Security in wireless networks: a fresh approach
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
2008
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | VIII, 136 S. graph. Darst. |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035714279 | ||
003 | DE-604 | ||
005 | 20100203 | ||
007 | t | ||
008 | 090908s2008 d||| m||| 00||| eng d | ||
035 | |a (OCoLC)553580743 | ||
035 | |a (DE-599)BVBBV035714279 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-706 |a DE-29T |a DE-824 |a DE-12 |a DE-634 | ||
082 | 0 | |a 004.6822 | |
100 | 1 | |a Martinovic, Ivan |d 1978- |e Verfasser |0 (DE-588)130571245 |4 aut | |
245 | 1 | 0 | |a Security in wireless networks |b a fresh approach |c von Ivan Martinovic |
264 | 1 | |c 2008 | |
300 | |a VIII, 136 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
502 | |a Kaiserslautern, Techn. Univ., Diss., 2008 | ||
650 | 0 | 7 | |a Funknetz |0 (DE-588)4216130-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Funknetz |0 (DE-588)4216130-7 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017991158&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017991158 |
Datensatz im Suchindex
_version_ | 1804139922175557632 |
---|---|
adam_text | SECURITY IN WIRELESS NETWORKS: A FRESH APPROACH VOM FACHBEREICH
INFORMATIK DER TECHNISCHE UNIVERSITAT KAISERSLAUTERN ZUR VERLEIHUNG DES
AKADEMISCHEN GRADES DOKTOR-INGENIEUR (DR.-ING.) GENEHMIGTE DISSERTATION
VORGELEGT VON DIPLOM-INFORMATIKER IVAN MARTINOVIC TAG DER MIINDLICHEN
PRUNING: 10. DEZEMBER 2008 DEKAN: PROF. DR. KARSTEN BERNS
PROMOTIONSKOMMISSION: VORSITZENDER: PROF. DR. STEFAN DEFILOCH 1.
BERICHTERSTATTER: PROF. DR. JENS B. SCHMITT 2. BERICHTERSTATTER: PROF.
DR. PETER LIGGESMEYER D386 CONTENTS CONTENTS I LIST OF FIGURES V LIST OF
TABLES VII 1 INTRODUCTION 1 1.1 CONVENTIONAL APPROACH TO WIRELESS
SECURITY 1 1.2 THE FRESH APPROACH OF THIS THESIS 3 1.3 DISSERTATION
OUTLINE 4 1.4 EXISTING AND RELATED WORK 6 1.4.1 GENERALLY RELATED WORK
ON SECURITY IN WIRELESS NETWORKS 6 1.4.2 RELATED BUT ORTHOGONAL WORK 8
1.4.3 DIRECTLY RELATED WORK 9 1 SECURITY IN WIRELESS:
PERFORMANCE-ORIENTED DESIGN 11 2 SECURITY IN WIRELESS NETWORKS: THE IEEE
802.11 PERSPECTIVE 13 2.1 MOTIVATION 13 2.2 OUTLINE 14 2.3 THE BRIEF
HISTORY OF IEEE 802.11 SECURITY 14 2.4 WLAN HAS NEW CLOTHES: IEEE
802.11I 16 2.4.1 A LOOK AT THE IEEE 802.11I PERFORMANCE TRADEOFF .... 18
2.5 WHY HACKING WHEN BREAKING IS EASIER? 19 2.5.1 FROM AVAILABILITY TO
MAN-IN-THE-MIDDLE ATTACKS .... 20 2.5.2 AN IMPLEMENTATION OF THE MUZZLE
ATTACK 22 2^6 SUMMARY 25 3 PERFORMANCE-ORIENTED IEEE 802.11 LINK-LAYER
AUTHENTICATION 27 3.1 MOTIVATION 27 3.2 OUTLINE 29 3.3 DISCOSEC S DESIGN
AND IMPLEMENTATION 29 3.3.1 ARCHITECTURE OF DISCOSEC 29 3.3.2
TERMINOLOGY AND CRYPTOGRAPHIC PRIMITIVES USED .... 31 3.3.3 ASSOCIATION
PROCEDURE - TRUST IS GOOD, CONTROL IS BETTER 32 3.3.4 KEY EXCHANGE 33
CONTENTS 3.3.5 FRAME AUTHENTICATION - VARIABLE VS. FIXED FRAME LENGTH 34
3.3.6 REPLAY PROTECTION 35 3.4 ATTACKS AGAINST DISCOSEC 36 3.4.1
DISCOSEC S RESOURCE PROTECTION 36 3.5 PERFORMANCE ANALYSIS OF DISCOSEC
37 3.5.1 KEY EXCHANGE COSTS 38 3.5.2 FRAME AUTHENTICATION COSTS 39 3.5.3
DISCOSEC FEATURING SUPERG 40 3.5.4 OVERALL THROUGHPUT 41 3.6 DISCOSEC S
DECISION INSIGHTS 42 3.7 RELATED WORK 44 3.8 SUMMARY 46 II SECURITY BY
WIRELESS: PROTECTION WITHOUT SECRETS 47 4 RESOURCE PROTECTION USING
RADIO SIGNAL PROXIMITY 49 4.1 MOTIVATION 49 4.1.1 RESOURCE DEPLETION IN
WIRED NETWORKS 50 4.2 OUTLINE 51 4.3 CONCEPT AND IMPLEMENTATION 52 4.3.1
WIRELESS CLIENT PUZZLES - INITIAL IDEA 52 4.3.2 TESTBED CONFIGURATION
AND IMPLEMENTATION 53 4.3.3 AUTHENTICATION PROCEDURE 55 4.3.4 TOLERANCE
INTERVALS 56 4.3.5 WEAK POSITIONS 57 4.4 REAL-WORLD IMPLEMENTATION
RESULTS 59 4.4.1 RESOURCE PROTECTION 60 4.4-.2 ATTACK CONTAINMENT 60 4.5
SIMULATION AND ANALYSIS 62 4.5.1 CONFIGURATION PARAMETERS AND NETWORK
MODEL 62 4.5.2 EXTENDED ATTACKER MODEL 63 4.5.3 SIMULATION RESULTS 64
4.6 RELATED WORK 67 4.7 SUMMARY 70 5 WIRELESS SECURITY DESIGN - ATTACK
DETECTION 73 5.1 MOTIVATION 73 5.2 OUTLINE 74 5.3 CONFUSION AND
DIFFUSION BY WIRELESS 75 5.3.1 PROPAGATION ANALYSIS USING THE TWO-RAY
MODEL 77 5.4 EXPERIMENTAL ANALYSIS OF AN INDOOR WSN SCENARIO 79 5.4.1
DIFFUSION BY FREQUENCY CHANGE 80 5.4.2 DETECTING FAKE TRANSMISSIONS 81
CONTENTS 5.5 WSN UNDER ATTACK: EXPERIMENTAL ANALYSIS 85 5.5.1 THREAT
MODEL AND COUNTERMEASURES 85 5.5.2 IMPACT OF AN INJECTION ATTACK 87 5.6
