Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security mechanisms for mobile ad ho...
~
University of Cincinnati.
Linked to FindBook
Google Book
Amazon
博客來
Security mechanisms for mobile ad hoc and wireless sensor networks.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Security mechanisms for mobile ad hoc and wireless sensor networks./
Author:
Cheng, Yi.
Description:
150 p.
Notes:
Adviser: Dharma P. Agrawal.
Contained By:
Dissertation Abstracts International69-08B.
Subject:
Computer Science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3326648
ISBN:
9780549793052
Security mechanisms for mobile ad hoc and wireless sensor networks.
Cheng, Yi.
Security mechanisms for mobile ad hoc and wireless sensor networks.
- 150 p.
Adviser: Dharma P. Agrawal.
Thesis (Ph.D.)--University of Cincinnati, 2008.
Wireless Ad Hoc Networks have emerged as an advanced networking paradigm based on collaborative efforts among multiple self-organized wireless communication devices. Without the requirement of a fixed infrastructure support, wireless ad hoc networks can be quickly deployed anywhere at any time when needed. The decentralized nature, minimal configuration and quick deployment of wireless ad hoc networks make them suitable for various applications, from disaster rescue, target tracking to military conflicts. Wireless ad hoc networks can be further categorized into mobile ad hoc networks (MANETs), wireless sensor networks (WSNs), and wireless mesh networks (WMNs) depending on their applications.
ISBN: 9780549793052Subjects--Topical Terms:
626642
Computer Science.
Security mechanisms for mobile ad hoc and wireless sensor networks.
LDR
:03667nmm 2200301 a 45
001
862657
005
20100721
008
100721s2008 ||||||||||||||||| ||eng d
020
$a
9780549793052
035
$a
(UMI)AAI3326648
035
$a
AAI3326648
040
$a
UMI
$c
UMI
100
1
$a
Cheng, Yi.
$3
1030497
245
1 0
$a
Security mechanisms for mobile ad hoc and wireless sensor networks.
300
$a
150 p.
500
$a
Adviser: Dharma P. Agrawal.
500
$a
Source: Dissertation Abstracts International, Volume: 69-08, Section: B, page: 4925.
502
$a
Thesis (Ph.D.)--University of Cincinnati, 2008.
520
$a
Wireless Ad Hoc Networks have emerged as an advanced networking paradigm based on collaborative efforts among multiple self-organized wireless communication devices. Without the requirement of a fixed infrastructure support, wireless ad hoc networks can be quickly deployed anywhere at any time when needed. The decentralized nature, minimal configuration and quick deployment of wireless ad hoc networks make them suitable for various applications, from disaster rescue, target tracking to military conflicts. Wireless ad hoc networks can be further categorized into mobile ad hoc networks (MANETs), wireless sensor networks (WSNs), and wireless mesh networks (WMNs) depending on their applications.
520
$a
Security is a big challenge in wireless ad hoc networks due to the lack of any infrastructure support, dynamic network topology, shared radio medium, and resource-constrained wireless users. Most existing security mechanisms applied for the Internet or traditional wireless networks are neither applicable nor suitable for wireless ad hoc network environments. In MANETs, routing security is an extremely important issue, as the majority of the standard routing protocols assume non-hostile environments. Once deployed in a hostile environment and working in an unattended mode, existing routing protocols are vulnerable to various attacks. To address these concerns, we propose an anonymous secure routing protocol for MANETs in this dissertation, which can be incorporated with existing routing protocols and achieve enhanced routing security with minimum additional overheads.
520
$a
In WSNs, key distribution and management is the core issue of any security approaches. Due to extremely resource-constrained sensor nodes and lack of any infrastructure support, traditional public-key based key distribution and management mechanisms are commonly considered as too expensive to be employed in WSNs. In this dissertation, we propose two efficient pairwise key pre-distribution and management mechanisms for both distributed and hierarchical large-scale WSNs, which enable establishing secure links between any two sensor nodes located within their communication range. As we know, sensing and communication are two fundamental characteristics of WSNs, and they cannot be addressed separately. Existing work on sensing coverage mainly focus on how to use the minimum number of sensors to achieve a required coverage, while security constraints are not sufficiently addressed. We propose an effective key distribution approach for randomly deployed WSNs, based on random graph theory and a realistic random key pre-distribution mechanism, in order to achieve both robust sensing coverage and secure connectivity simultaneously in a hostile deployment environment.
590
$a
School code: 0045.
650
4
$a
Computer Science.
$3
626642
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
690
$a
0544
690
$a
0984
710
2
$a
University of Cincinnati.
$3
960309
773
0
$t
Dissertation Abstracts International
$g
69-08B.
790
$a
0045
790
1 0
$a
Agrawal, Dharma P.,
$e
advisor
791
$a
Ph.D.
792
$a
2008
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3326648
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9076037
電子資源
11.線上閱覽_V
電子書
EB W9076037
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login