語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security in wireless sensor networks.
~
Zhou, Yun.
FindBook
Google Book
Amazon
博客來
Security in wireless sensor networks.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Security in wireless sensor networks./
作者:
Zhou, Yun.
面頁冊數:
213 p.
附註:
Adviser: Yuguang Fang.
Contained By:
Dissertation Abstracts International68-09B.
標題:
Computer Science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3281635
ISBN:
9780549241140
Security in wireless sensor networks.
Zhou, Yun.
Security in wireless sensor networks.
- 213 p.
Adviser: Yuguang Fang.
Thesis (Ph.D.)--University of Florida, 2007.
Rapid advances in wired/wireless networking technology are gradually expanding the realm of ubiquitous high-speed network access. Such a process also encounters more and more threats and attacks from those who exploit vulnerabilities in networks. This has been motivating research on security in wireless networks.
ISBN: 9780549241140Subjects--Topical Terms:
626642
Computer Science.
Security in wireless sensor networks.
LDR
:04140nam 2200313 a 45
001
941088
005
20110518
008
110518s2007 ||||||||||||||||| ||eng d
020
$a
9780549241140
035
$a
(UMI)AAI3281635
035
$a
AAI3281635
040
$a
UMI
$c
UMI
100
1
$a
Zhou, Yun.
$3
1265226
245
1 0
$a
Security in wireless sensor networks.
300
$a
213 p.
500
$a
Adviser: Yuguang Fang.
500
$a
Source: Dissertation Abstracts International, Volume: 68-09, Section: B, page: 6212.
502
$a
Thesis (Ph.D.)--University of Florida, 2007.
520
$a
Rapid advances in wired/wireless networking technology are gradually expanding the realm of ubiquitous high-speed network access. Such a process also encounters more and more threats and attacks from those who exploit vulnerabilities in networks. This has been motivating research on security in wireless networks.
520
$a
Key establishment is the first step to develop all the other security mechanisms, because most security protocols depend on keys to operate correctly and provide desirable security performance. In my research, a scalable and deterministic key agreement model based on a multivariate polynomial and a multidimensional grid-based network topology was developed to enable key establishment in large scale networks with very low memory cost. I will show that my model can achieve the memory cost of several orders lower than the number of nodes in the network, while traditional models have the memory cost at the same order as the network size. My model has found applications in wireless sensor networks to establish hop-to-hop keys and end-to-end keys. In addition, I also proposed an access control protocol based on elliptic curve cryptography (ECC) for wireless sensor networks, which accomplishes node authentication and key establishment for new nodes. Different from conventional authentication methods, my protocol can defend against most well-recognized attacks in wireless sensor networks, and achieve better computation and communication performance due to the more efficient algorithms based on ECC.
520
$a
Authentication is critical to ensure the origin of a multicast stream in hostile environments. Conventional block-based schemes suffer from drawbacks such as vulnerability to packet loss, authentication latency and Denial of Service (DoS) attacks. In my research, I developed a novel multicast authentication scheme based on batch signatures. In particular, each packet in a stream is attached with a signature. The receiver authenticates multiple packets by checking their signatures through only one verification operation. I proposed three implementations including two novel batch signature schemes. My approach can achieve computational efficiency while avoiding the drawbacks of conventional block-based schemes. I also proposed a broadcast authentication protocol for wireless sensor networks based on symmetric key techniques. Compared with the conventional symmetric key solutions, my scheme does not require time synchronization, eliminates the requirement of key chain, supports broadcast for infinite rounds, and is efficient due to the use of symmetric key techniques.
520
$a
IEEE 802.16 (worldwide interoperability for microwave access, or WiMAX) is seen as a promising technology for next generation broadband wireless access, while security issues also draw the intentions in the literature. In my research, I analyzed the IEEE 802.16 standard and found out that though IEEE 802.16 provides some security measures in conventional one-hop networks, it is very vulnerable to malicious attacks in multihop environments such as wireless mesh networks. In order to strength the defense of IEEE 802.16 in mesh networks, I proposed a mesh-certificate-based access control and authentication scheme for WiMAX-based mesh networks.
590
$a
School code: 0070.
650
4
$a
Computer Science.
$3
626642
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
690
$a
0544
690
$a
0984
710
2
$a
University of Florida.
$3
718949
773
0
$t
Dissertation Abstracts International
$g
68-09B.
790
$a
0070
790
1 0
$a
Fang, Yuguang,
$e
advisor
791
$a
Ph.D.
792
$a
2007
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3281635
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9111062
電子資源
11.線上閱覽_V
電子書
EB W9111062
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入