dc.contributor.author | Pedersen, Morten | |
dc.contributor.author | Than, Thong Kim | |
dc.date.accessioned | 2007-07-09T08:28:58Z | |
dc.date.issued | 2004 | |
dc.identifier.uri | http://hdl.handle.net/11250/137216 | |
dc.description | Masteroppgave i informasjons- og kommunikasjonsteknologi 2004 - Høgskolen i Agder, Grimstad | en |
dc.description.abstract | Looking into the wireless world today, the most of data/information is transmitted in plaintext over the ether. These sensitive data/information possibly route through several intermediate nodes to a destination. To secure the sensitive data/information, the various ad-hoc technologies like Bluetooth, WLAN and ZigBee have implemented different security mechanisms and routing protocols. But since most wireless ad-hoc networks demand battery driven devices they will have limit resources to provide feasible security.
The different technologies will be outlined regarding a set case scenario. We have a parking lot and want to secure cars against thievery. For this we conducted a research over suitable technologies and routing protocols. We concluded that using ZigBee would fill that role better than the other technologies examined. We also decided to use the build in routing mechanisms from ZigBee. We developed a solution outcast for the application level of our case and gave a foundation to build a test model on. | en |
dc.format.extent | 996265 bytes | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | en |
dc.publisher | Høgskolen i Agder | |
dc.publisher | Agder University College | |
dc.subject.classification | IKT590 | |
dc.title | Formation of secure wireless ad-hoc sensor networks | en |
dc.type | Master thesis | en |
dc.subject.nsi | VDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424 | |
dc.subject.nsi | VDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Systemutvikling og -arbeid: 426 | |