Withdraw
Loading…
Situation-Aware Security for Wireless Ad Hoc Networks
Yi, Seung
Loading…
Permalink
https://hdl.handle.net/2142/10984
Description
- Title
- Situation-Aware Security for Wireless Ad Hoc Networks
- Author(s)
- Yi, Seung
- Issue Date
- 2005-06
- Keyword(s)
- computer security
- wireless ad hoc networks
- Abstract
- "Newly emerging ad hoc networking technology has enormous potential benefit for many mission-critical applications. However, providing adequate security required for the target applications presents many new challenges due to the unique nature of ad hoc environments. Complete decentralization and the absence of any support infrastructure in ad hoc environments effectively eliminates the possibility of the direct application of known security service designs from wired networks and infrastructure-based wireless networks. In this thesis, we investigate the environmental challenges posed by ad hoc environments and their effects on security service designs. Interactions between environmental factors, network properties and the quality of the security service are captured in a newly proposed concept called the ""Situation"". Based on the understanding of situations, we provide design guidelines for ""Situation-Aware Security"" services where a security service is viewed as a best-effort service whose quality must be continuously monitored and quantified. The measurement of the varying quality of a security service is then conveyed to the end users to aid their decisions on appropriate usage of the provided security service. Based on this situation-aware security paradigm, we present two types of security services, security-aware routing for quantifiably secure route discovery and situation-aware key management that provides end users with the best-achievable authentication service with intuitive metrics to measure the provided quality of authentication."
- Type of Resource
- text
- Permalink
- http://hdl.handle.net/2142/10984
- Copyright and License Information
- You are granted permission for the non-commercial reproduction, distribution, display, and performance of this technical report in any format, BUT this permission is only for a period of 45 (forty-five) days from the most recent time that you verified that this technical report is still available from the University of Illinois at Urbana-Champaign Computer Science Department under terms that include this permission. All other rights are reserved by the author(s).
Owning Collections
Manage Files
Loading…
Edit Collection Membership
Loading…
Edit Metadata
Loading…
Edit Properties
Loading…
Embargoes
Loading…