語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Capability Based Access Control Stra...
~
ProQuest Information and Learning Co.
Capability Based Access Control Strategies to Deter DDoS Attacks Exploting IoT Devices.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Capability Based Access Control Strategies to Deter DDoS Attacks Exploting IoT Devices./
作者:
Xu, Ronghua.
面頁冊數:
1 online resource (88 pages)
附註:
Source: Masters Abstracts International, Volume: 57-05.
標題:
Computer engineering. -
電子資源:
click for full text (PQDT)
ISBN:
9780355929119
Capability Based Access Control Strategies to Deter DDoS Attacks Exploting IoT Devices.
Xu, Ronghua.
Capability Based Access Control Strategies to Deter DDoS Attacks Exploting IoT Devices.
- 1 online resource (88 pages)
Source: Masters Abstracts International, Volume: 57-05.
Thesis (M.S.)--State University of New York at Binghamton, 2018.
Includes bibliographical references
The prevalence of the Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, the IoTs also incur more concerns on privacy and security. The large number of insecure smart things with high communication and computation capacity become attractive targets for attackers to build large-scale botnets, which are used for various malicious activities such as distributed denial-of-service (DDoS) attacks. Among the top security challenges that IoTs face, the access authorization is critical in resource and information protection. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355929119Subjects--Topical Terms:
569006
Computer engineering.
Index Terms--Genre/Form:
554714
Electronic books.
Capability Based Access Control Strategies to Deter DDoS Attacks Exploting IoT Devices.
LDR
:03165ntm a2200325K 4500
001
912928
005
20180608130009.5
006
m o u
007
cr mn||||a|a||
008
190606s2018 xx obm 000 0 eng d
020
$a
9780355929119
035
$a
(MiAaPQ)AAI10813805
035
$a
(MiAaPQ)binghamton:12698
035
$a
AAI10813805
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Xu, Ronghua.
$3
1185506
245
1 0
$a
Capability Based Access Control Strategies to Deter DDoS Attacks Exploting IoT Devices.
264
0
$c
2018
300
$a
1 online resource (88 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 57-05.
500
$a
Adviser: Yu Chen.
502
$a
Thesis (M.S.)--State University of New York at Binghamton, 2018.
504
$a
Includes bibliographical references
520
$a
The prevalence of the Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, the IoTs also incur more concerns on privacy and security. The large number of insecure smart things with high communication and computation capacity become attractive targets for attackers to build large-scale botnets, which are used for various malicious activities such as distributed denial-of-service (DDoS) attacks. Among the top security challenges that IoTs face, the access authorization is critical in resource and information protection. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices.
520
$a
This thesis aims at improving the security of IoT devices by enhancing the access control (AC) mechanisms. A federated capability based access control (FedCAC) framework and a blockchain-enabled decentralized capability-based access control (BlendCAC) framework are proposed. Through federating the capability delegation mechanism, the FedCAC allows local domain owners to delegate centralized authorization decision-making policy from server to enforce access control. However, the FedCAC scheme still suffers the weaknesses inherited from the centralized schemes, such as the single point of failure and performance bottleneck problems. In order to address these shortcomings, the BlendCAC takes advantage of smart contract on the blockchain network to enable a completely decentralized access control solution in the trustless network environment. Implemented and tested on resource-constrained devices under a physical IoT network environment, the experimental results demonstrate the feasibility of the proposals to offer the scalable, lightweight and fine-grained access control strategies to deter DDoS attacks exploiting IoT devices.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Computer engineering.
$3
569006
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0464
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
State University of New York at Binghamton.
$b
Electrical and Computer Engineering.
$3
1185507
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10813805
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入