Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Linked to FindBook
Google Book
Amazon
博客來
Data-Oriented Approaches Towards Mobile, Network and Secure Systems.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Data-Oriented Approaches Towards Mobile, Network and Secure Systems./
Author:
Zhao, Shangqing.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2021,
Description:
213 p.
Notes:
Source: Dissertations Abstracts International, Volume: 83-03, Section: B.
Contained By:
Dissertations Abstracts International83-03B.
Subject:
Computer engineering. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28645170
ISBN:
9798535533605
Data-Oriented Approaches Towards Mobile, Network and Secure Systems.
Zhao, Shangqing.
Data-Oriented Approaches Towards Mobile, Network and Secure Systems.
- Ann Arbor : ProQuest Dissertations & Theses, 2021 - 213 p.
Source: Dissertations Abstracts International, Volume: 83-03, Section: B.
Thesis (Ph.D.)--University of South Florida, 2021.
This item must not be sold to any third party vendors.
With the rapid evolvement of information science, data-oriented research has solicited a new philosophy for the future mobile network and security design, since it can not only encourage new designs achieving more efficient and reliable networks, but also pose new challenges towards security designs. In this dissertation, we propose four novel data-oriented designs or frameworks to prompt or calibrate the performance with respect to efficiency, reliability, and security.In the wireless domain, packet corruption and packet collision are two major threats that jeopardize the performance of a mobile network. To cope with the packet corruption, we propose the STAteful inter-Packet signaL procEssing (STAPLE) framework, which is an inter-packet oriented signal process design for wireless networking. STAPLE transforms the signal processing procedure into a lightweight stateful process that caches in a small-sized memory table physical and link layer header fields as packet state information. The similarity of such information among packets serves as prior knowledge to further enhance the reliability of signal processing and thus improve the wireless network performance. For the packet collision, we present a new design called comb decoding (CombDec) to efficiently resolve RTS collisions without changing the 802.11 standards. We observe that an RTS payload, when treated as a vector in a vector space, exhibits a comb-like distribution; i.e., a limited number of vectors are much more likely to be used than the others due to RTS payload construction and firmware design. This enables us to use sparse recovery such as compressive sensing to resolve RTS collisions.For the network security design, we revisit network tomography and inference from a data-driven perspective and discover that there are two vulnerabilities. The first one is of the measurement integrity. By taking advantage of this vulnerability, we develop an attack strategy, called measurement integrity attack, which not only destroys the measuring system, but can even mislead the system to scapegoat other innocent users. The second vulnerability is of the measurement confidentiality since network inference is able to leak network flow information without directly measuring it.To prevent disclosing the flow information, we find that random routing strategies are capable of hiding the flow information. Then, by leveraging the measurement data, we propose a new framework that can systematically study the behavior of different randomized routing protocols, and explore the fundamental reason why randomized routing strategies can prevent information leakage against network inference.
ISBN: 9798535533605Subjects--Topical Terms:
621879
Computer engineering.
Subjects--Index Terms:
802.11
Data-Oriented Approaches Towards Mobile, Network and Secure Systems.
LDR
:03892nmm a2200409 4500
001
2352141
005
20221118093821.5
008
241004s2021 ||||||||||||||||| ||eng d
020
$a
9798535533605
035
$a
(MiAaPQ)AAI28645170
035
$a
AAI28645170
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Zhao, Shangqing.
$3
3691763
245
1 0
$a
Data-Oriented Approaches Towards Mobile, Network and Secure Systems.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2021
300
$a
213 p.
500
$a
Source: Dissertations Abstracts International, Volume: 83-03, Section: B.
500
$a
Advisor: Lu, Zhuo.
502
$a
Thesis (Ph.D.)--University of South Florida, 2021.
506
$a
This item must not be sold to any third party vendors.
520
$a
With the rapid evolvement of information science, data-oriented research has solicited a new philosophy for the future mobile network and security design, since it can not only encourage new designs achieving more efficient and reliable networks, but also pose new challenges towards security designs. In this dissertation, we propose four novel data-oriented designs or frameworks to prompt or calibrate the performance with respect to efficiency, reliability, and security.In the wireless domain, packet corruption and packet collision are two major threats that jeopardize the performance of a mobile network. To cope with the packet corruption, we propose the STAteful inter-Packet signaL procEssing (STAPLE) framework, which is an inter-packet oriented signal process design for wireless networking. STAPLE transforms the signal processing procedure into a lightweight stateful process that caches in a small-sized memory table physical and link layer header fields as packet state information. The similarity of such information among packets serves as prior knowledge to further enhance the reliability of signal processing and thus improve the wireless network performance. For the packet collision, we present a new design called comb decoding (CombDec) to efficiently resolve RTS collisions without changing the 802.11 standards. We observe that an RTS payload, when treated as a vector in a vector space, exhibits a comb-like distribution; i.e., a limited number of vectors are much more likely to be used than the others due to RTS payload construction and firmware design. This enables us to use sparse recovery such as compressive sensing to resolve RTS collisions.For the network security design, we revisit network tomography and inference from a data-driven perspective and discover that there are two vulnerabilities. The first one is of the measurement integrity. By taking advantage of this vulnerability, we develop an attack strategy, called measurement integrity attack, which not only destroys the measuring system, but can even mislead the system to scapegoat other innocent users. The second vulnerability is of the measurement confidentiality since network inference is able to leak network flow information without directly measuring it.To prevent disclosing the flow information, we find that random routing strategies are capable of hiding the flow information. Then, by leveraging the measurement data, we propose a new framework that can systematically study the behavior of different randomized routing protocols, and explore the fundamental reason why randomized routing strategies can prevent information leakage against network inference.
590
$a
School code: 0206.
650
4
$a
Computer engineering.
$3
621879
650
4
$a
Computer science.
$3
523869
650
4
$a
Information technology.
$3
532993
650
4
$a
Information science.
$3
554358
650
4
$a
Behavior.
$3
532476
650
4
$a
Tomography.
$3
836553
650
4
$a
Datasets.
$3
3541416
650
4
$a
Network security.
$3
3680530
650
4
$a
Success.
$3
518195
650
4
$a
Corruption.
$3
615175
650
4
$a
Systems design.
$3
3433840
650
4
$a
Signal processing.
$3
533904
650
4
$a
Internet of Things.
$3
3538511
650
4
$a
Access control.
$3
1458437
650
4
$a
Efficiency.
$3
753744
650
4
$a
Wireless networks.
$3
1531264
650
4
$a
Construction.
$3
3561054
650
4
$a
Experiments.
$3
525909
650
4
$a
Knowledge.
$3
872758
650
4
$a
Confidentiality.
$3
736289
650
4
$a
Design.
$3
518875
650
4
$a
Portable computers.
$3
816546
650
4
$a
Wireless access points.
$3
3684130
653
$a
802.11
653
$a
Collision decoding
653
$a
Network inference
653
$a
Network tomography
653
$a
Novel signal processing
653
$a
USRP
690
$a
0464
690
$a
0489
690
$a
0984
690
$a
0723
690
$a
0389
710
2
$a
University of South Florida.
$b
Electrical Engineering.
$3
1678952
773
0
$t
Dissertations Abstracts International
$g
83-03B.
790
$a
0206
791
$a
Ph.D.
792
$a
2021
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28645170
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9474579
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login