Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security and performance considerati...
~
Pelechrinis, Konstantinos.
Linked to FindBook
Google Book
Amazon
博客來
Security and performance considerations in wireless networks.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Security and performance considerations in wireless networks./
Author:
Pelechrinis, Konstantinos.
Description:
166 p.
Notes:
Source: Dissertation Abstracts International, Volume: 71-11, Section: B, page: 6891.
Contained By:
Dissertation Abstracts International71-11B.
Subject:
Engineering, Computer. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3426153
ISBN:
9781124263427
Security and performance considerations in wireless networks.
Pelechrinis, Konstantinos.
Security and performance considerations in wireless networks.
- 166 p.
Source: Dissertation Abstracts International, Volume: 71-11, Section: B, page: 6891.
Thesis (Ph.D.)--University of California, Riverside, 2010.
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, yet effective, denial of service attacks (DoS attacks). As an example, jamming attacks, involve the uncoordinated transmission of electromagnetic energy on the medium. In a carrier sensing network (e.g., 802.11), this attack strategy increases the number of collisions at the receiver side and/or blocks the medium access to legitimate nodes at the transmitting side. Both of the above effects degrade the wireless network performance significantly. Frequency hopping (FH) has been traditionally used to overcome jamming attacks. However, we analytically and experimentally show that FH is inadequate to efficiently cope with jamming in today's networks.
ISBN: 9781124263427Subjects--Topical Terms:
1669061
Engineering, Computer.
Security and performance considerations in wireless networks.
LDR
:03390nam 2200313 4500
001
1403682
005
20111111143216.5
008
130515s2010 ||||||||||||||||| ||eng d
020
$a
9781124263427
035
$a
(UMI)AAI3426153
035
$a
AAI3426153
040
$a
UMI
$c
UMI
100
1
$a
Pelechrinis, Konstantinos.
$3
1682959
245
1 0
$a
Security and performance considerations in wireless networks.
300
$a
166 p.
500
$a
Source: Dissertation Abstracts International, Volume: 71-11, Section: B, page: 6891.
500
$a
Adviser: Srikanth V. Krishnamurthy.
502
$a
Thesis (Ph.D.)--University of California, Riverside, 2010.
520
$a
The open and shared nature of the wireless medium makes it easy for adversaries to launch simple, yet effective, denial of service attacks (DoS attacks). As an example, jamming attacks, involve the uncoordinated transmission of electromagnetic energy on the medium. In a carrier sensing network (e.g., 802.11), this attack strategy increases the number of collisions at the receiver side and/or blocks the medium access to legitimate nodes at the transmitting side. Both of the above effects degrade the wireless network performance significantly. Frequency hopping (FH) has been traditionally used to overcome jamming attacks. However, we analytically and experimentally show that FH is inadequate to efficiently cope with jamming in today's networks.
520
$a
Later we propose a suite of systems that aim at coping with jamming attacks at various levels (i.e., detection, localization and prevention). We first identify two intelligent and effective jamming attacks that can be launched in 802.11 WLANs and we provide robust detection systems. In particular, we design and implement (i) CMD, a system to detect active jamming attacks that exploit the carrier sensing functionality of 802.11 networks and (ii) FIJI, a cross-layer system for detecting (and mitigating) jamming attacks that exploit the performance anomaly of 802.11 WLANs. Furthermore, given the importance of locating the jamming device in many deployment scenarios (e.g., battlefield), we propose a lightweight jamming localization scheme. Our system utilizies ideas borrowed from the gradient descent optimization method. The system's evaluations, show the potentials and applicability of our localization strategy. The final step for coping with jamming attacks is jamming prevention. Based on our initial measurement driven analysis, we do not rely on a FH scheme, that tries to simply avoid the jammer. On the contrary, we design, implement and evaluate a prevention system, called ARES (Anti-jamming REinforcement System), to fight against the saboteur. ARES is applicable to carrier sensing networks and tunes the parameters of rate adaptation and power control to improve the performance under the presence of an attack while ensuring that operations under benign conditions are unaffected. Our extensive evaluations, show that ARES improves the network throughput across all scenarios by up to 150%.
590
$a
School code: 0032.
650
4
$a
Engineering, Computer.
$3
1669061
650
4
$a
Computer Science.
$3
626642
690
$a
0464
690
$a
0984
710
2
$a
University of California, Riverside.
$b
Computer Science.
$3
1680199
773
0
$t
Dissertation Abstracts International
$g
71-11B.
790
1 0
$a
Krishnamurthy, Srikanth V.,
$e
advisor
790
1 0
$a
Faloutsos, Michalis
$e
committee member
790
1 0
$a
Najjar, Walid
$e
committee member
790
$a
0032
791
$a
Ph.D.
792
$a
2010
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3426153
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9166821
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login