Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Secure dissemination). Showing records 1 – 3 of 3 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Georgia Tech

1. Lakshmanan, Subramanian. Secure Store : A Secure Distributed Storage Service.

Degree: PhD, Computing, 2004, Georgia Tech

As computers become pervasive in environments that include the home and community, new applications are emerging that will create and manipulate sensitive and private information. These applications span systems ranging from personal to mobile and hand held devices. They would benefit from a data storage service that protects the integrity and confidentiality of the stored data and is highly available. Such a data repository would have to meet the needs of a variety of applications, handling data with varying security and performance requirements. Providing simultaneously both high levels of security and high levels of performance may not be possible when many nodes in the system are under attack. The agility approach to building secure distributed services advocates the principle that the overhead of providing strong security guarantees should be incurred only by those applications that require such high levels of security and only at times when it is necessary to defend against high threat levels. A storage service that is designed for a variety of applications must follow the principles of agility, offering applications a range of options to choose from for their security and performance requirements. This research presents secure store, a secure and highly available distributed store to meet the performance and security needs of a variety of applications. Secure store is designed to guarantee integrity, confidentiality and availability of stored data even in the face of limited number of compromised servers. Secure store is designed based on the principles of agility. Secure store integrates two well known techniques, namely replication and secret-sharing, and exploits the tradeoffs that exist between security and performance to offer applications a range of options to choose from to suit their needs. This thesis makes several contributions, including (1) illustration of the the principles of agility, (2) a novel gossip-style secure dissemination protocol whose performance is comparable to the best-possible benign-case protocol in the absence of any malicious activity, (3) demonstration of the performance benefits of using weaker consistency models for data access, and (4) a technique called collective endorsement that can be used in other secure distributed applications. Advisors/Committee Members: Ahamad, Mustaque (Committee Member), Blough, Douglas M. (Committee Member), Lee, Wenke (Committee Member), Ramachandran, Umakishore (Committee Member), Venkateswaran, H. (Committee Member).

Subjects/Keywords: Consistency; Secure dissemination; Byzantine fault tolerance; Storage security; Distributed storage

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lakshmanan, S. (2004). Secure Store : A Secure Distributed Storage Service. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/4777

Chicago Manual of Style (16th Edition):

Lakshmanan, Subramanian. “Secure Store : A Secure Distributed Storage Service.” 2004. Doctoral Dissertation, Georgia Tech. Accessed June 16, 2019. http://hdl.handle.net/1853/4777.

MLA Handbook (7th Edition):

Lakshmanan, Subramanian. “Secure Store : A Secure Distributed Storage Service.” 2004. Web. 16 Jun 2019.

Vancouver:

Lakshmanan S. Secure Store : A Secure Distributed Storage Service. [Internet] [Doctoral dissertation]. Georgia Tech; 2004. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/1853/4777.

Council of Science Editors:

Lakshmanan S. Secure Store : A Secure Distributed Storage Service. [Doctoral Dissertation]. Georgia Tech; 2004. Available from: http://hdl.handle.net/1853/4777


University of New South Wales

2. Tan, Hailun. Secure network programming in wireless sensor networks.

Degree: Computer Science & Engineering, 2010, University of New South Wales

Network programming is one of the most important applications in Wireless Sensor Networks as It provides an efficient way to update program Images running on sensor nodes without physical access to them. Securing these updates, however, remains a challenging and important issue, given the open deployment environment of sensor nodes. Though several security schemes have been proposed to impose the authenticity and Integrity protection on network programming applications, they are either energy Inefficient as they tend to use digital signature or lacks the data confidentiality. In addition, due to the absence of secure memory management in the current sensor hardware, the attacker could inject malicious code into the program flash by exploiting buffer overflow In the memory despite the secure code dissemination.The contribution of this thesis Is to provide two software-based security protocols and one hardware-based remote attestation protocol for network programming application.Our first protocol deploys multiple one-way key chains for a multi-hop sensor network. The scheme Is shown to be lower In computational, power consumption and communication costs yet still able to secure multi•hop propagation of program images.Our second protocol utilizes an Iterative hash structure to the data packets in network programming application, ensuring the data confidentiality and authenticity. In addition, we Integrated confidentiality and DoS-attack-resistance in a multi•hop code dissemination protocol.Our final solution is a hardware-based remote attestation protocol for verification of running codes on sensor nodes. An additional piece of tamper-proof hardware, Trusted Platform Module (TPM), is imposed into the sensor nodes. It secures the sensitive information (e.g., the session key) from attackers and monitors any platform environment changes with the Internal registers. With these features of TPM, the code Injection attack could be detected and removed when the contaminated nodes are challenged in our remote attestation protocol.We implement the first two software-based protocols with Deluge as the reference network programming protocol in TinyOS, evaluate them with the extensive simulation using TOSSIM and validate the simulation results with experiments using Tmote. We implement the remote attestation protocol on Fleck, a sensor platform developed by CSIRO that Integrates an Atmel TPM chip. Advisors/Committee Members: Jha, Sanjay, Computer Science & Engineering, Faculty of Engineering, UNSW, Zic, John, ICT Centre, CSIRO.

