Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Anonymity protection and access cont...
~
Li, Bing.
Linked to FindBook
Google Book
Amazon
博客來
Anonymity protection and access control in mobile network environment.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Anonymity protection and access control in mobile network environment./
Author:
Li, Bing.
Description:
130 p.
Notes:
Source: Dissertation Abstracts International, Volume: 77-12(E), Section: B.
Contained By:
Dissertation Abstracts International77-12B(E).
Subject:
Computer science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10144309
ISBN:
9781339994710
Anonymity protection and access control in mobile network environment.
Li, Bing.
Anonymity protection and access control in mobile network environment.
- 130 p.
Source: Dissertation Abstracts International, Volume: 77-12(E), Section: B.
Thesis (Ph.D.)--Arizona State University, 2016.
Wireless communication technologies have been playing an important role in modern society. Due to its inherent mobility property, wireless networks are more vulnerable to passive attacks than traditional wired networks. Anonymity, as an important issue in mobile network environment, serves as the first topic that leads to all the research work presented in this manuscript. Specifically, anonymity issue in Mobile Ad hoc Networks (MANETs) is discussed with details as the first section of research.
ISBN: 9781339994710Subjects--Topical Terms:
523869
Computer science.
Anonymity protection and access control in mobile network environment.
LDR
:03718nmm a2200301 4500
001
2114931
005
20161128141949.5
008
180830s2016 ||||||||||||||||| ||eng d
020
$a
9781339994710
035
$a
(MiAaPQ)AAI10144309
035
$a
AAI10144309
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Li, Bing.
$3
1258133
245
1 0
$a
Anonymity protection and access control in mobile network environment.
300
$a
130 p.
500
$a
Source: Dissertation Abstracts International, Volume: 77-12(E), Section: B.
500
$a
Adviser: Dijiang Huang.
502
$a
Thesis (Ph.D.)--Arizona State University, 2016.
520
$a
Wireless communication technologies have been playing an important role in modern society. Due to its inherent mobility property, wireless networks are more vulnerable to passive attacks than traditional wired networks. Anonymity, as an important issue in mobile network environment, serves as the first topic that leads to all the research work presented in this manuscript. Specifically, anonymity issue in Mobile Ad hoc Networks (MANETs) is discussed with details as the first section of research.
520
$a
To thoroughly study on this topic, the presented work approaches it from an attacker's perspective. Under a perfect scenario, all the traffic in a targeted MANET exhibits the communication relations to a passive attacker. However, localization errors pose a significant influence on the accuracy of the derived communication patterns. To handle such issue, a new scheme is proposed to generate super nodes, which represent the activities of user groups in the target MANET. This scheme also helps reduce the scale of monitoring work by grouping users based on their behaviors.
520
$a
The first part of work on anonymity in MANET leads to the thought on its major cause. The link-based communication pattern is a key contributor to the success of the traffic analysis attack. A natural way to circumvent such issue is to use link-less approaches. Information Centric Networking (ICN) is a typical instance of such kind. Its communication pattern is able to overcome the anonymity issue with MANET. However, it also comes with its own shortcomings. One of them is access control enforcement. To tackle this issue, a new naming scheme for contents transmitted in ICN networks is presented. This scheme is based on a new Attribute-Based Encryption (ABE) algorithm. It enforces access control in ICN with minimum requirements on additional network components.
520
$a
Following the research work on ABE, an important function, delegation, exhibits a potential security issue. In traditional ABE schemes, Ciphertext-Policy ABE (CP-ABE), a user is able to generate a subset of authentic attribute key components for other users using delegation function. This capability is not monitored or controlled by the trusted third party (TTP) in the cryptosystem. A direct threat caused from this issue is that any user may intentionally or unintentionally lower the standards for attribute assignments. Unauthorized users/attackers may be able to obtain their desired attributes through a delegation party instead of directly from the TTP. As the third part of work presented in this manuscript, a three-level delegation restriction architecture is proposed. Furthermore, a delegation restriction scheme following this architecture is also presented. This scheme allows the TTP to have full control on the delegation function of all its direct users.
590
$a
School code: 0010.
650
4
$a
Computer science.
$3
523869
690
$a
0984
710
2
$a
Arizona State University.
$b
Computer Science.
$3
1676136
773
0
$t
Dissertation Abstracts International
$g
77-12B(E).
790
$a
0010
791
$a
Ph.D.
792
$a
2016
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10144309
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9325553
電子資源
01.外借(書)_YB
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login