語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Practical security scheme design for...
~
Iowa State University., Electrical and Computer Engineering.
FindBook
Google Book
Amazon
博客來
Practical security scheme design for resource-constrained wireless networks.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Practical security scheme design for resource-constrained wireless networks./
作者:
Yu, Zhen.
面頁冊數:
181 p.
附註:
Adviser: Yong Guan.
Contained By:
Dissertation Abstracts International70-05B.
標題:
Computer Science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3355501
ISBN:
9781109142761
Practical security scheme design for resource-constrained wireless networks.
Yu, Zhen.
Practical security scheme design for resource-constrained wireless networks.
- 181 p.
Adviser: Yong Guan.
Thesis (Ph.D.)--Iowa State University, 2009.
The implementation of ubiquitous computing (or pervasive computing) can leverage various types of resource-constrained wireless networks such as wireless sensor networks and wireless personal area networks. These resource-constrained wireless networks are vulnerable to many malicious attacks that often cause leakage, alteration and destruction of critical information due to the insecurity of wireless communication and the tampers of devices. Meanwhile, the constraints of resources, the lack of centralized management, and the demands of mobility of these networks often make traditional security mechanisms inefficient or infeasible. So, the resource-constrained wireless networks pose new challenges for information assurance and call for practical, efficient and effective solutions.
ISBN: 9781109142761Subjects--Topical Terms:
626642
Computer Science.
Practical security scheme design for resource-constrained wireless networks.
LDR
:03385nmm 2200337 a 45
001
886725
005
20101007
008
101007s2009 ||||||||||||||||| ||eng d
020
$a
9781109142761
035
$a
(UMI)AAI3355501
035
$a
AAI3355501
040
$a
UMI
$c
UMI
100
1
$a
Yu, Zhen.
$3
1058436
245
1 0
$a
Practical security scheme design for resource-constrained wireless networks.
300
$a
181 p.
500
$a
Adviser: Yong Guan.
500
$a
Source: Dissertation Abstracts International, Volume: 70-05, Section: B, page: 3017.
502
$a
Thesis (Ph.D.)--Iowa State University, 2009.
520
$a
The implementation of ubiquitous computing (or pervasive computing) can leverage various types of resource-constrained wireless networks such as wireless sensor networks and wireless personal area networks. These resource-constrained wireless networks are vulnerable to many malicious attacks that often cause leakage, alteration and destruction of critical information due to the insecurity of wireless communication and the tampers of devices. Meanwhile, the constraints of resources, the lack of centralized management, and the demands of mobility of these networks often make traditional security mechanisms inefficient or infeasible. So, the resource-constrained wireless networks pose new challenges for information assurance and call for practical, efficient and effective solutions.
520
$a
In this research, we focus on wireless sensor networks and aim at enhancing confidentiality, authenticity, availability and integrity, for wireless sensor networks. Particularly, we identify three important problems as our research targets: (1) key management for wireless sensor networks (for confidentiality), (2) filtering false data injection and DoS attacks in wireless sensor networks (for authenticity and availability), and (3) secure network coding (for integrity).
520
$a
We investigate a diversity of malicious attacks against wireless sensor networks and design a number of practical schemes for establishing pairwise keys between sensor nodes, filtering false data injection and DoS attacks, and securing network coding against pollution attacks for wireless sensor networks. Our contributions from this research are fourfold: (1) We give a taxonomy of malicious attacks for wireless sensor networks. (2) We design a group-based key management scheme using deployment knowledge for wireless sensor networks to establish pair-wise keys between sensor nodes. (3) We propose an en-route scheme for filtering false data injection and DoS attacks in wireless sensor networks. (4) We present two efficient schemes for securing normal and XOR network coding against pollution attacks. Simulation and experimental results show that our solutions outperform existing ones and are suitable for resource-constrained wireless sensor networks in terms of computation overhead, communication cost, memory requirement, and so on.
590
$a
School code: 0097.
650
4
$a
Computer Science.
$3
626642
690
$a
0984
710
2
$a
Iowa State University.
$b
Electrical and Computer Engineering.
$3
1018524
773
0
$t
Dissertation Abstracts International
$g
70-05B.
790
$a
0097
790
1 0
$a
Govindarasu, Manimaran
$e
committee member
790
1 0
$a
Guan, Yong,
$e
advisor
790
1 0
$a
Qiao, Daji
$e
committee member
790
1 0
$a
Somani, Arun
$e
committee member
790
1 0
$a
Wang, Johnny
$e
committee member
791
$a
Ph.D.
792
$a
2009
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3355501
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9082027
電子資源
11.線上閱覽_V
電子書
EB W9082027
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入