Subjects/Keywords: Network Programming; Broadcast Authentication; Wireless Sensor Network; Code Dissemination; Trusted Platform Module; Sensor Worm Attack; Wormhole Attack; Remote Attestation; Secure Network Protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tan, H. (2010). Secure network programming in wireless sensor networks. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/44835 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:8132/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Tan, Hailun. “Secure network programming in wireless sensor networks.” 2010. Doctoral Dissertation, University of New South Wales. Accessed June 16, 2019. http://handle.unsw.edu.au/1959.4/44835 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:8132/SOURCE02?view=true.

MLA Handbook (7th Edition):

Tan, Hailun. “Secure network programming in wireless sensor networks.” 2010. Web. 16 Jun 2019.

Vancouver:

Tan H. Secure network programming in wireless sensor networks. [Internet] [Doctoral dissertation]. University of New South Wales; 2010. [cited 2019 Jun 16]. Available from: http://handle.unsw.edu.au/1959.4/44835 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:8132/SOURCE02?view=true.

Council of Science Editors:

Tan H. Secure network programming in wireless sensor networks. [Doctoral Dissertation]. University of New South Wales; 2010. Available from: http://handle.unsw.edu.au/1959.4/44835 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:8132/SOURCE02?view=true

3. Kumbakonam Chandrasekar, Ramalingam. PROVIZ: an integrated graphical programming, visualization and scripting framework for WSNs.

Degree: MS, Electrical and Computer Engineering, 2013, Georgia Tech

Wireless Sensor Networks (WSNs) are rapidly gaining popularity in various critical domains like health care, critical infrastructure, and climate monitoring, where application builders have diversified development needs. Independent of the functionalities provided by the WSN applications, many of the developers use visualization, simulation, and programming tools. However, these tools are designed as separate stand-alone applications, which force developers to use multiple tools. This situation often poses confusion and hampers an efficient development experience. To avoid the complexity of using multiple tools, a new, extensible, multi-platform, scalable, and open-source framework called PROVIZ is designed. PROVIZ is an integrated visualization and programming framework with the following features: PROVIZ 1) visualizes sensor nodes and WSN traffic by parsing the data received either from a packet sniffer (e.g., a sensor-based sniffer, or a commercial TI SmartRF 802.15.4 packet sniffer), or from a simulator (e.g., OMNeT); 2) visualizes a heterogeneous WSN consisting of different sensor nodes sending packets with different packet payload formats; and 3) provides a programming framework, which provides a graphical and script-based programming functionality, for developing WSN applications. Also, PROVIZ includes built-in extensible visual demo deployment capabilities that allow users to quickly craft network scenarios and share them with other users. Additionally, a secure and energy efficient wireless code dissemination protocol, named SIMAGE, was developed. SIMAGE is used by PROVIZ to wirelessly reprogram the sensor nodes. SIMAGE uses a link quality cognizant adaptive packet-sizing technique along with energy-efficient encryption protocols for secure and efficient code dissemination. In this thesis, the various features of PROVIZ's visualization and programming framework are explained, the functionality and performance of SIMAGE protocol is described, an example WSN security attack scenario is analyzed, and how PROVIZ can be used as a visual debugging tool to identify the security attack and aid in providing a software fix are discussed. Advisors/Committee Members: Beyah, Raheem (Committee Chair), Coyle, Edward (Committee Member), Zhang, Ying (Committee Member).

Subjects/Keywords: Secure code dissemination; SIMAGE; Wireless code dissemination; Simulation tool; Programming tool; Visualization and monitoring tool; PROVIZ; Wireless sensor networks; Wireless sensor networks; Information visualization

…an energy-efficient and secure wireless code dissemination protocol, which 1 can work… …secure wireless code dissemination protocol for programing the sensor nodes over-the-air… …an energy-efficient and secure code dissemination protocol for WSNs, named Secure and Link… …the techniques, the code dissemination process is not secure and can be eavesdropped, or… …process in WSNs, DiCode [25], provides a secure and distributed code dissemination… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kumbakonam Chandrasekar, R. (2013). PROVIZ: an integrated graphical programming, visualization and scripting framework for WSNs. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/47633

Chicago Manual of Style (16th Edition):

Kumbakonam Chandrasekar, Ramalingam. “PROVIZ: an integrated graphical programming, visualization and scripting framework for WSNs.” 2013. Masters Thesis, Georgia Tech. Accessed June 16, 2019. http://hdl.handle.net/1853/47633.

MLA Handbook (7th Edition):

Kumbakonam Chandrasekar, Ramalingam. “PROVIZ: an integrated graphical programming, visualization and scripting framework for WSNs.” 2013. Web. 16 Jun 2019.

Vancouver:

Kumbakonam Chandrasekar R. PROVIZ: an integrated graphical programming, visualization and scripting framework for WSNs. [Internet] [Masters thesis]. Georgia Tech; 2013. [cited 2019 Jun 16]. Available from: http://hdl.handle.net/1853/47633.

Council of Science Editors:

Kumbakonam Chandrasekar R. PROVIZ: an integrated graphical programming, visualization and scripting framework for WSNs. [Masters Thesis]. Georgia Tech; 2013. Available from: http://hdl.handle.net/1853/47633

.