Cargando…

Security, Privacy and Reliability in Computer Communications and Networks.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Sha, Kewei
Otros Autores: Striegel, Aaron, Song, Min
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Aalborg : River Publishers, 2016.
Colección:River Publishers series in communications.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 4500
001 EBOOKCENTRAL_ocn967538455
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 161231s2016 xx o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCO  |d YDX  |d MERUC  |d OCLCQ  |d OCLCF  |d OCLCQ  |d LVT  |d OCLCQ  |d OCLCO  |d OCLCQ  |d SFB  |d OCLCQ  |d DXU  |d OCLCO  |d OCLCL 
019 |a 967188099  |a 981960303  |a 982241716  |a 982364461  |a 986750665  |a 986909442  |a 1392361761 
020 |a 9788793379909 
020 |a 8793379900 
020 |z 8793379897 
020 |z 9788793379893 
029 1 |a AU@  |b 000066433353 
035 |a (OCoLC)967538455  |z (OCoLC)967188099  |z (OCoLC)981960303  |z (OCoLC)982241716  |z (OCoLC)982364461  |z (OCoLC)986750665  |z (OCoLC)986909442  |z (OCoLC)1392361761 
050 4 |a TK5105.59  |b .S442 2017 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Sha, Kewei. 
245 1 0 |a Security, Privacy and Reliability in Computer Communications and Networks. 
260 |a Aalborg :  |b River Publishers,  |c 2016. 
300 |a 1 online resource (446 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a River Publishers Series in Communications 
588 0 |a Print version record. 
505 0 |a Front Cover -- Half Title Page -- RIVER PUBLISHERS SERIES IN INNOVATION AND CHANGE IN EDUCATION -- CROSS-CULTURAL PERSPECTIVE -- Title Page -- Security, Privacy and Reliability in Computer Communications and Networks -- Copyright Page -- Contents -- Preface -- Acknowledgments -- List of Contributors -- List of Figures -- List of Tables -- List of Algorithms -- List of Abbreviations -- PART I -- Privacy -- Chapter 1 -- Distributed Beamforming Relay Selection to Increase Base Station Anonymity in Wireless Ad Hoc Networks -- Abstract -- 1.1 Introduction -- 1.2 Anonymity Definition, Metrics, and Contemporary Measures -- 1.2.1 Anonymity Definition and Assessment -- 1.2.2 Antitraffic Analysis Measures -- 1.3 System Assumptions and Attack Model -- 1.3.1 Network Model -- 1.3.2 Adversary Model -- 1.3.3 Evidence Theory and Belief Metric -- 1.4 Distributed Beamforming to Increase the BS Anonymity -- 1.4.1 Overview of the DiBAN Protocol -- 1.4.2 DiBAN Illustrative Example -- 1.4.3 DiBAN Energy Analysis -- 1.5 Distributed Beamforming Relay Selection Approach -- 1.6 Validation Experiments -- 1.6.1 Simulation Environment -- 1.6.2 Simulation Results -- 1.7 Conclusions and FutureWork -- Appendix I: Numerical Evidence Theory Belief Calculation Example -- References -- Chapter 2 -- A Privacy-Preserving and Efficient Information Sharing Scheme for VANET Secure Communication -- Abstract -- 2.1 Introduction -- 2.2 Related Works -- 2.3 System Model and Preliminaries -- 2.3.1 Network Model -- 2.3.2 Attack Model -- 2.3.3 Security Requirements -- 2.4 The Proposed PETS Scheme -- 2.4.1 Scheme Overview -- 2.4.2 System Initiation -- 2.4.3 Vehicle-RSU Key Agreement -- 2.4.4 Traffic Information Collection and Aggregation -- 2.4.5 Traffic Jam Message Propagation -- 2.5 Security Analysis -- 2.6 Performance Evaluation -- 2.6.1 Traffic Information Sending/Collection Overhead. 
