首页> 外文学位 >Secure, robust and trusted communications in wireless networks.
【24h】

Secure, robust and trusted communications in wireless networks.

机译:无线网络中的安全,可靠和可靠的通信。

获取原文
获取原文并翻译 | 示例

摘要

This dissertation adopts a "data-first" approach for improving robustness and security guarantees in wireless communications: it provides solutions for robust data delivery under several threat and failure models associated with diverse network settings. The emphasis is on mitigating risks from exploits that target open-air properties of the wireless media. Two parallel streams of work address dominant data communication and design issues in Wireless Data Networks (WDNs, which include Mobile Ad-hoc and Wireless Mesh Networks) and Wireless Sensor Networks (WSNs).; In line with the bottom-up approach in WDNs, the first scenario evaluated is survivable architectures for Wireless LANs (WLANs). This forms the basis for designing a broad Traffic Splitting Paradigm (TSP) at the Network layer for Mobile Ad-hoc and Wireless Mesh networks. Under TSP, mesh and ad-hoc nodes split and simultaneously schedule their traffic through multiple available routes to the destination. This dissertation is the first to use simultaneous activation of multiple paths. A mesh node can connect to multiple mesh routers over multiple wireless hops. If the mesh routers are connected together via a backbone network, then a node's traffic to the distribution system can be split across several paths to connected routers and a low cost reassembly of this traffic can be performed at the distribution system. This shifts the bottleneck from the wireless medium to the distribution system.; To validate the efficacy of the traffic splitting protocol (TSP) from security and robustness viewpoints, a unique approach emulating adversarial behavior is adopted. In this approach, attacks are launched against both traffic splitting and single path protocols and the success probabilities for such attacks are compared. It is demonstrated that traffic splitting paradigms are provably resilient to jamming, blocking, node isolation, and network partition-type attacks.; The broad term "Trust" is loosely coined to model selfish and greedy adversarial behavior as well as ambient network conditions like channel congestion that are detrimental to wireless networks performance. A trust-based environment aware routing scheme dynamically schedules traffic across several available routes in response to changing route conditions. A variant of the Trust Model is also used as basis for key establishment and key management decisions in the network if the network uses encryption protocols. Under current schemes, keys are established with a node as long as it has not been declared malicious previously.; The TSP is limited in its effectiveness by the conventional CSMA/CA protocol at the MAC layer. IEEE 802.11 forces nodes to contend for channel access, promoting selfish behavior. For a node to successfully split and effectively schedule traffic through its neighbors, a contention avoiding cooperative MAC would be necessary. Multi-hop Wireless MAC (MWMAC) protocol is developed for this purpose. Under MWMAC, neighboring nodes schedule transmission intervals cooperatively and this reduces channel contention.; The second stream of research is in the wireless sensor domain. Misaggregation and unaccounted data loss are amongst the most critical open problems in WSNs: it is hard to distinguish them from in-network-processing and passive participation, which are genuine techniques used for reducing communication and computation overhead. Here, a framework based on sampling-theory and cryptographic-techniques and comprising of non-interactive proofs and proxy reports is developed to bound the error margins in reported values and enable the Base Stations to detect outliers and potential cheating by aggregator nodes. The framework is marked by its simplicity and practical usability: all verification and error checking by the BS are performed in a single round of communication.; The validation of the schemes presented in this dissertation is performed by a combined approach consisting of simulations, proof
机译:本文采用“数据优先”的方法来提高无线通信的健壮性和安全性保证:它为在与多种网络设置相关的几种威胁和故障模型下的稳健数据传递提供了解决方案。重点在于减轻针对无线媒体的露天属性的利用所带来的风险。两个并行的工作流解决了无线数据网络(WDN,包括移动自组织和无线网状网络)和无线传感器网络(WSN)中的主要数据通信和设计问题。与WDN中的自下而上方法一致,所评估的第一种情况是无线LAN(WLAN)的可生存体系结构。这构成了在网络层为移动自组织和无线网状网络设计广泛的流量分配范例(TSP)的基础。在TSP下,网状和临时节点进行拆分,并同时通过到目的地的多个可用路由来调度其流量。本文是第一个使用同时激活多个路径的论文。网格节点可以通过多个无线跃点连接到多个网格路由器。如果网状路由器通过骨干网连接在一起,则节点到分发系统的流量可以通过连接到路由器的多条路径分配,并且可以在分发系统上以低成本重组该流量。这将瓶颈从无线介质转移到分发系统。为了从安全性和鲁棒性的角度验证流量拆分协议(TSP)的有效性,采用了一种独特的模拟对抗行为的方法。在这种方法中,针对流量拆分和单路径协议均发起了攻击,并比较了此类攻击的成功概率。事实证明,流量分割范例可证明对干扰,阻塞,节点隔离和网络分区类型的攻击具有弹性。广义上的“信任”一词是为自私和贪婪的对抗行为以及不利于无线网络性能的环境网络条件(例如信道拥塞)建模的。基于信任的环境感知路由方案可响应不断变化的路由条件动态调度跨多个可用路由的流量。如果网络使用加密协议,则信任模型的变体还可以用作网络中密钥建立和密钥管理决策的基础。在当前方案下,只要以前未将其声明为恶意节点,就可以使用节点建立密钥。 TSP的有效性受到MAC层上常规CSMA / CA协议的限制。 IEEE 802.11强制节点争夺信道访问权限,从而促进自私行为。为了使节点成功拆分并有效调度通过其邻居的流量,避免协作MAC的竞争将是必要的。为此,开发了多跳无线MAC(MWMAC)协议。在MWMAC下,相邻节点协同调度传输间隔,这减少了信道争用。第二项研究是在无线传感器领域。错误聚集和无法说明的数据丢失是WSN中最关键的开放问题:很难将它们与网络内处理和被动参与区分开来,后者是用于减少通信和计算开销的真正技术。在这里,一个基于抽样理论和密码技术的框架被开发出来,该框架包括非交互式证据和代理报告,以限制报告值中的误差幅度,并使基站能够检测异常值和聚合器节点的潜在作弊行为。该框架以其简单性和实用性而著称:BS的所有验证和错误检查均在单轮通信中执行。本文提出的方案的验证是通过模拟,证明等组合方法进行的。

著录项

  • 作者

    Virendra, Mohit.;

  • 作者单位

    State University of New York at Buffalo.$bComputer Science and Engineering.;

  • 授予单位 State University of New York at Buffalo.$bComputer Science and Engineering.;
  • 学科 Engineering Electronics and Electrical.; Computer Science.
  • 学位 Ph.D.
  • 年度 2008
  • 页码 212 p.
  • 总页数 212
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 无线电电子学、电信技术;自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号