語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
SDR-Based Resilient Wireless Communi...
~
Almoualem, Firas.
SDR-Based Resilient Wireless Communications.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
SDR-Based Resilient Wireless Communications./
作者:
Almoualem, Firas.
面頁冊數:
1 online resource (70 pages)
附註:
Source: Masters Abstracts International, Volume: 56-04.
Contained By:
Masters Abstracts International56-04(E).
標題:
Electrical engineering. -
電子資源:
click for full text (PQDT)
ISBN:
9781369860733
SDR-Based Resilient Wireless Communications.
Almoualem, Firas.
SDR-Based Resilient Wireless Communications.
- 1 online resource (70 pages)
Source: Masters Abstracts International, Volume: 56-04.
Thesis (M.S.)--The University of Arizona, 2017.
Includes bibliographical references
As the use of wireless technologies increases significantly due to the ease of deployment, the cost-effectiveness and the increase in bandwidth, there is a strong need to make the wireless communications reliable, secure, and resilient to attacks or faults (malicious or natural). Wireless communications are inherently prone to attacks due the open access to the medium. However, current wireless protocols have addressed the privacy issues, but have failed to provide effective solutions against denial of service attacks, session hijacking and jamming attacks. The goal of this research is to provide a resilient wireless communication system against these type of attacks.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781369860733Subjects--Topical Terms:
596380
Electrical engineering.
Index Terms--Genre/Form:
554714
Electronic books.
SDR-Based Resilient Wireless Communications.
LDR
:03073ntm a2200337Ki 4500
001
918307
005
20181114145235.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9781369860733
035
$a
(MiAaPQ)AAI10282953
035
$a
(MiAaPQ)arizona:15581
035
$a
AAI10282953
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Almoualem, Firas.
$3
1192597
245
1 0
$a
SDR-Based Resilient Wireless Communications.
264
0
$c
2017
300
$a
1 online resource (70 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 56-04.
500
$a
Adviser: Salim Hariri.
502
$a
Thesis (M.S.)--The University of Arizona, 2017.
504
$a
Includes bibliographical references
520
$a
As the use of wireless technologies increases significantly due to the ease of deployment, the cost-effectiveness and the increase in bandwidth, there is a strong need to make the wireless communications reliable, secure, and resilient to attacks or faults (malicious or natural). Wireless communications are inherently prone to attacks due the open access to the medium. However, current wireless protocols have addressed the privacy issues, but have failed to provide effective solutions against denial of service attacks, session hijacking and jamming attacks. The goal of this research is to provide a resilient wireless communication system against these type of attacks.
520
$a
In this thesis, we present a resilient wireless communications architecture based on Moving Target Defense (MTD), Software Defined Radio (SDR), and Software Defined Networking (SDN). The approach achieves the resilient operations by randomly changing the runtime characteristics of the wireless communication channels in order to make it extremely difficult to be succeeded in launching attacks. The runtime characteristics that can be changed include the packet size, the network address, the modulation type, and the operating frequency of the channel. In addition, the lifespan for each configuration will be random. To reduce the overhead in switching between two consecutive configurations, we use two radio channels, one is designated as an active channel while the second is designated as a standby channel. The standby channel is used if the attacker was successfully in attacking the active channel. This will harden the wireless communications attacks because the attackers need to figure out the configuration being used and then launch an attack before the current configuration is changed. Our experimental results and evaluation show that our approach can tolerate a wide range of attacks against wireless networks.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Electrical engineering.
$3
596380
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0544
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
The University of Arizona.
$b
Electrical & Computer Engineering.
$3
1189571
773
0
$t
Masters Abstracts International
$g
56-04(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10282953
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入