505 8 |a 2.6.2 Traffic Information Propagation/Verification Overhead -- 2.6.3 Scheme Simulation -- 2.7 Conclusion -- References -- PART II -- Vulnerabilities, Detection and Monitoring -- Chapter 3 -- DIAMoND: Distributed Intrusion/Anomaly Monitoring for Nonparametric Detection -- Abstract -- 3.1 Introduction -- 3.2 Literature Review -- 3.3 System Design -- 3.3.1 Architecture Overview -- 3.3.2 Detection Unit -- 3.3.3 Coordination Unit -- 3.3.4 Communication Protocol -- 3.3.5 Neighborhood Strategies -- 3.3.6 Rogue Nodes -- 3.4 Evaluation Setup -- 3.4.1 Software Implementation -- 3.4.2 Physical Topologies -- 3.4.3 Legitimate and Malicious Traffic -- 3.5 Emulation Results -- 3.5.1 Detection Accuracy -- 3.5.2 Impact of Physical Topologies -- 3.5.3 Influence of Neighborhood Strategies -- 3.5.4 Minimal and Marginal Deployment Gain -- 3.6 Conclusions -- Acknowledgments -- References -- Chapter 4 -- Detection of Service Level Agreement (SLA) Violations in Memory Management in Virtual Machines -- Abstract -- 4.1 Introduction -- 4.2 Related Work -- 4.2.1 Information Leakage among Virtual Machines -- 4.2.2 Service Level Agreement Enforcement -- 4.3 The Proposed Approaches -- 4.3.1 Memory Overcommitment in Virtualization Environments -- 4.3.2 Memory Deduplication in VM Hypervisors -- 4.3.3 System Assumptions -- 4.3.4 Basic Ideas of the Proposed Approaches -- 4.3.5 Details of Implementation -- 4.3.5.1 Choice of memory pages -- 4.3.5.2 Measurement of access time -- 4.3.5.3 Verification of memory access order -- 4.3.6 Detection Procedures of the SLA Violations -- 4.4 Experimental Results -- 4.4.1 Experimental Environment Setup -- 4.4.2 Experiments and Results -- 4.4.3 Impacts on System Performance -- 4.5 Discussion -- 4.5.1 Reducing False Alarms -- 4.5.2 Impacts of Extra Memory Demand -- 4.5.3 Building A Unified Detection Algorithm -- 4.6 Conclusion -- References. 
505 8 |a Chapter 5 -- Analysis of Mobile Threats and Security Vulnerabilities for Mobile Platforms and Devices -- Abstract -- 5.1 Introduction -- 5.2 Analysis of Mobile Platforms -- 5.2.1 Dominating Mobile Platforms -- 5.2.1.1 iPhone Operating System (iOS) -- 5.2.1.2 Android operating system (Android) -- 5.2.1.3 BlackBerry operating system -- 5.2.2 Security Models for Mobile Platforms -- 5.2.2.1 iOS security model -- 5.2.2.2 Android security model -- 5.2.2.3 BlackBerry security model -- 5.2.3 Existing Security Vulnerabilities in Mobile Platforms -- 5.2.3.1 Potential vulnerabilities -- 5.2.3.2 Mobile device malware -- 5.3 Threat Model for Mobile Platforms -- 5.3.1 Goals and Motives for an Attacker -- 5.3.1.1 Cybercriminals: outsourcing sensitive data -- 5.3.1.2 Cybercriminals: cyber heist -- 5.3.1.3 Cybercriminals: corporate espionage and sabotage -- 5.3.2 Attack Vectors or Modern Exploitation Techniquesfor Mobile Devices -- 5.3.2.1 Susceptibility on the mobile through hardware -- 5.3.2.2 Attacking through the Web -- 5.3.2.3 Mobile intrusion and deception through social engineering -- 5.3.2.4 Attacking through the mobile network -- 5.3.2.5 Cyber Arson through common mobile applications -- 5.3.2.6 Attacking via Bluetooth connection -- 5.3.3 Types of Malwares in Mobile Devices -- 5.3.3.1 Trojan-related malware -- 5.3.3.2 Worms targeting mobile devices -- 5.3.3.3 Viruses on the mobile -- 5.3.3.4 Ransomware: a mobile kidnapping -- 5.3.3.5 Mobile botnets -- 5.4 Defense Mechanisms for Securing Mobile Platforms -- 5.4.1 Keychain Authentication and Encryption -- 5.4.2 Binary Protection and Hardening -- 5.4.3 Third-Party OS Products -- 5.4.4 Obfuscators and Optimizers -- 5.4.5 Compiler and Linker Defense Mechanisms -- 5.4.6 Certificate-based Mobile Authentication -- 5.4.7 Token-based Mobile Authentication -- 5.4.8 Summary -- 5.5 Related Work. 
