語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security and performance considerati...
~
Pelechrinis, Konstantinos.
FindBook
Google Book
Amazon
博客來
Security and performance considerations in wireless networks.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Security and performance considerations in wireless networks./
作者:
Pelechrinis, Konstantinos.
面頁冊數:
166 p.
附註:
Source: Dissertation Abstracts International, Volume: 71-11, Section: B, page: 6891.
Contained By:
Dissertation Abstracts International71-11B.
標題:
Engineering, Computer. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3426153
ISBN:
9781124263427
Security and performance considerations in wireless networks.
Pelechrinis, Konstantinos.
Security and performance considerations in wireless networks.
- 166 p.
Source: Dissertation Abstracts International, Volume: 71-11, Section: B, page: 6891.
Thesis (Ph.D.)--University of California, Riverside, 2010.
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, yet effective, denial of service attacks (DoS attacks). As an example, jamming attacks, involve the uncoordinated transmission of electromagnetic energy on the medium. In a carrier sensing network (e.g., 802.11), this attack strategy increases the number of collisions at the receiver side and/or blocks the medium access to legitimate nodes at the transmitting side. Both of the above effects degrade the wireless network performance significantly. Frequency hopping (FH) has been traditionally used to overcome jamming attacks. However, we analytically and experimentally show that FH is inadequate to efficiently cope with jamming in today's networks.
ISBN: 9781124263427Subjects--Topical Terms:
1669061
Engineering, Computer.
Security and performance considerations in wireless networks.
LDR
:03390nam 2200313 4500
001
1403682
005
20111111143216.5
008
130515s2010 ||||||||||||||||| ||eng d
020
$a
9781124263427
035
$a
(UMI)AAI3426153
035
$a
AAI3426153
040
$a
UMI
$c
UMI
100
1
$a
Pelechrinis, Konstantinos.
$3
1682959
245
1 0
$a
Security and performance considerations in wireless networks.
300
$a
166 p.
500
$a
Source: Dissertation Abstracts International, Volume: 71-11, Section: B, page: 6891.
500
$a
Adviser: Srikanth V. Krishnamurthy.
502
$a
Thesis (Ph.D.)--University of California, Riverside, 2010.
520
$a
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, yet effective, denial of service attacks (DoS attacks). As an example, jamming attacks, involve the uncoordinated transmission of electromagnetic energy on the medium. In a carrier sensing network (e.g., 802.11), this attack strategy increases the number of collisions at the receiver side and/or blocks the medium access to legitimate nodes at the transmitting side. Both of the above effects degrade the wireless network performance significantly. Frequency hopping (FH) has been traditionally used to overcome jamming attacks. However, we analytically and experimentally show that FH is inadequate to efficiently cope with jamming in today's networks.
520
$a
Later we propose a suite of systems that aim at coping with jamming attacks at various levels (i.e., detection, localization and prevention). We first identify two intelligent and effective jamming attacks that can be launched in 802.11 WLANs and we provide robust detection systems. In particular, we design and implement (i) CMD, a system to detect active jamming attacks that exploit the carrier sensing functionality of 802.11 networks and (ii) FIJI, a cross-layer system for detecting (and mitigating) jamming attacks that exploit the performance anomaly of 802.11 WLANs. Furthermore, given the importance of locating the jamming device in many deployment scenarios (e.g., battlefield), we propose a lightweight jamming localization scheme. Our system utilizies ideas borrowed from the gradient descent optimization method. The system's evaluations, show the potentials and applicability of our localization strategy. The final step for coping with jamming attacks is jamming prevention. Based on our initial measurement driven analysis, we do not rely on a FH scheme, that tries to simply avoid the jammer. On the contrary, we design, implement and evaluate a prevention system, called ARES (Anti-jamming REinforcement System), to fight against the saboteur. ARES is applicable to carrier sensing networks and tunes the parameters of rate adaptation and power control to improve the performance under the presence of an attack while ensuring that operations under benign conditions are unaffected. Our extensive evaluations, show that ARES improves the network throughput across all scenarios by up to 150%.
590
$a
School code: 0032.
650
4
$a
Engineering, Computer.
$3
1669061
650
4
$a
Computer Science.
$3
626642
690
$a
0464
690
$a
0984
710
2
$a
University of California, Riverside.
$b
Computer Science.
$3
1680199
773
0
$t
Dissertation Abstracts International
$g
71-11B.
790
1 0
$a
Krishnamurthy, Srikanth V.,
$e
advisor
790
1 0
$a
Faloutsos, Michalis
$e
committee member
790
1 0
$a
Najjar, Walid
$e
committee member
790
$a
0032
791
$a
Ph.D.
792
$a
2010
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3426153
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9166821
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入
(1)帳號:一般為「身分證號」;外籍生或交換生則為「學號」。 (2)密碼:預設為帳號末四碼。
帳號
.
密碼
.
請在此電腦上記得個人資料
取消
忘記密碼? (請注意!您必須已在系統登記E-mail信箱方能使用。)