Please use this identifier to cite or link to this item:
https://www.um.edu.mt/library/oar/handle/123456789/95247
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.date.accessioned | 2022-05-06T11:20:38Z | - |
dc.date.available | 2022-05-06T11:20:38Z | - |
dc.date.issued | 2010 | - |
dc.identifier.citation | Terribile, O. (2010). The implementation of a malicious node localisation system on an FPGA (Bachelor's dissertation). | en_GB |
dc.identifier.uri | https://www.um.edu.mt/library/oar/handle/123456789/95247 | - |
dc.description | B.SC.(HONS)COMPUTER ENG. | en_GB |
dc.description.abstract | Wireless technology is an ever growing field were everyday, more devices are being implemented. Although this technology offers a wide range of advantages, because of the lack of wiring and ease of deployment, nodal failures are still present and security is of vital importance. Various systems have security measures implemented; however, intrusions still take place. Therefore data needs to be continuously monitored and any suspicious activity within the network needs to be reported. Due to the mobility of such nodes, localisation of these malicious nodes is required and needs to be continually updated when the node is moving. In this project, packets of data are sent between nodes. The time it takes for a packet to reach a node and be acknowledged is used as a distance measure to locate the malicious node. The system is made up of four field programmable gate arrays (FPGA) connected to four RF modules. One of these FPGAs acts as a network host; two other nodes act as clients to the host; and the last FPGA is a malicious node. A CRT monitor was used to display the location of the malicious node with respect to the other three nodes. Various simulations are carried out to ensure the functionality of the system and Bresenham's line algorithm is used to generate the circles on the monitor. These circles represent the distance of the malicious node from the other nodes thus giving an indication of its physical position. The common point of these circles represents the estimated position of the malicious node | en_GB |
dc.language.iso | en | en_GB |
dc.rights | info:eu-repo/semantics/restrictedAccess | en_GB |
dc.subject | Wireless communication systems | en_GB |
dc.subject | Field programmable gate arrays | en_GB |
dc.subject | Computer algorithms | en_GB |
dc.title | The implementation of a malicious node localisation system on an FPGA | en_GB |
dc.type | bachelorThesis | en_GB |
dc.rights.holder | The copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder. | en_GB |
dc.publisher.institution | University of Malta | en_GB |
dc.publisher.department | Faculty of Information and Communication Technology. Department of Communications and Computer Engineering | en_GB |
dc.description.reviewed | N/A | en_GB |
dc.contributor.creator | Terribile, Olen (2010) | - |
Appears in Collections: | Dissertations - FacICT - 2010 Dissertations - FacICTCCE - 1999-2013 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
BSC(HONS)ICT_Terribile, Olen_2010.PDF Restricted Access | 3.71 MB | Adobe PDF | View/Open Request a copy |
Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.