語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Obfuscation of transmission fingerpr...
~
Rahbari, Hanif.
Obfuscation of transmission fingerprints for secure wireless communications.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Obfuscation of transmission fingerprints for secure wireless communications.
作者:
Rahbari, Hanif.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, 2016
面頁冊數:
171 p.
附註:
Source: Dissertation Abstracts International, Volume: 77-11(E), Section: B.
附註:
Adviser: Marwan Krunz.
Contained By:
Dissertation Abstracts International77-11B(E).
標題:
Computer engineering.
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10113272
ISBN:
9781339763927
Obfuscation of transmission fingerprints for secure wireless communications.
Rahbari, Hanif.
Obfuscation of transmission fingerprints for secure wireless communications.
- Ann Arbor : ProQuest Dissertations & Theses, 2016 - 171 p.
Source: Dissertation Abstracts International, Volume: 77-11(E), Section: B.
Thesis (Ph.D.)--The University of Arizona, 2016.
This item is not available from ProQuest Dissertations & Theses.
Our world of people and objects is on the verge of transforming to a world of highly-interconnected wireless devices. Incredible advances in wireless communications, hardware design, and power storage have facilitated hasty spread of wireless technologies in human life. In this new world, individuals are often identified and reached via one or multiple wireless devices that they always carry (e.g., smartphones, smart wearable, implantable medical devices, etc.), and their biometrics identities are replaced by their digital fingerprints. In near future, vehicles will be controlled and monitored via wireless monitoring systems and various physical objects (e.g., home appliance and retail store items) will be connected to the Internet. The list of these changes goes on. Unfortunately, as different aspects of our lives are being immerged in and dependent to wireless devices and services, we will become more vulnerable to wireless service/connection interruptions due to adversarial behavior and our privacy will become more potent to be exposed to adversaries. An adversary can learn the procedures of a wireless system and analyze its stages, and accordingly, launch various attacks against the operations of the system or the privacy of the people. Existing data confidentiality and integrity services (e.g., advanced encryption algorithms) have been able to prevent the leakage of users' messages. However, in wireless networks, even when upper-layer payloads are encrypted, the users' privacy and the operation of a wireless network can be threatened by the leakage of transmission attributes at the physical (PHY) layer. Examples of these attributes are payload size, frequency offset (FO), modulation scheme, and the transmission rate. These attributes can be exploited by an adversary to launch passive or active attacks. A passive attacker may learn about the interests, sexual orientation, political views, and patentable ideas of the user through analyzing these features, whereas an active attacker exploits captured attributes to launch selective packet jamming/dropping and disrupt wireless services. These call for novel privacy preserving techniques beyond encryption. In this dissertation, we study the vulnerability of current wireless systems to the leakage of transmission attributes at the PHY layer and propose several schemes to prevent it. (Abstract shortened by ProQuest.).
ISBN: 9781339763927Subjects--Topical Terms:
212944
Computer engineering.
Obfuscation of transmission fingerprints for secure wireless communications.
LDR
:03419nmm a2200313 4500
001
502061
005
20170619070722.5
008
170818s2016 ||||||||||||||||| ||eng d
020
$a
9781339763927
035
$a
(MiAaPQ)AAI10113272
035
$a
AAI10113272
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Rahbari, Hanif.
$3
766032
245
1 0
$a
Obfuscation of transmission fingerprints for secure wireless communications.
260
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2016
300
$a
171 p.
500
$a
Source: Dissertation Abstracts International, Volume: 77-11(E), Section: B.
500
$a
Adviser: Marwan Krunz.
502
$a
Thesis (Ph.D.)--The University of Arizona, 2016.
506
$a
This item is not available from ProQuest Dissertations & Theses.
520
$a
Our world of people and objects is on the verge of transforming to a world of highly-interconnected wireless devices. Incredible advances in wireless communications, hardware design, and power storage have facilitated hasty spread of wireless technologies in human life. In this new world, individuals are often identified and reached via one or multiple wireless devices that they always carry (e.g., smartphones, smart wearable, implantable medical devices, etc.), and their biometrics identities are replaced by their digital fingerprints. In near future, vehicles will be controlled and monitored via wireless monitoring systems and various physical objects (e.g., home appliance and retail store items) will be connected to the Internet. The list of these changes goes on. Unfortunately, as different aspects of our lives are being immerged in and dependent to wireless devices and services, we will become more vulnerable to wireless service/connection interruptions due to adversarial behavior and our privacy will become more potent to be exposed to adversaries. An adversary can learn the procedures of a wireless system and analyze its stages, and accordingly, launch various attacks against the operations of the system or the privacy of the people. Existing data confidentiality and integrity services (e.g., advanced encryption algorithms) have been able to prevent the leakage of users' messages. However, in wireless networks, even when upper-layer payloads are encrypted, the users' privacy and the operation of a wireless network can be threatened by the leakage of transmission attributes at the physical (PHY) layer. Examples of these attributes are payload size, frequency offset (FO), modulation scheme, and the transmission rate. These attributes can be exploited by an adversary to launch passive or active attacks. A passive attacker may learn about the interests, sexual orientation, political views, and patentable ideas of the user through analyzing these features, whereas an active attacker exploits captured attributes to launch selective packet jamming/dropping and disrupt wireless services. These call for novel privacy preserving techniques beyond encryption. In this dissertation, we study the vulnerability of current wireless systems to the leakage of transmission attributes at the PHY layer and propose several schemes to prevent it. (Abstract shortened by ProQuest.).
590
$a
School code: 0009.
650
4
$a
Computer engineering.
$3
212944
650
4
$a
Computer science.
$3
199325
650
4
$a
Electrical engineering.
$3
454503
690
$a
0464
690
$a
0984
690
$a
0544
710
2
$a
The University of Arizona.
$b
Electrical and Computer Engineering.
$3
766033
773
0
$t
Dissertation Abstracts International
$g
77-11B(E).
790
$a
0009
791
$a
Ph.D.
792
$a
2016
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10113272
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000134999
電子館藏
1圖書
學位論文
TH 2016
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10113272
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入