Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Securing communication in dynamic ne...
~
Wang, Pan.
Linked to FindBook
Google Book
Amazon
博客來
Securing communication in dynamic network environments.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Securing communication in dynamic network environments./
Author:
Wang, Pan.
Description:
132 p.
Notes:
Adviser: Douglas S. Reeves.
Contained By:
Dissertation Abstracts International68-06B.
Subject:
Computer Science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3269470
ISBN:
9780549078609
Securing communication in dynamic network environments.
Wang, Pan.
Securing communication in dynamic network environments.
- 132 p.
Adviser: Douglas S. Reeves.
Thesis (Ph.D.)--North Carolina State University, 2007.
In dynamic network environments, users may come from different domains, and the number of users and the network topology may change unpredictably over time. How to protect the users' communication in such dynamic environments, therefore, is extremely challenging. This dissertation has investigated multiple research problems related to securing users' communication in dynamic network environments, focusing on two kinds of dynamic networks, i.e., mobile ad hoc networks and overlay networks. It first introduces a secure address auto-configuration scheme for mobile ad hoc networks, since a precondition of network communication is that each user is configured with a unique network identifier (address). This proposed auto-configuration scheme binds each address with a public key, allows a user to self-authenticate itself, and thus greatly thwarts the address spoofing attacks, in the absence of centralized authentication services. Next, this thesis presents two storage-efficient stateless group key distribution schemes to protect the group communication of a dynamic set of users. These two key distribution schemes utilize one-way key chains with a logical tree. They allow an authorized user to get updated group keys even if the user goes off-line for a while, and significantly reduce the storage requirement at each user if compared with previous stateless key distribution schemes. Third, this thesis investigates the solution using cryptographic methods to enforce network access control in mobile ad hoc networks, whose dynamic natures make it difficult to directly apply traditional access control techniques such as firewalls. A functioning prototype demonstrates the proposed access control system is practical and effective. Finally, this dissertation introduces a k-anonymity communication protocol for overlay networks to protect the privacy of users' communication. Unlike the existing anonymous communication protocols that either cannot provide provable anonymity or suffer from transmission collision, the proposed protocol is transmission collision free and provides provable k-anonymity for both the sender and the recipient. The analysis shows the proposed anonymous communication protocol is secure even under a strong adversary model, in which the adversary controls a fraction of nodes, is able to eavesdrop all network traffic and maliciously modify/replay the transmitted messages. A proof-of-concept implementation demonstrates the proposed protocol is practical.
ISBN: 9780549078609Subjects--Topical Terms:
626642
Computer Science.
Securing communication in dynamic network environments.
LDR
:03373nam 2200277 a 45
001
941009
005
20110518
008
110518s2007 ||||||||||||||||| ||eng d
020
$a
9780549078609
035
$a
(UMI)AAI3269470
035
$a
AAI3269470
040
$a
UMI
$c
UMI
100
1
$a
Wang, Pan.
$3
1265149
245
1 0
$a
Securing communication in dynamic network environments.
300
$a
132 p.
500
$a
Adviser: Douglas S. Reeves.
500
$a
Source: Dissertation Abstracts International, Volume: 68-06, Section: B, page: 3915.
502
$a
Thesis (Ph.D.)--North Carolina State University, 2007.
520
$a
In dynamic network environments, users may come from different domains, and the number of users and the network topology may change unpredictably over time. How to protect the users' communication in such dynamic environments, therefore, is extremely challenging. This dissertation has investigated multiple research problems related to securing users' communication in dynamic network environments, focusing on two kinds of dynamic networks, i.e., mobile ad hoc networks and overlay networks. It first introduces a secure address auto-configuration scheme for mobile ad hoc networks, since a precondition of network communication is that each user is configured with a unique network identifier (address). This proposed auto-configuration scheme binds each address with a public key, allows a user to self-authenticate itself, and thus greatly thwarts the address spoofing attacks, in the absence of centralized authentication services. Next, this thesis presents two storage-efficient stateless group key distribution schemes to protect the group communication of a dynamic set of users. These two key distribution schemes utilize one-way key chains with a logical tree. They allow an authorized user to get updated group keys even if the user goes off-line for a while, and significantly reduce the storage requirement at each user if compared with previous stateless key distribution schemes. Third, this thesis investigates the solution using cryptographic methods to enforce network access control in mobile ad hoc networks, whose dynamic natures make it difficult to directly apply traditional access control techniques such as firewalls. A functioning prototype demonstrates the proposed access control system is practical and effective. Finally, this dissertation introduces a k-anonymity communication protocol for overlay networks to protect the privacy of users' communication. Unlike the existing anonymous communication protocols that either cannot provide provable anonymity or suffer from transmission collision, the proposed protocol is transmission collision free and provides provable k-anonymity for both the sender and the recipient. The analysis shows the proposed anonymous communication protocol is secure even under a strong adversary model, in which the adversary controls a fraction of nodes, is able to eavesdrop all network traffic and maliciously modify/replay the transmitted messages. A proof-of-concept implementation demonstrates the proposed protocol is practical.
590
$a
School code: 0155.
650
4
$a
Computer Science.
$3
626642
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
690
$a
0544
690
$a
0984
710
2
$a
North Carolina State University.
$3
1018772
773
0
$t
Dissertation Abstracts International
$g
68-06B.
790
$a
0155
790
1 0
$a
Reeves, Douglas S.,
$e
advisor
791
$a
Ph.D.
792
$a
2007
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3269470
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9110983
電子資源
11.線上閱覽_V
電子書
EB W9110983
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login