Show simple item record

Security and Collaboration Protocols for Mobile and Sensor Networks.

dc.contributor.authorChang, Katharineen_US
dc.date.accessioned2013-02-04T18:05:30Z
dc.date.availableNO_RESTRICTIONen_US
dc.date.available2013-02-04T18:05:30Z
dc.date.issued2012en_US
dc.date.submitted2012en_US
dc.identifier.urihttps://hdl.handle.net/2027.42/96079
dc.description.abstractResearch in network and computer system architecture is evolving beyond its traditional focus as mobile devices become ubiquitous and mobile computing triggers dramatic change in the computing world. Mobile devices can form heterogeneous mobile networks that provide distributed services and information access in real time from anywhere in the world. Coincident with this change, the assurance of network and system security and availability becomes an important problem. This problem is challenging because it requires the system to be easy to manage and operate, but also requires reliability and security. For the purpose of securing a network, we usually require authentication, authorization, and accounting. Authentication requires users to prove their identity. Accounting requires intrusion detection or forensic analysis to find attacks, if any, in the system. Finally, authorization requires access control to ensure data privacy. This dissertation aims to design security and collaboration protocols to create a comprehensive trust framework to protect mobile and sensor networks by applying cryptographic algorithms. It makes three primary contributions. First, we propose and implement a distributed authentication protocol called DAPP in wireless sensor networks to allow sensors to authenticate servers without requiring a commonly-used trusted authentication server. DAPP maintains the distributed nature of sensor networks, has low computation and communication overhead, and is resilient to node compromises. Second, to attain security for nodes in mobile ad hoc networks, we present an intrusion detection system (IDS) architecture at the application layer to help detect malicious nodes in the network. We describe the design of this architecture and the use of mobile agents to augment each node's IDS. Finally, we design a trusted group-based information sharing protocol called TGIS for mobile devices to establish a trust relationship with collaborators and enforce data access control between collaborators with different privileges. TGIS is built upon existing trust infrastructures in individual organizations to enable trust management for group collaboration. The security and collaboration protocols presented in this dissertation together achieve secure distributed authentication, authorization, and accounting in mobile and sensor networks.en_US
dc.language.isoen_USen_US
dc.subjectSecurity Protocolsen_US
dc.subjectAlgorithmsen_US
dc.subjectDistributed Systemsen_US
dc.titleSecurity and Collaboration Protocols for Mobile and Sensor Networks.en_US
dc.typeThesisen_US
dc.description.thesisdegreenamePhDen_US
dc.description.thesisdegreedisciplineComputer Science & Engineeringen_US
dc.description.thesisdegreegrantorUniversity of Michigan, Horace H. Rackham School of Graduate Studiesen_US
dc.contributor.committeememberShin, Kang Geunen_US
dc.contributor.committeememberMei, Qiaozhuen_US
dc.contributor.committeememberPrakash, Atulen_US
dc.contributor.committeememberHalderman, J. Alexen_US
dc.subject.hlbsecondlevelComputer Scienceen_US
dc.subject.hlbtoplevelEngineeringen_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/96079/1/katchang_1.pdf
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.