首页> 外文学位 >Covert channels and anonymous communication in ad hoc networks.
【24h】

Covert channels and anonymous communication in ad hoc networks.

机译:临时网络中的秘密渠道和匿名通信。

获取原文
获取原文并翻译 | 示例

摘要

Ad-hoc wireless networks distinguish themselves from their traditional wired counterparts by three unique characteristics: mobility, lack of infrastructure, and shared wireless channel. These properties have gained popularity in various military and civilian applications, but have also introduced challenging problems in terms of ensuring satisfying network performance and network security. Ad hoc networks are a fertile ground for new threats and security problems.; We start by demonstrating how new covert attacks can be launched by using the ad hoc network protocols. In particular, nodes in ad-hoc wireless networks have to cooperate with each other in order to accomplish many networking functions such as routing and channel access. We observe that covert information can be conveyed during the cooperation procedure. It is very difficult to eliminate or even detect these covert channels. Simulation results show that performance of these covert channels depends on various network characteristics.; Anonymous communication has been considered as one possible way of fighting covert threats. In fact, anonymity and privacy by themselves have attracted intensive attention as important societal issues and desirable security features. One of the key components in most anonymous routing protocols is anonymous trapdoors, for which we propose a new construction scheme based on pairing-based cryptographies.; More careful analysis has shown that anonymity could be in conflict with other secure properties and secure mechanisms, such as accountability and intrusion detection. We propose a solution that can flexibly trade off anonymity against accountability according to the needs of individual applications. The basic idea is to distribute the real identity of a given user among a set of pseudonyms in such a way that only a sufficient number of pseudonyms can lead to the recovery of the identity. Users authenticate each other anonymously under pseudonyms. When the number of times a user is caught misbehaving exceeds the threshold, the user's real identity can be recovered from the pseudonyms that had been used. Thus, accountability is enforced.; As conclusion, we propose to jointly investigate and incorporate all different secure properties by using various secure mechanisms across multiple protocol layers of the network.
机译:临时无线网络通过三个独特的特征与传统的有线网络区别开来:移动性,缺乏基础设施以及共享的无线信道。这些特性已经在各种军事和民用应用中得到普及,但是在确保令人满意的网络性能和网络安全性方面也引入了挑战性的问题。临时网络是新威胁和安全问题的沃土。我们首先说明如何使用ad hoc网络协议发起新的秘密攻击。特别是,自组织无线网络中的节点必须彼此协作才能完成许多网络功能,例如路由和信道访问。我们观察到秘密信息可以在合作过程中传达。消除甚至检测这些隐蔽通道非常困难。仿真结果表明,这些隐蔽信道的性能取决于各种网络特性。匿名通信已被认为是对抗秘密威胁的一种可能方法。实际上,匿名和隐私本身已作为重要的社会问题和理想的安全功能引起了广泛的关注。大多数匿名路由协议中的关键组件之一是匿名陷门,为此我们提出了一种基于基于配对的密码的新构造方案。更仔细的分析表明,匿名性可能与其他安全属性和安全机制(例如责任制和入侵检测)冲突。我们提出了一种解决方案,可以根据各个应用程序的需求灵活地权衡匿名与责任制。基本思想是,以只有足够数量的假名才能导致身份恢复的方式,在一组假名中分配给定用户的真实身份。用户以假名彼此进行匿名身份验证。当捕获到用户行为不当的次数超过阈值时,可以从使用的假名中恢复用户的真实身份。因此,强制执行问责制。作为结论,我们建议通过跨网络多个协议层使用各种安全机制来共同研究和合并所有不同的安全属性。

著录项

  • 作者

    Li, Song.;

  • 作者单位

    University of Maryland, College Park.$bElectrical Engineering.;

  • 授予单位 University of Maryland, College Park.$bElectrical Engineering.;
  • 学科 Engineering Electronics and Electrical.
  • 学位 Ph.D.
  • 年度 2007
  • 页码 100 p.
  • 总页数 100
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 无线电电子学、电信技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号