語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Anonymity protection and access cont...
~
Li, Bing.
FindBook
Google Book
Amazon
博客來
Anonymity protection and access control in mobile network environment.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Anonymity protection and access control in mobile network environment./
作者:
Li, Bing.
面頁冊數:
130 p.
附註:
Source: Dissertation Abstracts International, Volume: 77-12(E), Section: B.
Contained By:
Dissertation Abstracts International77-12B(E).
標題:
Computer science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10144309
ISBN:
9781339994710
Anonymity protection and access control in mobile network environment.
Li, Bing.
Anonymity protection and access control in mobile network environment.
- 130 p.
Source: Dissertation Abstracts International, Volume: 77-12(E), Section: B.
Thesis (Ph.D.)--Arizona State University, 2016.
Wireless communication technologies have been playing an important role in modern society. Due to its inherent mobility property, wireless networks are more vulnerable to passive attacks than traditional wired networks. Anonymity, as an important issue in mobile network environment, serves as the first topic that leads to all the research work presented in this manuscript. Specifically, anonymity issue in Mobile Ad hoc Networks (MANETs) is discussed with details as the first section of research.
ISBN: 9781339994710Subjects--Topical Terms:
523869
Computer science.
Anonymity protection and access control in mobile network environment.
LDR
:03718nmm a2200301 4500
001
2114931
005
20161128141949.5
008
180830s2016 ||||||||||||||||| ||eng d
020
$a
9781339994710
035
$a
(MiAaPQ)AAI10144309
035
$a
AAI10144309
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Li, Bing.
$3
1258133
245
1 0
$a
Anonymity protection and access control in mobile network environment.
300
$a
130 p.
500
$a
Source: Dissertation Abstracts International, Volume: 77-12(E), Section: B.
500
$a
Adviser: Dijiang Huang.
502
$a
Thesis (Ph.D.)--Arizona State University, 2016.
520
$a
Wireless communication technologies have been playing an important role in modern society. Due to its inherent mobility property, wireless networks are more vulnerable to passive attacks than traditional wired networks. Anonymity, as an important issue in mobile network environment, serves as the first topic that leads to all the research work presented in this manuscript. Specifically, anonymity issue in Mobile Ad hoc Networks (MANETs) is discussed with details as the first section of research.
520
$a
To thoroughly study on this topic, the presented work approaches it from an attacker's perspective. Under a perfect scenario, all the traffic in a targeted MANET exhibits the communication relations to a passive attacker. However, localization errors pose a significant influence on the accuracy of the derived communication patterns. To handle such issue, a new scheme is proposed to generate super nodes, which represent the activities of user groups in the target MANET. This scheme also helps reduce the scale of monitoring work by grouping users based on their behaviors.
520
$a
The first part of work on anonymity in MANET leads to the thought on its major cause. The link-based communication pattern is a key contributor to the success of the traffic analysis attack. A natural way to circumvent such issue is to use link-less approaches. Information Centric Networking (ICN) is a typical instance of such kind. Its communication pattern is able to overcome the anonymity issue with MANET. However, it also comes with its own shortcomings. One of them is access control enforcement. To tackle this issue, a new naming scheme for contents transmitted in ICN networks is presented. This scheme is based on a new Attribute-Based Encryption (ABE) algorithm. It enforces access control in ICN with minimum requirements on additional network components.
520
$a
Following the research work on ABE, an important function, delegation, exhibits a potential security issue. In traditional ABE schemes, Ciphertext-Policy ABE (CP-ABE), a user is able to generate a subset of authentic attribute key components for other users using delegation function. This capability is not monitored or controlled by the trusted third party (TTP) in the cryptosystem. A direct threat caused from this issue is that any user may intentionally or unintentionally lower the standards for attribute assignments. Unauthorized users/attackers may be able to obtain their desired attributes through a delegation party instead of directly from the TTP. As the third part of work presented in this manuscript, a three-level delegation restriction architecture is proposed. Furthermore, a delegation restriction scheme following this architecture is also presented. This scheme allows the TTP to have full control on the delegation function of all its direct users.
590
$a
School code: 0010.
650
4
$a
Computer science.
$3
523869
690
$a
0984
710
2
$a
Arizona State University.
$b
Computer Science.
$3
1676136
773
0
$t
Dissertation Abstracts International
$g
77-12B(E).
790
$a
0010
791
$a
Ph.D.
792
$a
2016
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10144309
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9325553
電子資源
01.外借(書)_YB
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入