Security and collaboration protocols for mobile and sensor networks

作者: Kang Geun Shin , Katharine Chang

DOI:

关键词: Computer securityAccess controlComputer scienceMobile computingAuthentication serverNetwork Access ControlTrust management (information system)Distributed System Security ArchitectureAuthentication protocolMobile ad hoc network

摘要: Research in network and computer system architecture is evolving beyond its traditional focus as mobile devices become ubiquitous computing triggers dramatic change the world. Mobile can form heterogeneous networks that provide distributed services information access real time from anywhere Coincident with this change, assurance of security availability becomes an important problem. This problem challenging because it requires to be easy manage operate, but also reliability security. For purpose securing a network, we usually require authentication, authorization, accounting. Authentication users prove their identity. Accounting intrusion detection or forensic analysis find attacks, if any, system. Finally, authorization control ensure data privacy. This dissertation aims design collaboration protocols create comprehensive trust framework protect sensor by applying cryptographic algorithms. It makes three primary contributions. First, propose implement authentication protocol called DAPP wireless allow sensors authenticate servers without requiring commonly-used trusted server. maintains nature networks, has low computation communication overhead, resilient node compromises. Second, attain for nodes ad hoc present (IDS) at application layer help detect malicious network. We describe use agents augment each node's IDS. group-based sharing TGIS establish relationship collaborators enforce between different privileges. built upon existing infrastructures individual organizations enable management group collaboration. The presented together achieve secure accounting networks.

参考文章(46)
Erdal Çayırcı, Vedat Çoşkun, Albert Levi, Serdar Sancak, Sensor wars: detecting and defending against spam attacks in tactical AdHoc sensor networks IEEE Press. ,(2004)
Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung, Perfectly-Secure Key Distribution for Dynamic Conferences international cryptology conference. ,vol. 740, pp. 471- 486 ,(1992) , 10.1007/3-540-48071-4_33
Tom Karygiannis, Peter Mell, Wayne Jansen, Don Marks, Applying Mobile Agents to Intrusion Detection and Response ,(1999)
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24
Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, Yongdae Kim, Remote software-based attestation for wireless sensors security of ad hoc and sensor networks. pp. 27- 41 ,(2005) , 10.1007/11601494_3
Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, How to bootstrap security for ad-hoc network: Revisited information security. ,vol. 297, pp. 119- 131 ,(2009) , 10.1007/978-3-642-01244-0_11
Zhibin Zhou, Dijiang Huang, Efficient and secure data storage operations for mobile cloud computing conference on network and service management. pp. 37- 45 ,(2012) , 10.5555/2499406.2499411
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Florian Hess, Efficient Identity Based Signature Schemes Based on Pairings selected areas in cryptography. pp. 310- 324 ,(2002) , 10.1007/3-540-36492-7_20