Survivability considerations in wireless networks

作者: Srikanth V. Krishnamurthy , Jianxia Ning

DOI:

关键词:

摘要: Survivability is usually defined as the capability of a network to deliver data successfully in timely manner, even presence attacks. Security well reliability are included survivability considerations. Due lossy and open nature wireless links, design solutions make survive against attacks idiosyncrasies difficult. In this dissertation, we approach several issues that have be considered order ensure various contexts. Firstly, need understand causes for why failing or does not efficiently supposed. Network forensics could help with matter. However, provisioning forensic evidence impact performance terms throughput delay. Secondly, reliable when switching from commonly used bands another, because conventional protocols may affected by characteristics particular frequency. Finally, sure there security communication relying on online social networks active seekers information. For first issue, examine problem monitoring packet level transmissions evidence. We provide an analytical framework computes likelihood exists respects transmissions. validate our via simulations real-world experiments two different testbeds. Then use basis protocol within analyzer determine nodes drop packets. Our assessments shown close ground truth, average deviation 2.3%. Furthermore, quantify trade-offs between achieving high networks. find remains unaffected up certain availability requirement. Beyond this, degrade delay increase much 30%. Then, dissertation presents work evaluating neighbor discovery 60 GHz band. Neighbor fundamental process self-configuration ad-hoc unique physical layer traditional 2.4 5 bands. particular, neighbors can discovered both direct reflected beams. analyze approaches system parameters efficiency. Finally, includes efforts doing covert public photo-sharing sites. Steganography embed secret messages shared images. image processing performed photo sharing sites destroy embedded messages. in-depth measurement study feasibility hiding four popular identify challenges communicating covertly these propose embedding while ensuring their integrity preserved. also present bootstrapping without out-of-band channel.

参考文章(58)
Paul Alvarez, Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis International Journal of Digital Evidence. ,vol. 2, ,(2004)
Nick Feamster, Santosh Vempala, Sam Burnett, Chipping away at censorship firewalls with user-generated content usenix security symposium. pp. 29- 29 ,(2010)
Juha Kukkurainen, Mikael Soini, Lauri Sydänheimo, Security and performance trade-off in KILAVI wireless sensor network annual conference on computers. pp. 306- 313 ,(2010)
Joan L. Mitchell, William B. Pennebaker, JPEG: Still Image Data Compression Standard ,(1992)
Shishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal, Vijit Singh, Pragya Agarwal, Nikita Borisov, Stegobot: a covert social network botnet information hiding. pp. 299- 313 ,(2011) , 10.1007/978-3-642-24178-9_21
Peter Honeyman, Niels Provos, Detecting Steganographic Content on the Internet network and distributed system security symposium. ,(2002)
Guangyu Pei, M.M. Albuquerque, J.H. Kim, D.P. Nast, P.R. Norris, A neighbor discovery protocol for directional antenna networks military communications conference. pp. 487- 492 ,(2005) , 10.1109/MILCOM.2005.1605730
J. Zöllner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, G. Wolf, Modeling the Security of Steganographic Systems information hiding. pp. 344- 354 ,(1998) , 10.1007/3-540-49380-8_24