語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Securing wireless ad hoc networks un...
~
Yu, Wei.
FindBook
Google Book
Amazon
博客來
Securing wireless ad hoc networks under noise and imperfect monitoring.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Securing wireless ad hoc networks under noise and imperfect monitoring./
作者:
Yu, Wei.
面頁冊數:
223 p.
附註:
Adviser: K. J. Ray Liu.
Contained By:
Dissertation Abstracts International67-06B.
標題:
Engineering, Electronics and Electrical. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3222365
ISBN:
9780542732294
Securing wireless ad hoc networks under noise and imperfect monitoring.
Yu, Wei.
Securing wireless ad hoc networks under noise and imperfect monitoring.
- 223 p.
Adviser: K. J. Ray Liu.
Thesis (Ph.D.)--University of Maryland, College Park, 2006.
While wireless communication has dramatically changed the way people work and interact, the wireless era continues to be plagued by insufficient security. Without necessary countermeasures, even a few attackers can break down the whole network. On the other hand, attacker detection can be extremely challenging in realistic scenarios because misbehavior may also be caused by various other factors, such as noise and uncertainty, and perfect monitoring is either impossible to achieve or too expensive to afford. In this dissertation we have investigated how to secure wireless ad hoc networks against insider attacks in noisy and hostile environments, based only on local and imperfect monitoring.
ISBN: 9780542732294Subjects--Topical Terms:
626636
Engineering, Electronics and Electrical.
Securing wireless ad hoc networks under noise and imperfect monitoring.
LDR
:03247nam 2200289 a 45
001
970790
005
20110921
008
110921s2006 eng d
020
$a
9780542732294
035
$a
(UMI)AAI3222365
035
$a
AAI3222365
040
$a
UMI
$c
UMI
100
1
$a
Yu, Wei.
$3
676968
245
1 0
$a
Securing wireless ad hoc networks under noise and imperfect monitoring.
300
$a
223 p.
500
$a
Adviser: K. J. Ray Liu.
500
$a
Source: Dissertation Abstracts International, Volume: 67-06, Section: B, page: 3366.
502
$a
Thesis (Ph.D.)--University of Maryland, College Park, 2006.
520
$a
While wireless communication has dramatically changed the way people work and interact, the wireless era continues to be plagued by insufficient security. Without necessary countermeasures, even a few attackers can break down the whole network. On the other hand, attacker detection can be extremely challenging in realistic scenarios because misbehavior may also be caused by various other factors, such as noise and uncertainty, and perfect monitoring is either impossible to achieve or too expensive to afford. In this dissertation we have investigated how to secure wireless ad hoc networks against insider attacks in noisy and hostile environments, based only on local and imperfect monitoring.
520
$a
In traditional ad hoc network applications, nodes usually belong to the same authority and pursue some common goals. The inherent cooperative nature of such networks makes them extremely vulnerable to insider attacks. For example, by dropping other nodes' packets and/or injecting an overwhelming amount of traffic, insider attackers can easily break down the whole network. In this dissertation we have first studied how to secure such ad hoc networks against insider attacks under noise and imperfect monitoring. Besides devising a set of efficient monitoring and attacker detection mechanisms to defend against routing disruption and injecting traffic attacks, we have also formally analyzed the dynamic interactions between good nodes and attackers under a game theoretic framework, where both the optimal defending strategies and the maximum damage that can be caused by insider attackers have been derived.
520
$a
In many civilian applications, nodes in ad hoc networks tend to act selfishly. Stimulating selfish nodes to act cooperatively poses one key research challenge, especially in realistic contexts. In this dissertation we have also investigated how to design attack-resistant cooperation mechanisms for such networks. We have first designed an attack-resistant cooperation stimulation strategy for mobile ad hoc networks, then formally analyzed the issue of secure cooperation in ad hoc networks under a game theoretic framework. Finally, we have derived a set of reputation-based attack-resistant and cheat-proof cooperation strategies for such ad hoc networks that can work well in noisy and hostile environments under imperfect monitoring.
590
$a
School code: 0117.
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
690
$a
0544
710
2 0
$a
University of Maryland, College Park.
$3
657686
773
0
$t
Dissertation Abstracts International
$g
67-06B.
790
$a
0117
790
1 0
$a
Liu, K. J. Ray,
$e
advisor
791
$a
Ph.D.
792
$a
2006
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3222365
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9129267
電子資源
11.線上閱覽_V
電子書
EB W9129267
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入