語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Securing wireless sensor networks th...
~
Deng, Jing.
FindBook
Google Book
Amazon
博客來
Securing wireless sensor networks through intrusion tolerant design.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Securing wireless sensor networks through intrusion tolerant design./
作者:
Deng, Jing.
面頁冊數:
167 p.
附註:
Adviser: Richard Han.
Contained By:
Dissertation Abstracts International67-02B.
標題:
Computer Science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3207682
ISBN:
9780542552311
Securing wireless sensor networks through intrusion tolerant design.
Deng, Jing.
Securing wireless sensor networks through intrusion tolerant design.
- 167 p.
Adviser: Richard Han.
Thesis (Ph.D.)--University of Colorado at Boulder, 2006.
Wireless sensor networks (WSNs) are rapidly emerging as an important new area in the research community. To protect sensor networks from various kinds of digital and physical attacks, security is very important for sensor network research. However, security mechanisms on sensor networks are different from traditional networks according to the following combined constraints. First, the sensor node is highly resource constrained. It is composed of a slow CPU, limited memory, and limited battery power. Currently, public key algorithms are still very expensive for a sensor node. Second, since sensor nodes are deployed in in-situ environments, and there is typically no physical protection for sensor nodes, wireless sensor networks are vulnerable to physical attacks. Third, sensor nodes communicate through a wireless communication channel, so they must face almost all security problems found in traditional wireless networks, such as vulnerability to eavesdropping, insecure routing, etc.
ISBN: 9780542552311Subjects--Topical Terms:
626642
Computer Science.
Securing wireless sensor networks through intrusion tolerant design.
LDR
:02707nam 2200277 a 45
001
964196
005
20110901
008
110901s2006 eng d
020
$a
9780542552311
035
$a
(UMI)AAI3207682
035
$a
AAI3207682
040
$a
UMI
$c
UMI
100
1
$a
Deng, Jing.
$3
1287264
245
1 0
$a
Securing wireless sensor networks through intrusion tolerant design.
300
$a
167 p.
500
$a
Adviser: Richard Han.
500
$a
Source: Dissertation Abstracts International, Volume: 67-02, Section: B, page: 0975.
502
$a
Thesis (Ph.D.)--University of Colorado at Boulder, 2006.
520
$a
Wireless sensor networks (WSNs) are rapidly emerging as an important new area in the research community. To protect sensor networks from various kinds of digital and physical attacks, security is very important for sensor network research. However, security mechanisms on sensor networks are different from traditional networks according to the following combined constraints. First, the sensor node is highly resource constrained. It is composed of a slow CPU, limited memory, and limited battery power. Currently, public key algorithms are still very expensive for a sensor node. Second, since sensor nodes are deployed in in-situ environments, and there is typically no physical protection for sensor nodes, wireless sensor networks are vulnerable to physical attacks. Third, sensor nodes communicate through a wireless communication channel, so they must face almost all security problems found in traditional wireless networks, such as vulnerability to eavesdropping, insecure routing, etc.
520
$a
In my thesis, I designed, implemented, and evaluated a novel set of security mechanisms to protect data communication in wireless sensor networks. These mechanisms aim to provide intrusion tolerance, reliability, and fault tolerance for wireless sensor net works. The mechanisms include: the first comprehensive secure sensor network routing scheme (INSENS), which provides secure, intrusion tolerant, and scalable routing for wireless sensor networks; a secure hierarchical wireless sensor network framework; an intrusion tolerant pairwise key establishment scheme; prevention of denial of services attacks during data collection; and a set of decorrelating mechanisms to defend against traffic analysis attacks in wireless sensor networks. The implementations and simulations show the feasibility and efficiency of the proposed mechanisms.
590
$a
School code: 0051.
650
4
$a
Computer Science.
$3
626642
690
$a
0984
710
2 0
$a
University of Colorado at Boulder.
$3
1019435
773
0
$t
Dissertation Abstracts International
$g
67-02B.
790
$a
0051
790
1 0
$a
Han, Richard,
$e
advisor
791
$a
Ph.D.
792
$a
2006
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3207682
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9124656
電子資源
11.線上閱覽_V
電子書
EB W9124656
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入