Network security: design, analysis and tradeoff evaluation

Show simple item record

dc.contributor Brown, Marcus E.
dc.contributor Hong, Xiaoyan
dc.contributor Zhang, Jingyuan
dc.contributor Wu, Zhijian
dc.contributor.advisor Xiao, Yang
dc.contributor.author Olteanu, Alina
dc.date.accessioned 2017-02-28T22:21:03Z
dc.date.available 2017-02-28T22:21:03Z
dc.date.issued 2009
dc.identifier.other u0015_0000001_0000088
dc.identifier.other Olteanu_alatus_0004D_10055
dc.identifier.uri https://ir.ua.edu/handle/123456789/595
dc.description Electronic Thesis or Dissertation
dc.description.abstract Energy efficiency is an essential requirement for all wireless devices. Recent developments in wireless sensor networks (WSNs), wireless local area networks (WLANs) and wireless personal area networks (WPANs) have raised a demand for energy-efficient algorithms and energy-efficient medium access control (MAC) protocols. When considering security in this context, additional overhead is added to the network and efforts must to be made to minimize the extra load while at the same time achieving the desired level of security. Security attacks in the Internet are linked to a different set of vulnerabilities. The complex architecture of the Internet spanning over different administrative domains and legal systems makes it easy for attackers to conceal the source of the attack and preserve their anonymity. This dissertation addresses several important issues in network security and performance including intrusion detection, cipher design, security overhead analysis and tracing, as follows. We first propose a model for intrusion detection in WSNs, which optimizes network coverage and detection while minimizing the number of sensors and energy consumption. We then integrate a security mechanism into the sensor network in order to achieve secure communication. Specifically, we propose a lightweight block cipher based on a multiple recursive generator (MRG) which is suitable for WSN and RFID where power consumption, bandwidth, memory and storage space are critical. Next, we consider security in WLANs and WPANs and we apply the advanced encryption standard (AES) cipher to ensure secure transmission of frames. We integrate AES encryption at the MAC layer of 802.11 WLANs and 802.15.3 UWB WPANs, respectively, and study the overhead introduced by AES in this context. Finally, we analyze a type of security attack in the Internet where the intruder uses a chain of host machines before attacking the target. We discuss two mechanisms for tracing intruders in the Internet, one based on thumbprinting, and the other on a timestamping technique of transmission activities.
dc.format.extent 154 p.
dc.format.medium electronic
dc.format.mimetype application/pdf
dc.language English
dc.language.iso en_US
dc.publisher University of Alabama Libraries
dc.relation.ispartof The University of Alabama Electronic Theses and Dissertations
dc.relation.hasversion born digital
dc.rights All rights reserved by the author unless otherwise indicated.
dc.subject.other Computer Science
dc.title Network security: design, analysis and tradeoff evaluation
dc.type thesis
dc.type text
etdms.degree.department University of Alabama. Dept. of Computer Science
etdms.degree.discipline Computer Science
etdms.degree.grantor The University of Alabama
etdms.degree.level doctoral
etdms.degree.name Ph.D.


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account