Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Obfuscation of transmission fingerpr...
~
Rahbari, Hanif.
Obfuscation of transmission fingerprints for secure wireless communications.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Obfuscation of transmission fingerprints for secure wireless communications.
Author:
Rahbari, Hanif.
Published:
Ann Arbor : ProQuest Dissertations & Theses, 2016
Description:
171 p.
Notes:
Source: Dissertation Abstracts International, Volume: 77-11(E), Section: B.
Notes:
Adviser: Marwan Krunz.
Contained By:
Dissertation Abstracts International77-11B(E).
Subject:
Computer engineering.
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10113272
ISBN:
9781339763927
Obfuscation of transmission fingerprints for secure wireless communications.
Rahbari, Hanif.
Obfuscation of transmission fingerprints for secure wireless communications.
- Ann Arbor : ProQuest Dissertations & Theses, 2016 - 171 p.
Source: Dissertation Abstracts International, Volume: 77-11(E), Section: B.
Thesis (Ph.D.)--The University of Arizona, 2016.
This item is not available from ProQuest Dissertations & Theses.
Our world of people and objects is on the verge of transforming to a world of highly-interconnected wireless devices. Incredible advances in wireless communications, hardware design, and power storage have facilitated hasty spread of wireless technologies in human life. In this new world, individuals are often identified and reached via one or multiple wireless devices that they always carry (e.g., smartphones, smart wearable, implantable medical devices, etc.), and their biometrics identities are replaced by their digital fingerprints. In near future, vehicles will be controlled and monitored via wireless monitoring systems and various physical objects (e.g., home appliance and retail store items) will be connected to the Internet. The list of these changes goes on. Unfortunately, as different aspects of our lives are being immerged in and dependent to wireless devices and services, we will become more vulnerable to wireless service/connection interruptions due to adversarial behavior and our privacy will become more potent to be exposed to adversaries. An adversary can learn the procedures of a wireless system and analyze its stages, and accordingly, launch various attacks against the operations of the system or the privacy of the people. Existing data confidentiality and integrity services (e.g., advanced encryption algorithms) have been able to prevent the leakage of users' messages. However, in wireless networks, even when upper-layer payloads are encrypted, the users' privacy and the operation of a wireless network can be threatened by the leakage of transmission attributes at the physical (PHY) layer. Examples of these attributes are payload size, frequency offset (FO), modulation scheme, and the transmission rate. These attributes can be exploited by an adversary to launch passive or active attacks. A passive attacker may learn about the interests, sexual orientation, political views, and patentable ideas of the user through analyzing these features, whereas an active attacker exploits captured attributes to launch selective packet jamming/dropping and disrupt wireless services. These call for novel privacy preserving techniques beyond encryption. In this dissertation, we study the vulnerability of current wireless systems to the leakage of transmission attributes at the PHY layer and propose several schemes to prevent it. (Abstract shortened by ProQuest.).
ISBN: 9781339763927Subjects--Topical Terms:
212944
Computer engineering.
Obfuscation of transmission fingerprints for secure wireless communications.
LDR
:03419nmm a2200313 4500
001
502061
005
20170619070722.5
008
170818s2016 ||||||||||||||||| ||eng d
020
$a
9781339763927
035
$a
(MiAaPQ)AAI10113272
035
$a
AAI10113272
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Rahbari, Hanif.
$3
766032
245
1 0
$a
Obfuscation of transmission fingerprints for secure wireless communications.
260
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2016
300
$a
171 p.
500
$a
Source: Dissertation Abstracts International, Volume: 77-11(E), Section: B.
500
$a
Adviser: Marwan Krunz.
502
$a
Thesis (Ph.D.)--The University of Arizona, 2016.
506
$a
This item is not available from ProQuest Dissertations & Theses.
520
$a
Our world of people and objects is on the verge of transforming to a world of highly-interconnected wireless devices. Incredible advances in wireless communications, hardware design, and power storage have facilitated hasty spread of wireless technologies in human life. In this new world, individuals are often identified and reached via one or multiple wireless devices that they always carry (e.g., smartphones, smart wearable, implantable medical devices, etc.), and their biometrics identities are replaced by their digital fingerprints. In near future, vehicles will be controlled and monitored via wireless monitoring systems and various physical objects (e.g., home appliance and retail store items) will be connected to the Internet. The list of these changes goes on. Unfortunately, as different aspects of our lives are being immerged in and dependent to wireless devices and services, we will become more vulnerable to wireless service/connection interruptions due to adversarial behavior and our privacy will become more potent to be exposed to adversaries. An adversary can learn the procedures of a wireless system and analyze its stages, and accordingly, launch various attacks against the operations of the system or the privacy of the people. Existing data confidentiality and integrity services (e.g., advanced encryption algorithms) have been able to prevent the leakage of users' messages. However, in wireless networks, even when upper-layer payloads are encrypted, the users' privacy and the operation of a wireless network can be threatened by the leakage of transmission attributes at the physical (PHY) layer. Examples of these attributes are payload size, frequency offset (FO), modulation scheme, and the transmission rate. These attributes can be exploited by an adversary to launch passive or active attacks. A passive attacker may learn about the interests, sexual orientation, political views, and patentable ideas of the user through analyzing these features, whereas an active attacker exploits captured attributes to launch selective packet jamming/dropping and disrupt wireless services. These call for novel privacy preserving techniques beyond encryption. In this dissertation, we study the vulnerability of current wireless systems to the leakage of transmission attributes at the PHY layer and propose several schemes to prevent it. (Abstract shortened by ProQuest.).
590
$a
School code: 0009.
650
4
$a
Computer engineering.
$3
212944
650
4
$a
Computer science.
$3
199325
650
4
$a
Electrical engineering.
$3
454503
690
$a
0464
690
$a
0984
690
$a
0544
710
2
$a
The University of Arizona.
$b
Electrical and Computer Engineering.
$3
766033
773
0
$t
Dissertation Abstracts International
$g
77-11B(E).
790
$a
0009
791
$a
Ph.D.
792
$a
2016
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10113272
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000134999
電子館藏
1圖書
學位論文
TH 2016
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10113272
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login