Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/95247
Full metadata record
DC FieldValueLanguage
dc.date.accessioned2022-05-06T11:20:38Z-
dc.date.available2022-05-06T11:20:38Z-
dc.date.issued2010-
dc.identifier.citationTerribile, O. (2010). The implementation of a malicious node localisation system on an FPGA (Bachelor's dissertation).en_GB
dc.identifier.urihttps://www.um.edu.mt/library/oar/handle/123456789/95247-
dc.descriptionB.SC.(HONS)COMPUTER ENG.en_GB
dc.description.abstractWireless technology is an ever growing field were everyday, more devices are being implemented. Although this technology offers a wide range of advantages, because of the lack of wiring and ease of deployment, nodal failures are still present and security is of vital importance. Various systems have security measures implemented; however, intrusions still take place. Therefore data needs to be continuously monitored and any suspicious activity within the network needs to be reported. Due to the mobility of such nodes, localisation of these malicious nodes is required and needs to be continually updated when the node is moving. In this project, packets of data are sent between nodes. The time it takes for a packet to reach a node and be acknowledged is used as a distance measure to locate the malicious node. The system is made up of four field programmable gate arrays (FPGA) connected to four RF modules. One of these FPGAs acts as a network host; two other nodes act as clients to the host; and the last FPGA is a malicious node. A CRT monitor was used to display the location of the malicious node with respect to the other three nodes. Various simulations are carried out to ensure the functionality of the system and Bresenham's line algorithm is used to generate the circles on the monitor. These circles represent the distance of the malicious node from the other nodes thus giving an indication of its physical position. The common point of these circles represents the estimated position of the malicious nodeen_GB
dc.language.isoenen_GB
dc.rightsinfo:eu-repo/semantics/restrictedAccessen_GB
dc.subjectWireless communication systemsen_GB
dc.subjectField programmable gate arraysen_GB
dc.subjectComputer algorithmsen_GB
dc.titleThe implementation of a malicious node localisation system on an FPGAen_GB
dc.typebachelorThesisen_GB
dc.rights.holderThe copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder.en_GB
dc.publisher.institutionUniversity of Maltaen_GB
dc.publisher.departmentFaculty of Information and Communication Technology. Department of Communications and Computer Engineeringen_GB
dc.description.reviewedN/Aen_GB
dc.contributor.creatorTerribile, Olen (2010)-
Appears in Collections:Dissertations - FacICT - 2010
Dissertations - FacICTCCE - 1999-2013

Files in This Item:
File Description SizeFormat 
BSC(HONS)ICT_Terribile, Olen_2010.PDF
  Restricted Access
3.71 MBAdobe PDFView/Open Request a copy


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.