首页> 外文学位 >Securing network resources in opportunistic and delay-tolerant networks.
【24h】

Securing network resources in opportunistic and delay-tolerant networks.

机译:在机会和延迟容忍的网络中保护网络资源。

获取原文
获取原文并翻译 | 示例

摘要

In this thesis we investigate security problems of delay- and disruption-tolerant networks operating in challenged environments. In these settings, providing even basic services presents unique challenges due to environmental and infrastructure constraints. One challenge is to establish a private communication channel when peer security credentials are unknown or unobtainable. A second challenge is to secure personal resource contributions from abusive users when public access is uncontrolled.We investigate the above issues while focusing on two application scenarios: rural-area communication networks and ad-hoc personal device networks. First, we consider a method for establishing an initial security context using casual information that links users to well-known entities. Next, we investigate several secure resource management algorithms for controlling abusive users. Finally, we relax authentication requirements of our resource management algorithms to reduce overhead and support fragmentation. We evaluate proposed techniques through simulations and analysis.The main research contributions of this thesis are: 1. Novel Secure Initial Context Establishment Protocol: We suggest a simple technique for achieving secure communication by leveraging casual information to establish an initial security context. This knowledge links users to a more prominent entity whose security credentials are likely to be well-known. We evaluate the proposed technique by analyzing real-world social network data and simulating intra- and inter-region communication scenarios. 2. Resource Management Schemes: To prevent users from sending more personal data and forwarding less peer data we propose and experimentally evaluate a basic technique based on coarse-grained priority classes. User or node authentication can be the basis for constructing priority classes. We use simulations to show the effectiveness of the basic technique for handling abusive users. We also consider three extensions for handling trusted senders who may become abusive. 3. Impact of Fragmentation on Resource Management Schemes: Fragmentation improves message delivery ratios by optimizing limited contact. However, it negates the benefits of resource management when fragments cannot be authenticated. We extend our previous resource management schemes to support fragmentation and reassess their effectiveness. 4. Best-Effort Authentication: Best-effort relaxes full authentication assumptions required by intermediaries in our previous networking scenarios. We propose two techniques for implementing best-effort authentication and investigate their effectiveness in resource management algorithms. Simulations show that this approach is feasible for our target application scenario even when false positive rates are high. xvi
机译:在本文中,我们研究了在挑战性环境中运行的延迟和中断容忍网络的安全问题。在这些情况下,由于环境和基础架构的限制,即使提供基本服务也面临独特的挑战。一个挑战是在对等安全凭证未知或无法获得时建立专用通信通道。第二个挑战是在公共访问不受控制的情况下确保滥用用户的个人资源贡献。我们在着重于两种应用场景的同时研究了上述问题:农村通信网络和临时个人设备网络。首先,我们考虑一种使用临时信息(将用户链接到知名实体)建立初始安全性上下文的方法。接下来,我们研究几种用于控制滥用用户的安全资源管理算法。最后,我们放宽了资源管理算法的身份验证要求,以减少开销并支持分段。我们通过仿真和分析来评估所提出的技术。本论文的主要研究贡献是:1.新颖的安全初始上下文建立协议:我们提出了一种简单的技术,可以利用临时信息建立初始安全上下文来实现安全通信。该知识将用户链接到一个更著名的实体,该实体的安全凭据可能是众所周知的。我们通过分析现实世界中的社交网络数据并模拟区域内和区域间的通信场景来评估所提出的技术。 2.资源管理方案:为了防止用户发送更多的个人数据并转发较少的对等数据,我们提出并实验性地评估了基于粗粒度优先级的基本技术。用户或节点身份验证可以是构造优先级类别的基础。我们使用模拟来显示处理滥用用户的基本技术的有效性。我们还考虑了三个扩展,用于处理可能滥用的受信任的发件人。 3.碎片对资源管理方案的影响:碎片通过优化有限的联系来提高邮件传递率。但是,当片段无法通过身份验证时,它将抵消资源管理的优势。我们扩展了以前的资源管理计划,以支持分散并重新评估其有效性。 4.尽力而为身份验证:尽力而为放松了我们以前的网络场景中中介机构要求的完整身份验证假设。我们提出了两种用于实现尽力而为身份验证的技术,并研究了它们在资源管理算法中的有效性。仿真表明,即使误报率很高,这种方法对于我们的目标应用场景也是可行的。十六

著录项

  • 作者

    Solis, John.;

  • 作者单位

    University of California, Irvine.;

  • 授予单位 University of California, Irvine.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2010
  • 页码 127 p.
  • 总页数 127
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号