語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
FindBook
Google Book
Amazon
博客來
Data-Oriented Approaches Towards Mobile, Network and Secure Systems.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Data-Oriented Approaches Towards Mobile, Network and Secure Systems./
作者:
Zhao, Shangqing.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2021,
面頁冊數:
213 p.
附註:
Source: Dissertations Abstracts International, Volume: 83-03, Section: B.
Contained By:
Dissertations Abstracts International83-03B.
標題:
Computer engineering. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28645170
ISBN:
9798535533605
Data-Oriented Approaches Towards Mobile, Network and Secure Systems.
Zhao, Shangqing.
Data-Oriented Approaches Towards Mobile, Network and Secure Systems.
- Ann Arbor : ProQuest Dissertations & Theses, 2021 - 213 p.
Source: Dissertations Abstracts International, Volume: 83-03, Section: B.
Thesis (Ph.D.)--University of South Florida, 2021.
This item must not be sold to any third party vendors.
With the rapid evolvement of information science, data-oriented research has solicited a new philosophy for the future mobile network and security design, since it can not only encourage new designs achieving more efficient and reliable networks, but also pose new challenges towards security designs. In this dissertation, we propose four novel data-oriented designs or frameworks to prompt or calibrate the performance with respect to efficiency, reliability, and security.In the wireless domain, packet corruption and packet collision are two major threats that jeopardize the performance of a mobile network. To cope with the packet corruption, we propose the STAteful inter-Packet signaL procEssing (STAPLE) framework, which is an inter-packet oriented signal process design for wireless networking. STAPLE transforms the signal processing procedure into a lightweight stateful process that caches in a small-sized memory table physical and link layer header fields as packet state information. The similarity of such information among packets serves as prior knowledge to further enhance the reliability of signal processing and thus improve the wireless network performance. For the packet collision, we present a new design called comb decoding (CombDec) to efficiently resolve RTS collisions without changing the 802.11 standards. We observe that an RTS payload, when treated as a vector in a vector space, exhibits a comb-like distribution; i.e., a limited number of vectors are much more likely to be used than the others due to RTS payload construction and firmware design. This enables us to use sparse recovery such as compressive sensing to resolve RTS collisions.For the network security design, we revisit network tomography and inference from a data-driven perspective and discover that there are two vulnerabilities. The first one is of the measurement integrity. By taking advantage of this vulnerability, we develop an attack strategy, called measurement integrity attack, which not only destroys the measuring system, but can even mislead the system to scapegoat other innocent users. The second vulnerability is of the measurement confidentiality since network inference is able to leak network flow information without directly measuring it.To prevent disclosing the flow information, we find that random routing strategies are capable of hiding the flow information. Then, by leveraging the measurement data, we propose a new framework that can systematically study the behavior of different randomized routing protocols, and explore the fundamental reason why randomized routing strategies can prevent information leakage against network inference.
ISBN: 9798535533605Subjects--Topical Terms:
621879
Computer engineering.
Subjects--Index Terms:
802.11
Data-Oriented Approaches Towards Mobile, Network and Secure Systems.
LDR
:03892nmm a2200409 4500
001
2352141
005
20221118093821.5
008
241004s2021 ||||||||||||||||| ||eng d
020
$a
9798535533605
035
$a
(MiAaPQ)AAI28645170
035
$a
AAI28645170
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Zhao, Shangqing.
$3
3691763
245
1 0
$a
Data-Oriented Approaches Towards Mobile, Network and Secure Systems.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2021
300
$a
213 p.
500
$a
Source: Dissertations Abstracts International, Volume: 83-03, Section: B.
500
$a
Advisor: Lu, Zhuo.
502
$a
Thesis (Ph.D.)--University of South Florida, 2021.
506
$a
This item must not be sold to any third party vendors.
520
$a
With the rapid evolvement of information science, data-oriented research has solicited a new philosophy for the future mobile network and security design, since it can not only encourage new designs achieving more efficient and reliable networks, but also pose new challenges towards security designs. In this dissertation, we propose four novel data-oriented designs or frameworks to prompt or calibrate the performance with respect to efficiency, reliability, and security.In the wireless domain, packet corruption and packet collision are two major threats that jeopardize the performance of a mobile network. To cope with the packet corruption, we propose the STAteful inter-Packet signaL procEssing (STAPLE) framework, which is an inter-packet oriented signal process design for wireless networking. STAPLE transforms the signal processing procedure into a lightweight stateful process that caches in a small-sized memory table physical and link layer header fields as packet state information. The similarity of such information among packets serves as prior knowledge to further enhance the reliability of signal processing and thus improve the wireless network performance. For the packet collision, we present a new design called comb decoding (CombDec) to efficiently resolve RTS collisions without changing the 802.11 standards. We observe that an RTS payload, when treated as a vector in a vector space, exhibits a comb-like distribution; i.e., a limited number of vectors are much more likely to be used than the others due to RTS payload construction and firmware design. This enables us to use sparse recovery such as compressive sensing to resolve RTS collisions.For the network security design, we revisit network tomography and inference from a data-driven perspective and discover that there are two vulnerabilities. The first one is of the measurement integrity. By taking advantage of this vulnerability, we develop an attack strategy, called measurement integrity attack, which not only destroys the measuring system, but can even mislead the system to scapegoat other innocent users. The second vulnerability is of the measurement confidentiality since network inference is able to leak network flow information without directly measuring it.To prevent disclosing the flow information, we find that random routing strategies are capable of hiding the flow information. Then, by leveraging the measurement data, we propose a new framework that can systematically study the behavior of different randomized routing protocols, and explore the fundamental reason why randomized routing strategies can prevent information leakage against network inference.
590
$a
School code: 0206.
650
4
$a
Computer engineering.
$3
621879
650
4
$a
Computer science.
$3
523869
650
4
$a
Information technology.
$3
532993
650
4
$a
Information science.
$3
554358
650
4
$a
Behavior.
$3
532476
650
4
$a
Tomography.
$3
836553
650
4
$a
Datasets.
$3
3541416
650
4
$a
Network security.
$3
3680530
650
4
$a
Success.
$3
518195
650
4
$a
Corruption.
$3
615175
650
4
$a
Systems design.
$3
3433840
650
4
$a
Signal processing.
$3
533904
650
4
$a
Internet of Things.
$3
3538511
650
4
$a
Access control.
$3
1458437
650
4
$a
Efficiency.
$3
753744
650
4
$a
Wireless networks.
$3
1531264
650
4
$a
Construction.
$3
3561054
650
4
$a
Experiments.
$3
525909
650
4
$a
Knowledge.
$3
872758
650
4
$a
Confidentiality.
$3
736289
650
4
$a
Design.
$3
518875
650
4
$a
Portable computers.
$3
816546
650
4
$a
Wireless access points.
$3
3684130
653
$a
802.11
653
$a
Collision decoding
653
$a
Network inference
653
$a
Network tomography
653
$a
Novel signal processing
653
$a
USRP
690
$a
0464
690
$a
0489
690
$a
0984
690
$a
0723
690
$a
0389
710
2
$a
University of South Florida.
$b
Electrical Engineering.
$3
1678952
773
0
$t
Dissertations Abstracts International
$g
83-03B.
790
$a
0206
791
$a
Ph.D.
792
$a
2021
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28645170
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9474579
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入