作者: Srikanth V. Krishnamurthy , Jianxia Ning
DOI:
关键词:
摘要: Survivability is usually defined as the capability of a network to deliver data successfully in timely manner, even presence attacks. Security well reliability are included survivability considerations. Due lossy and open nature wireless links, design solutions make survive against attacks idiosyncrasies difficult. In this dissertation, we approach several issues that have be considered order ensure various contexts. Firstly, need understand causes for why failing or does not efficiently supposed. Network forensics could help with matter. However, provisioning forensic evidence impact performance terms throughput delay. Secondly, reliable when switching from commonly used bands another, because conventional protocols may affected by characteristics particular frequency. Finally, sure there security communication relying on online social networks active seekers information. For first issue, examine problem monitoring packet level transmissions evidence. We provide an analytical framework computes likelihood exists respects transmissions. validate our via simulations real-world experiments two different testbeds. Then use basis protocol within analyzer determine nodes drop packets. Our assessments shown close ground truth, average deviation 2.3%. Furthermore, quantify trade-offs between achieving high networks. find remains unaffected up certain availability requirement. Beyond this, degrade delay increase much 30%. Then, dissertation presents work evaluating neighbor discovery 60 GHz band. Neighbor fundamental process self-configuration ad-hoc unique physical layer traditional 2.4 5 bands. particular, neighbors can discovered both direct reflected beams. analyze approaches system parameters efficiency. Finally, includes efforts doing covert public photo-sharing sites. Steganography embed secret messages shared images. image processing performed photo sharing sites destroy embedded messages. in-depth measurement study feasibility hiding four popular identify challenges communicating covertly these propose embedding while ensuring their integrity preserved. also present bootstrapping without out-of-band channel.