語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Securing communication in dynamic ne...
~
Wang, Pan.
FindBook
Google Book
Amazon
博客來
Securing communication in dynamic network environments.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Securing communication in dynamic network environments./
作者:
Wang, Pan.
面頁冊數:
132 p.
附註:
Adviser: Douglas S. Reeves.
Contained By:
Dissertation Abstracts International68-06B.
標題:
Computer Science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3269470
ISBN:
9780549078609
Securing communication in dynamic network environments.
Wang, Pan.
Securing communication in dynamic network environments.
- 132 p.
Adviser: Douglas S. Reeves.
Thesis (Ph.D.)--North Carolina State University, 2007.
In dynamic network environments, users may come from different domains, and the number of users and the network topology may change unpredictably over time. How to protect the users' communication in such dynamic environments, therefore, is extremely challenging. This dissertation has investigated multiple research problems related to securing users' communication in dynamic network environments, focusing on two kinds of dynamic networks, i.e., mobile ad hoc networks and overlay networks. It first introduces a secure address auto-configuration scheme for mobile ad hoc networks, since a precondition of network communication is that each user is configured with a unique network identifier (address). This proposed auto-configuration scheme binds each address with a public key, allows a user to self-authenticate itself, and thus greatly thwarts the address spoofing attacks, in the absence of centralized authentication services. Next, this thesis presents two storage-efficient stateless group key distribution schemes to protect the group communication of a dynamic set of users. These two key distribution schemes utilize one-way key chains with a logical tree. They allow an authorized user to get updated group keys even if the user goes off-line for a while, and significantly reduce the storage requirement at each user if compared with previous stateless key distribution schemes. Third, this thesis investigates the solution using cryptographic methods to enforce network access control in mobile ad hoc networks, whose dynamic natures make it difficult to directly apply traditional access control techniques such as firewalls. A functioning prototype demonstrates the proposed access control system is practical and effective. Finally, this dissertation introduces a k-anonymity communication protocol for overlay networks to protect the privacy of users' communication. Unlike the existing anonymous communication protocols that either cannot provide provable anonymity or suffer from transmission collision, the proposed protocol is transmission collision free and provides provable k-anonymity for both the sender and the recipient. The analysis shows the proposed anonymous communication protocol is secure even under a strong adversary model, in which the adversary controls a fraction of nodes, is able to eavesdrop all network traffic and maliciously modify/replay the transmitted messages. A proof-of-concept implementation demonstrates the proposed protocol is practical.
ISBN: 9780549078609Subjects--Topical Terms:
626642
Computer Science.
Securing communication in dynamic network environments.
LDR
:03373nam 2200277 a 45
001
941009
005
20110518
008
110518s2007 ||||||||||||||||| ||eng d
020
$a
9780549078609
035
$a
(UMI)AAI3269470
035
$a
AAI3269470
040
$a
UMI
$c
UMI
100
1
$a
Wang, Pan.
$3
1265149
245
1 0
$a
Securing communication in dynamic network environments.
300
$a
132 p.
500
$a
Adviser: Douglas S. Reeves.
500
$a
Source: Dissertation Abstracts International, Volume: 68-06, Section: B, page: 3915.
502
$a
Thesis (Ph.D.)--North Carolina State University, 2007.
520
$a
In dynamic network environments, users may come from different domains, and the number of users and the network topology may change unpredictably over time. How to protect the users' communication in such dynamic environments, therefore, is extremely challenging. This dissertation has investigated multiple research problems related to securing users' communication in dynamic network environments, focusing on two kinds of dynamic networks, i.e., mobile ad hoc networks and overlay networks. It first introduces a secure address auto-configuration scheme for mobile ad hoc networks, since a precondition of network communication is that each user is configured with a unique network identifier (address). This proposed auto-configuration scheme binds each address with a public key, allows a user to self-authenticate itself, and thus greatly thwarts the address spoofing attacks, in the absence of centralized authentication services. Next, this thesis presents two storage-efficient stateless group key distribution schemes to protect the group communication of a dynamic set of users. These two key distribution schemes utilize one-way key chains with a logical tree. They allow an authorized user to get updated group keys even if the user goes off-line for a while, and significantly reduce the storage requirement at each user if compared with previous stateless key distribution schemes. Third, this thesis investigates the solution using cryptographic methods to enforce network access control in mobile ad hoc networks, whose dynamic natures make it difficult to directly apply traditional access control techniques such as firewalls. A functioning prototype demonstrates the proposed access control system is practical and effective. Finally, this dissertation introduces a k-anonymity communication protocol for overlay networks to protect the privacy of users' communication. Unlike the existing anonymous communication protocols that either cannot provide provable anonymity or suffer from transmission collision, the proposed protocol is transmission collision free and provides provable k-anonymity for both the sender and the recipient. The analysis shows the proposed anonymous communication protocol is secure even under a strong adversary model, in which the adversary controls a fraction of nodes, is able to eavesdrop all network traffic and maliciously modify/replay the transmitted messages. A proof-of-concept implementation demonstrates the proposed protocol is practical.
590
$a
School code: 0155.
650
4
$a
Computer Science.
$3
626642
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
690
$a
0544
690
$a
0984
710
2
$a
North Carolina State University.
$3
1018772
773
0
$t
Dissertation Abstracts International
$g
68-06B.
790
$a
0155
790
1 0
$a
Reeves, Douglas S.,
$e
advisor
791
$a
Ph.D.
792
$a
2007
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3269470
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9110983
電子資源
11.線上閱覽_V
電子書
EB W9110983
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入