• Login
    View Item 
    •   Home
    • UA Graduate and Undergraduate Research
    • UA Theses and Dissertations
    • Dissertations
    • View Item
    •   Home
    • UA Graduate and Undergraduate Research
    • UA Theses and Dissertations
    • Dissertations
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of UA Campus RepositoryCommunitiesTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournalThis CollectionTitleAuthorsIssue DateSubmit DateSubjectsPublisherJournal

    My Account

    LoginRegister

    About

    AboutUA Faculty PublicationsUA DissertationsUA Master's ThesesUA Honors ThesesUA PressUA YearbooksUA CatalogsUA Libraries

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Securing Wireless Broadcast Communications against Internal Attacks

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Thumbnail
    Name:
    azu_etd_12010_sip1_m.pdf
    Size:
    3.380Mb
    Format:
    PDF
    Download
    Author
    Liu, Sisi
    Issue Date
    2012
    Keywords
    Security
    Electrical & Computer Engineering
    Jamming
    Broadcast
    Control channel
    Advisor
    Krunz, Marwan
    Lazos, Loukas
    
    Metadata
    Show full item record
    Publisher
    The University of Arizona.
    Rights
    Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author.
    Abstract
    The pervasiveness of wireless communications in modern society is unprecedent. Using numerous wireless technologies, including cellular, WiFi, WiMax and others, users gain ubiquitous access to a wealth of information services relevant to their everyday lives. These include communication services (voice, email, text), commercial transactions (e-banking, e-trading), location-based services (points of interest, navigation), social networking, web access, and others. Further proliferation of mobile services and applications provided via wireless communications is contingent upon the network's reliability and security. As this wireless revolution continues to unfold, users have grown increasingly concerned with the amount of sensitive information that leaks to unauthorized parties. They have also become more skeptical to the abilities of current technologies in providing a reliable and secure environment. The problem of ensuring network reliability and security is particularly challenging in the wireless domain. The open nature of the wireless medium leaves it accessible to any device equipped with a transceiver. Wireless networks remain vulnerable to numerous attacks, including eavesdropping, packet modification and injection, replay, impersonation, and jamming. Moreover, the poor physical security of the majority of wireless stations (mobile devices, sensor, etc.) makes them susceptible to physical compromise. Such compromised devices become a launchpad for internal attacks from adversaries with intimate knowledge of network secrets and protocol specifications. Internal attacks are much harder to counter than external ones since the adversary can bypass typical cryptographic methods that authorize user access. In this dissertation, we investigate attacks on wireless communications launched by internal adversaries. In particular, we are concerned with sophisticated intentional interference (jamming) attacks against broadcast communications. Such attacks have been shown to be detrimental to network operation. We further consider the problem of distributed node coordination in dynamic spectrum networks. To address these problems, we design novel communication protocols that protect broadcast communications from internal attacks via a combination of randomization, redundancy and cryptographic techniques. We propose new security metrics to quantify the ability of the adversary to deny access to the broadcast channel. We introduce a randomized distributed scheme that allows nodes to establish and maintain the broadcast channel in the presence of the jammer. Also this scheme uniquely identifies the set of compromised nodes, both when nodes are acting independently and when they are colluding. To protect broadcast communication performed on control channel, we propose a secure broadcast scheme called TDBS, which implements the broadcast operation as a series of unicast transmissions, distributed in frequency and time. Finally, we address the problem of dynamically assigning the control channel in CRNs based on time- and space-varying spectrum opportunities. We propose a cluster-based architecture that allocates different channels for control at various clusters in the network. The clustering problem is formulated as a bipartite graph problem, for which we develop a class of algorithms to implement. Extensive simulations are conducted to verify the validity of the proposed mechanisms.
    Type
    text
    Electronic Dissertation
    Degree Name
    Ph.D.
    Degree Level
    doctoral
    Degree Program
    Graduate College
    Electrical & Computer Engineering
    Degree Grantor
    University of Arizona
    Collections
    Dissertations

    entitlement

     
    The University of Arizona Libraries | 1510 E. University Blvd. | Tucson, AZ 85721-0055
    Tel 520-621-6442 | repository@u.library.arizona.edu
    DSpace software copyright © 2002-2017  DuraSpace
    Quick Guide | Contact Us | Send Feedback
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.