This dissertation reports research conducted in two aspects of secure network resource management: strengthening security by proposing a defense architecture with stronger security property and increasing deployability. In the first part of this dissertation, we reveal a new threat called false feedback attack in wireless networks using channel-aware protocols. Our simulations show that an attacker overclaiming its channel condition is able to completely steal other benign users' service opportunity under a high-efficiency scheduler. A fair scheduler can mitigate this attack but cannot provide high efficiency. We propose a new secure channel estimation scheme to maintain security while achieving high efficiency at the same time. ...
Wireless network access protocols are used in numerous safety critical applications. Network availab...
Deploying defense mechanisms in routers holds promises for protecting infrastructure resources such ...
In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks...
This dissertation reports research conducted in two aspects of secure network resource management: ...
Denial-of-Service (DoS) is a computer security problem that poses a serious challenge totrustworthin...
Coordination of network functions in wireless networks requires frequent exchange of control message...
Availability of service in many wireless networks depends on the ability for network users to establ...
In this dissertation, we focus on the security and reliability of wireless sensor networks (WSNs). W...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
This paper is concerned with the security control problem of the networked control system (NCSs) sub...
Wireless networks are deployed in many critical areas, such as health care centers, hospitals, polic...
Wireless networking protocols square measure progressively being designed to use a user‘s measured c...
In reservation-based MAC protocols, adversaries that have compromised a node can perform an efficien...
Wireless networks implementing dynamic channel assignment mechanisms are vulnerable to stealthy deco...
Denial-of-service (DoS) is one of the major network security threats. While network-DoS (N-DoS) inci...
Wireless network access protocols are used in numerous safety critical applications. Network availab...
Deploying defense mechanisms in routers holds promises for protecting infrastructure resources such ...
In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks...
This dissertation reports research conducted in two aspects of secure network resource management: ...
Denial-of-Service (DoS) is a computer security problem that poses a serious challenge totrustworthin...
Coordination of network functions in wireless networks requires frequent exchange of control message...
Availability of service in many wireless networks depends on the ability for network users to establ...
In this dissertation, we focus on the security and reliability of wireless sensor networks (WSNs). W...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
This paper is concerned with the security control problem of the networked control system (NCSs) sub...
Wireless networks are deployed in many critical areas, such as health care centers, hospitals, polic...
Wireless networking protocols square measure progressively being designed to use a user‘s measured c...
In reservation-based MAC protocols, adversaries that have compromised a node can perform an efficien...
Wireless networks implementing dynamic channel assignment mechanisms are vulnerable to stealthy deco...
Denial-of-service (DoS) is one of the major network security threats. While network-DoS (N-DoS) inci...
Wireless network access protocols are used in numerous safety critical applications. Network availab...
Deploying defense mechanisms in routers holds promises for protecting infrastructure resources such ...
In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks...