptographic protocols.

Description: An increasingly promising and widespread topic of research in distributed computing is the mobile agent paradigm: code travelling and performing computations on remote hosts in an autonomous manner. One of the biggest challenges faced by this new paradigm is security. The issue of protecting sensitive code and data carried by a mobile agent against tampering from a malicious host is particularly hard but important. Based on secure multi-party computation, a recent research direction shows the f… more
Date: May 2004
Creator: Xu, Ke
Partner: UNT Libraries
open access

The Multipath Fault-Tolerant Protocol for Routing in Packet-Switched Communication Network

Description: In order to provide improved service quality to applications, networks need to address the need for reliability of data delivery. Reliability can be improved by incorporating fault tolerance into network routing, wherein a set of multiple routes are used for routing between a given source and destination. This thesis proposes a new fault-tolerant protocol, called the Multipath Fault Tolerant Protocol for Routing (MFTPR), to improve the reliability of network routing services. The protocol is ba… more
Date: May 2003
Creator: Krishnan, Anupama
Partner: UNT Libraries
open access

Impact of actual interference on capacity and call admission control in a CDMA network.

Description: An overwhelming number of models in the literature use average inter-cell interference for the calculation of capacity of a Code Division Multiple Access (CDMA) network. The advantage gained in terms of simplicity by using such models comes at the cost of rendering the exact location of a user within a cell irrelevant. We calculate the actual per-user interference and analyze the effect of user-distribution within a cell on the capacity of a CDMA network. We show that even though the capacity o… more
Date: May 2004
Creator: Parvez, Asad
Partner: UNT Libraries
open access

Optimal Access Point Selection and Channel Assignment in IEEE 802.11 Networks

Description: Designing 802.11 wireless networks includes two major components: selection of access points (APs) in the demand areas and assignment of radio frequencies to each AP. Coverage and capacity are some key issues when placing APs in a demand area. APs need to cover all users. A user is considered covered if the power received from its corresponding AP is greater than a given threshold. Moreover, from a capacity standpoint, APs need to provide certain minimum bandwidth to users located in the co… more
Date: December 2004
Creator: Park, Sangtae
Partner: UNT Libraries
open access

Flexible Digital Authentication Techniques

Description: Abstract This dissertation investigates authentication techniques in some emerging areas. Specifically, authentication schemes have been proposed that are well-suited for embedded systems, and privacy-respecting pay Web sites. With embedded systems, a person could own several devices which are capable of communication and interaction, but these devices use embedded processors whose computational capabilities are limited as compared to desktop computers. Examples of this scenario include enterta… more
Date: May 2006
Creator: Ge, He
Partner: UNT Libraries
open access

Grid-based Coordinated Routing in Wireless Sensor Networks

Description: Wireless sensor networks are battery-powered ad-hoc networks in which sensor nodes that are scattered over a region connect to each other and form multi-hop networks. These nodes are equipped with sensors such as temperature sensors, pressure sensors, and light sensors and can be queried to get the corresponding values for analysis. However, since they are battery operated, care has to be taken so that these nodes use energy efficiently. One of the areas in sensor networks where an energy analy… more
Date: December 2006
Creator: Sawant, Uttara
Partner: UNT Libraries
open access

Power-benefit analysis of erasure encoding with redundant routing in sensor networks.

Description: One of the problems sensor networks face is adversaries corrupting nodes along the path to the base station. One way to reduce the effect of these attacks is multipath routing. This introduces some intrusion-tolerance in the network by way of redundancy but at the cost of a higher power consumption by the sensor nodes. Erasure coding can be applied to this scenario in which the base station can receive a subset of the total data sent and reconstruct the entire message packet at its end. This th… more
Date: December 2006
Creator: Vishwanathan, Roopa
Partner: UNT Libraries
open access

Resource Management in Wireless Networks

Description: A local call admission control (CAC) algorithm for third generation wireless networks was designed and implemented, which allows for the simulation of network throughput for different spreading factors and various mobility scenarios. A global CAC algorithm is also implemented and used as a benchmark since it is inherently optimized; it yields the best possible performance but has an intensive computational complexity. Optimized local CAC algorithm achieves similar performance as global CAC algo… more
Date: August 2006
Creator: Arepally, Anurag
Partner: UNT Libraries
open access

Security problems in 802.11 wireless networks standard due to the inefficiency of wired equivalent privacy protocol.

Description: Due to the rapid growth of wireless networking, the fallible security issues of the 802.11 standard have come under close scrutiny. Nowadays most of the organizations are eager to setup wireless local area networks to reduce the hassles of limited mobility provided by conventional wired network. There are serious security issues that need to be sorted out before everyone is willing to transmit valuable corporate information on a wireless network. This report documents the inherent flaws in wire… more
Date: May 2003
Creator: Samanthapudi, Varma
Partner: UNT Libraries

Performance Evaluation of Data Integrity Mechanisms for Mobile Agents

Description: With the growing popularity of e-commerce applications that use software agents, the protection of mobile agent data has become imperative. To that end, the performance of four methods that protect the data integrity of mobile agents is evaluated. The methods investigated include existing approaches known as the Partial Result Authentication Codes, Hash Chaining, and Set Authentication Code methods, and a technique of our own design, called the Modified Set Authentication Code method, which add… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: December 2003
Creator: Gunupudi, Vandana
Partner: UNT Libraries
open access

Embedded monitors for detecting and preventing intrusions in cryptographic and application protocols.

Description: There are two main approaches for intrusion detection: signature-based and anomaly-based. Signature-based detection employs pattern matching to match attack signatures with observed data making it ideal for detecting known attacks. However, it cannot detect unknown attacks for which there is no signature available. Anomaly-based detection builds a profile of normal system behavior to detect known and unknown attacks as behavioral deviations. However, it has a drawback of a high false alarm rate… more
Date: December 2003
Creator: Joglekar, Sachin P.
Partner: UNT Libraries
open access

Capacity and Throughput Optimization in Multi-cell 3G WCDMA Networks

Description: User modeling enables in the computation of the traffic density in a cellular network, which can be used to optimize the placement of base stations and radio network controllers as well as to analyze the performance of resource management algorithms towards meeting the final goal: the calculation and maximization of network capacity and throughput for different data rate services. An analytical model is presented for approximating the user distributions in multi-cell third generation wideband c… more
Date: December 2005
Creator: Nguyen, Son
Partner: UNT Libraries
open access

An Experimental Investigation on the Effects of Web-Based Instruction/Training on Cognitive and Psychomotor Learning

Description: The purpose of this study was to investigate the effects of web-based instruction (WBI) on cognitive and psychomotor learning. The subjects of the study received two types of instructional methods, WBI (experimental group) and traditional classroom instruction (control group). Each group received 30 minutes of instruction on "Soldering a Circuit Board." The researcher chose this content subject because it involved both cognitive and psychomotor objectives, which suited the purpose of this study… more
Date: August 2000
Creator: Alzafiri, Fayiz M.
Partner: UNT Libraries

A Study of Perceptually Tuned, Wavelet Based, Rate Scalable, Image and Video Compression

Description: In this dissertation, first, we have proposed and implemented a new perceptually tuned wavelet based, rate scalable, and color image encoding/decoding system based on the human perceptual model. It is based on state-of-the-art research on embedded wavelet image compression technique, Contrast Sensitivity Function (CSF) for Human Visual System (HVS) and extends this scheme to handle optimal bit allocation among multiple bands, such as Y, Cb, and Cr. Our experimental image codec shows very exciti… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: May 2002
Creator: Wei, Ming
Partner: UNT Libraries
open access

Energy-Aware Time Synchronization in Wireless Sensor Networks

Description: I present a time synchronization algorithm for wireless sensor networks that aims to conserve sensor battery power. The proposed method creates a hierarchical tree by flooding the sensor network from a designated source point. It then uses a hybrid algorithm derived from the timing-sync protocol for sensor networks (TSPN) and the reference broadcast synchronization method (RBS) to periodically synchronize sensor clocks by minimizing energy consumption. In multi-hop ad-hoc networks, a depleted … more
Date: December 2006
Creator: Saravanos, Yanos
Partner: UNT Libraries
open access

Dynamic Grid-Based Data Distribution Management in Large Scale Distributed Simulations

Description: Distributed simulation is an enabling concept to support the networked interaction of models and real world elements that are geographically distributed. This technology has brought a new set of challenging problems to solve, such as Data Distribution Management (DDM). The aim of DDM is to limit and control the volume of the data exchanged during a distributed simulation, and reduce the processing requirements of the simulation hosts by relaying events and state information only to those applic… more
Date: December 2000
Creator: Roy, Amber Joyce
Partner: UNT Libraries
open access

DADS - A Distributed Agent Delivery System

Description: Mobile agents require an appropriate platform that can facilitate their migration and execution. In particular, the design and implementation of such a system must balance several factors that will ensure that its constituent agents are executed without problems. Besides the basic requirements of migration and execution, an agent system must also provide mechanisms to ensure the security and survivability of an agent when it migrates between hosts. In addition, the system should be simple enoug… more
Date: December 2002
Creator: Cozzolino, Clifford Joseph
Partner: UNT Libraries
open access

Direct Online/Offline Digital Signature Schemes.

Description: Online/offline signature schemes are useful in many situations, and two such scenarios are considered in this dissertation: bursty server authentication and embedded device authentication. In this dissertation, new techniques for online/offline signing are introduced, those are applied in a variety of ways for creating online/offline signature schemes, and five different online/offline signature schemes that are proved secure under a variety of models and assumptions are proposed. Two of the pr… more
Date: December 2008
Creator: Yu, Ping
Partner: UNT Libraries
Back to Top of Screen