Resilient security in pervasive Internet: Data authentication and service availability | | Posted on:2007-11-26 | Degree:Ph.D | Type:Dissertation | | University:University of California, Los Angeles | Candidate:Yang, Hao | Full Text:PDF | | GTID:1458390005984528 | Subject:Computer Science | | Abstract/Summary: | PDF Full Text Request | | Today computer networks are indispensable in our daily life. The Internet has become the global data communication infrastructure and provided convenient information and service access to anyone with a networked computer. The future pervasive Internet will play an even more important role by converging different networking technologies. While the wired Internet continues to serve as the backbone, the wireless access networks will provide the users ubiquitous coverage and "anytime, anywhere" access. The emerging sensor networks will also become new citizens in the pervasive Internet and enable many applications with intelligent human-to-environment interaction.; Security is one critical requirement for the pervasive Internet as a dependable network infrastructure. In order to protect the network from malicious attacks, the entire protocol stack must be carefully examined and secured. However, it is non-trivial to design and deploy secure protocols in a large-scale distributed network due to the following three challenges. First, individual nodes in the network are prone to security compromise, and the adversary may exploit such compromised nodes to launch insider attacks. Second, in many cases, we cannot have the luxury of a clean-slate security design. Instead, the solutions are largely constrained by the existing operational systems. Third, a large-scale system is typically operated by many different administrative domains, each of which manages the system in a different and often imperfect manner.; In this dissertation, we address the above challenges through a novel resilient security design approach as follows. First, instead of aiming at "perfect security" under a restricted attack model, we seek to design resilient security solutions that can offer gracefully degraded protection when the attacker's power increases. Second, we assess the security designs based on not only their cryptographic strength but also their practical and operational performance. We demonstrate the concept of resilient security in both wired and wireless networks through the provision of two critical security services, namely data authentication and service availability. To this end, we have proposed a set of novel secure protocols and techniques to protect the Internet Domain Name System (DNS) and the emerging wireless ad-hoc and sensor networks.; We first study data authentication in sensor networks, and propose a location-based security design to detect and drop forged data as early as possible. This is achieved by binding symmetric keys to geographic cells and pre-distributing these keys to nodes based on their deployed locations. By constraining each key's usage and each node's available keys, our design can achieve highly resilient filtering power as more sensor nodes are compromised.; To ensure highly available packet delivery service in mobile ad-hoc networks, we design a self-organized security solution that protect routing and data forwarding operations through localized collaboration and information cross-validation. In our design, local neighboring nodes collaboratively monitor each other by overhearing the wireless channel, and sustain each other via a distributed ticket service. This way, a malicious node can be quickly detected and evicted from the network.; We then consider the Internet DNS system and study its resiliency under the emerging DoS attacks. The DNS hierarchical structure is extremely vulnerable to DoS attacks, because the failure of a single node makes all its descendants unaccessible. To achieve DoS-resilient name resolution service, we propose an overlay-based design that can ensures high degree of service accessibility for each surviving node. This is achieved by the combination of three novel techniques of hierarchical overlays, randomized overlays, and overlay recovery.; Finally, we assess the practical performance of DNS Security Extensions (DNSSEC) that have been designed to achieve data authentication in the... | | Keywords/Search Tags: | Data, Security, Internet, Service, DNS, Networks | PDF Full Text Request | Related items |
| |
|