首页> 外文OA文献 >Efficient network camouflaging in wireless networks
【2h】

Efficient network camouflaging in wireless networks

机译:无线网络中的有效网络伪装

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Camouflaging is about making something invisible or less visible. Networkcamouflaging is about hiding certain traffic information (e.g. traffic pattern, trafficflow identity, etc.) from internal and external eavesdroppers such that importantinformation cannot be deduced from it for malicious use. It is one of the most challengingsecurity requirements to meet in computer networks. Existing camouflagingtechniques such as traffic padding, MIX-net, etc., incur significant performance degradationwhen protected networks are wireless networks, such as sensor networks andmobile ad hoc networks. The reason is that wireless networks are typically subject toresource constraints (e.g. bandwidth, power supply) and possess some unique characteristics(e.g. broadcast, node mobility) that traditional wired networks do notpossess. This necessitates developing new techniques that take account of propertiesof wireless networks and are able to achieve a good balance between performance andsecurity.In this three-part dissertation we investigate techniques for providing networkcamouflaging services in wireless networks. In the first part, we address a specificproblem in a hierarchical multi-task sensor network, i.e. hiding the links betweenobservable traffic patterns and user interests. To solve the problem, a temporally constant traffic pattern, called cover traffic pattern, is needed. We describe two traf-fic padding schemes that implement the cover traffic pattern and provide algorithmsfor achieving the optimal energy efficiencies with each scheme. In the second part,we explore the design of a MIX-net based anonymity system in mobile ad hoc networks.The objective is to hide the source-destination relationship with respect toeach connection. We survey existing MIX route determination algorithms that donot account for dynamic network topology changes, which may result in high packetloss rate and large packet latency. We then introduce adaptive algorithms to overcomethis problem. In the third part, we explore the notion of providing anonymitysupport at MAC layer in wireless networks, which employs the broadcast propertyof wireless transmission. We design an IEEE 802.11-compliant MAC protocol thatprovides receiver anonymity for unicast frames and offers better reliability than purebroadcast protocol.
机译:伪装是关于使某物不可见或不那么可见。网络伪装是关于从内部和外部窃听者隐藏某些流量信息(例如,流量模式,流量标识等),以便无法从中推断出重要信息以进行恶意使用。这是计算机网络要满足的最具挑战性的安全要求之一。当受保护的网络是无线网络(例如传感器网络和移动自组织网络)时,现有的伪装技术(例如流量填充,MIX-net等)会导致性能显着下降。原因是无线网络通常会受到资源限制(例如带宽,电源)的约束,并具有传统有线网络所不具备的一些独特特征(例如广播,节点移动性)。因此,有必要开发一种新的技术来兼顾无线网络的特性,并在性能和安全性之间取得良好的平衡。在这一由三部分组成的论文中,我们研究了在无线网络中提供网络伪装服务的技术。在第一部分中,我们解决了分层多任务传感器网络中的一个特定问题,即隐藏了可观察到的流量模式和用户兴趣之间的联系。为了解决该问题,需要时间上恒定的交通模式,称为掩盖交通模式。我们描述了两种交通覆盖方案,这些方案实现了覆盖交通模式,并提供了用于实现每种方案的最佳能源效率的算法。在第二部分中,我们探索了移动自组织网络中基于MIX-net的匿名系统的设计。目标是隐藏每个连接的源-目的地关系。我们调查了现有的MIX路由确定算法,这些算法无法解决动态网络拓扑变化的问题,这可能会导致高丢包率和大包延迟。然后,我们介绍自适应算法来克服此问题。在第三部分中,我们探讨了在无线网络的MAC层提供匿名支持的概念,该概念利用了无线传输的广播特性。我们设计了一种符合IEEE 802.11的MAC协议,该协议为单播帧提供了接收者匿名性,并且比纯广播协议具有更高的可靠性。

著录项

  • 作者

    Jiang Shu;

  • 作者单位
  • 年度 2006
  • 总页数
  • 原文格式 PDF
  • 正文语种 en_US
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号