語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Secure wireless sensor networks: Bui...
~
Song, Hui.
FindBook
Google Book
Amazon
博客來
Secure wireless sensor networks: Building blocks and applications.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Secure wireless sensor networks: Building blocks and applications./
作者:
Song, Hui.
面頁冊數:
142 p.
附註:
Source: Dissertation Abstracts International, Volume: 68-10, Section: B, page: 6775.
Contained By:
Dissertation Abstracts International68-10B.
標題:
Computer Science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3285005
ISBN:
9780549276449
Secure wireless sensor networks: Building blocks and applications.
Song, Hui.
Secure wireless sensor networks: Building blocks and applications.
- 142 p.
Source: Dissertation Abstracts International, Volume: 68-10, Section: B, page: 6775.
Thesis (Ph.D.)--The Pennsylvania State University, 2007.
The objective of this thesis is developing security building blocks for sensor networks as well as designing secured sensor network applications. The thesis makes the following three contributions.
ISBN: 9780549276449Subjects--Topical Terms:
626642
Computer Science.
Secure wireless sensor networks: Building blocks and applications.
LDR
:04047nam 2200289 a 45
001
941104
005
20110518
008
110518s2007 ||||||||||||||||| ||eng d
020
$a
9780549276449
035
$a
(UMI)AAI3285005
035
$a
AAI3285005
040
$a
UMI
$c
UMI
100
1
$a
Song, Hui.
$3
1265241
245
1 0
$a
Secure wireless sensor networks: Building blocks and applications.
300
$a
142 p.
500
$a
Source: Dissertation Abstracts International, Volume: 68-10, Section: B, page: 6775.
502
$a
Thesis (Ph.D.)--The Pennsylvania State University, 2007.
520
$a
The objective of this thesis is developing security building blocks for sensor networks as well as designing secured sensor network applications. The thesis makes the following three contributions.
520
$a
Sensor networks are ideal candidates for a wide range of applications, such as monitoring of critical infrastructures, data acquisition in hazardous environments, and military operations. It is necessary to guarantee the security and resilience of sensor networks (as well as their applications) as they become more and more popular. Despite many security schemes have been proposed to protect building blocks such as routing and key management, some other building blocks (e.g., mobile sink and time synchronization) are largely ignored.
520
$a
The first contribution is the provision of a secured mobile sink building block. In sensor network applications, mobile sinks are often granted with privileges such as accessing and revoking sensors. If they are compromised, the abusing of the privileges may bring down or result in the compromise of the entire sensor network. This thesis describes how to grant mobile sinks with only the minimum required privileges, based on the principle of least privilege, and how to quickly revoke their privileges when they are compromised. Simulations and real implementation (using Mica2 motes) have been conducted and shown that the proposed approaches are secure, efficient, and practical.
520
$a
Secondly, this thesis furnishes a secured time synchronization building block. The existing time synchronization schemes for sensor networks were not designed with security in mind and are vulnerable to many malicious attacks. This thesis is focused on a specific attack using which an attacker can deliberately delay the transmission of time synchronization messages to interfere the time synchronization process between sensors. This attack cannot be addressed by traditional cryptographic techniques. Two approaches have been proposed to detect and accommodate this attack. The first approach uses a statistical method to detect and remove the outliers (i.e., malicious time synchronization data introduced by the attack), and the second approach uses a time transformation technique to derive the threshold for outlier filtering. Simulations demonstrate that even mild attacks (e.g., introducing only 10 millisecond delay) can be detected effectively (e.g., with 100 percent detection rate and zero percent false positive rate).
520
$a
The third contribution of this thesis is the design, implementation and evaluation of a sensor-network--based vehicle anti-theft system called SVATS. In this system, vehicles are equipped with sensors and sensor networks are automatically formed in parking lots, which actively monitor and identify possible vehicle thefts by detecting unauthorized vehicle movement. When an unauthorized movement is detected, an alert will be reported to a base station in the parking area, which sends warning messages to the security office or car owner. All the messages in the system are secured to mitigate malicious attacks. A prototype based on Mica2 motes is deployed to test the design, which shows that SVATS can detect vehicle theft in four to nine seconds.
590
$a
School code: 0176.
650
4
$a
Computer Science.
$3
626642
690
$a
0984
710
2
$a
The Pennsylvania State University.
$3
699896
773
0
$t
Dissertation Abstracts International
$g
68-10B.
790
$a
0176
791
$a
Ph.D.
792
$a
2007
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3285005
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9111078
電子資源
11.線上閱覽_V
電子書
EB W9111078
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入