RELATED WORK 91 5.7 SUMMARY 93 6 WIRELESS SECURITY DESIGN - ATTACK
CANCELATION 95 6.1 MOTIVATION 95 6.2 OUTLINE 96 6.3 FREQUENCY JAMMING
TURNED AGAINST THE ADVERSARY 96 6.3.1 JAM WHERE IT HURTS 97 6.3.2
DOMINANT VS. SUBMISSIVE JAMMING 98 6.3.3 TIMING AND JAM DURATION 99
6.3.4 HOW MANY CONCURRENT JAMMERS? 101 6.4 ATTACK CANCELATION 102 6.4.1
STATIC JAMMING 102 6.4.2 COOPERATIVE JAMMING 103 6.4.3 ADAPTIVE JAMMING
105 6.5 OVERALL NETWORK ANALYSIS 108 6.5.1 EVALUATION GOALS 108 6.5.2
THREAT MODEL 109 6.5.3 WIRELESS CHANNEL 110 6.5.4 EVALUATION RESULTS 110
6.6 RELATED WORK 114 6.7 SUMMARY 114 7 SUMMARY 117 7.1 CONCLUSION 117
7.2 POSSIBLE FUTURE DIRECTIONS 120 8 BIBLIOGRAPHY * 123 9 AUTHOR S
PUBLICATIONS 133 9.1 BOOK CHAPTERS AND JOURNAL ARTICLES 133 9.2 REFEREED
CONFERENCES AND WORKSHOP CONTRIBUTIONS 133 9.3 TECHNICAL REPORTS 136 IN
|
any_adam_object | 1 |
author | Martinovic, Ivan 1978- |
author_GND | (DE-588)130571245 |
author_facet | Martinovic, Ivan 1978- |
author_role | aut |
author_sort | Martinovic, Ivan 1978- |
author_variant | i m im |
building | Verbundindex |
bvnumber | BV035714279 |
ctrlnum | (OCoLC)553580743 (DE-599)BVBBV035714279 |
dewey-full | 004.6822 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6822 |
dewey-search | 004.6822 |
dewey-sort | 14.6822 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01362nam a2200349 c 4500</leader><controlfield tag="001">BV035714279</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100203 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090908s2008 d||| m||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)553580743</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035714279</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6822</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Martinovic, Ivan</subfield><subfield code="d">1978-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)130571245</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in wireless networks</subfield><subfield code="b">a fresh approach</subfield><subfield code="c">von Ivan Martinovic</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VIII, 136 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="a">Kaiserslautern, Techn. Univ., Diss., 2008</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017991158&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017991158</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV035714279 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:51:46Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017991158 |
oclc_num | 553580743 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-706 DE-29T DE-824 DE-12 DE-634 |
owner_facet | DE-91 DE-BY-TUM DE-706 DE-29T DE-824 DE-12 DE-634 |
physical | VIII, 136 S. graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
record_format | marc |
spelling | Martinovic, Ivan 1978- Verfasser (DE-588)130571245 aut Security in wireless networks a fresh approach von Ivan Martinovic 2008 VIII, 136 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Kaiserslautern, Techn. Univ., Diss., 2008 Funknetz (DE-588)4216130-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Funknetz (DE-588)4216130-7 s Datensicherung (DE-588)4011144-1 s DE-604 GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017991158&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Martinovic, Ivan 1978- Security in wireless networks a fresh approach Funknetz (DE-588)4216130-7 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4216130-7 (DE-588)4011144-1 (DE-588)4113937-9 |
title | Security in wireless networks a fresh approach |
title_auth | Security in wireless networks a fresh approach |
title_exact_search | Security in wireless networks a fresh approach |
title_full | Security in wireless networks a fresh approach von Ivan Martinovic |
title_fullStr | Security in wireless networks a fresh approach von Ivan Martinovic |
title_full_unstemmed | Security in wireless networks a fresh approach von Ivan Martinovic |
title_short | Security in wireless networks |
title_sort | security in wireless networks a fresh approach |
title_sub | a fresh approach |
topic | Funknetz (DE-588)4216130-7 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Funknetz Datensicherung Hochschulschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017991158&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT martinovicivan securityinwirelessnetworksafreshapproach |