505 8 |a 5.6 Threats Analysis and Future Trends -- 5.7 Conclusion -- References -- PART III -- Cryptographic Algorithms -- Chapter 6 -- Quasigroup-Based Encryption for Low-Powered Devices -- Abstract -- 6.1 Introduction -- 6.2 Background-Low Energy Cryptosystems -- 6.3 Overview of Quasigroup Encryption -- 6.4 The Preliminary Block Cipher Design -- 6.5 Overview of Software Implementation -- 6.6 Overview of Three FPGA Implementations -- 6.6.1 The Quasigroup Implementation -- 6.6.2 Comparison Design-Parallel AES -- 6.6.3 Hybrid Front-End/AES Design -- 6.7 Experimental Results -- 6.8 Toward a Single-Chip Implementation -- 6.9 Algorithm Results for B = 2 to 8 -- 6.10 Generating Quasigroups Fast -- 6.11 Our Quasigroup Block Cipher Algorithm -- 6.12 Cryptanalysis and Improvements in the Block Cipher -- 6.13 Overview of a General Linear Cryptanalytical Attack -- 6.14 The LAT Design -- 6.15 Pilingup Attempts for N = 16, 32, and 64 -- 6.16 Analysis of the Attack on the Quasigroup -- 6.17 The Issue of a Total Linear Bias of 1/2 -- 6.18 Attack Complexity -- 6.19 Possible Changes that Could Be Made in the Design of This Attack Model -- 6.20 Which Quasigroup Order Is Best? -- 6.21 Conclusions -- References -- Chapter 7 -- Measuring Interpretation and Evaluationof Client-side Encryption Tools in Cloud Computing -- Abstract -- 7.1 Introduction -- 7.2 Cloud Service Providers (CSPs) -- 7.3 Deployment Model of Cloud Service Provider -- 7.4 Methodology -- 7.5 Deriving the Attributes of Existing Tools -- 7.5.1 AxCrypt -- 7.5.2 nCrypted Cloud -- 7.5.3 SafeBox -- 7.5.4 SpiderOak -- 7.5.5 Viivo -- 7.6 Comparison of the Studied Tools -- 7.7 Characteristics of the Studied Tools -- 7.8 Security of Encryption and Key Generation Mechanisms of the Studied Tools -- 7.9 Performance Measurement and Analysis -- 7.9.1 System Setup -- 7.9.1.1 Application tools -- 7.9.1.2 Cloud service provider. 
505 8 |a 7.9.1.3 Testing environment -- 7.9.2 Analysis -- 7.10 Results and Discussion -- 7.11 Conclusion and Future Work -- References -- Chapter 8 -- Kolmogorov-Smirnov Test-based Side-channel Distinguishers: Constructions, Analysis, and Implementations -- 8.1 Introduction -- 8.2 Preliminaries -- 8.2.1 Kolmogorov-Smirnov Test -- 8.2.2 KSA Distinguisher -- 8.2.3 PKS Distinguisher -- 8.3 Systematic Construction of KS Test-based Side-channel Distinguishers -- 8.3.1 Construction Strategies of KSA and PKS -- 8.3.2 Nine Variants of KS Test-based Distinguishers -- 8.4 An Experiment Analysis of All Twelve KS Test-based Side-channel Distinguishers -- 8.5 Implementation Methods of MPC-KSA [13] -- 8.5.1 Analysis of the Naive Method -- 8.5.2 Optimized Method I -- 8.5.3 Optimized Method II -- 8.6 Implementation Results -- 8.7 Conclusions -- Acknowledgments -- References -- Chapter 9 -- Multi-antenna Transmission Technique with Constellation Shaping for Secrecy at Physical Layer -- Abstract -- 9.1 Introduction -- 9.2 Transmitter Structure -- 9.3 Transmitter Configuration Possibilities and Security -- 9.4 Receivers and the Impact of Information Directivity -- 9.4.1 Simulation Results -- 9.4.2 Transmitter Configuration Effects in MI and Secrecy -- 9.5 Conclusions -- Acknowledgments -- References -- PART VI -- Reliable System Design -- Chapter 10 -Active Sub-Areas-Based Multi-Copy Routing in VDTNs -- Abstract -- 10.1 Introduction -- 10.2 RelatedWork -- 10.3 Identification of Each Vehicle's Active Sub-areas -- 10.4 Trace Measurement -- 10.4.1 Vehicle Mobility Pattern -- 10.4.2 Relationship between Contact and Location -- 10.5 Active Area-based Routing Method -- 10.5.1 Traffic-Considered Shortest Path Spreading -- 10.5.1.1 Road traffic measurement -- 10.5.1.2 Building traffic-considered shortest path tree -- 10.5.2 Contact-based Scanning in Each Active Sub-area. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures  |2 fast 
700 1 |a Striegel, Aaron. 
700 1 |a Song, Min. 
758 |i has work:  |a Security, privacy and reliability in computer communications and networks (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCH86X9FkdBDBc4wfkCyqV3  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Sha, Kewei.  |t Security, Privacy and Reliability in Computer Communications and Networks.  |d Aalborg : River Publishers, ©2016  |z 9788793379893 
830 0 |a River Publishers series in communications. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4771355  |z Texto completo 
936 |a BATCHLOAD 
938 |a YBP Library Services  |b YANK  |n 13313412 
994 |a 92  |b IZTAP