Vis enkel innførsel

dc.contributor.authorNguyen, Son Thanh
dc.date.accessioned2011-09-01T06:29:41Z
dc.date.available2011-09-01T06:29:41Z
dc.date.issued2009-11-20
dc.identifier.citationSecure and reliable wireless and ad hoc communications by Son Thanh Nguyen, Stavanger : University of Stavanger, 2009 (PhD thesis UiS, no. 82)en_US
dc.identifier.isbn978-82-7644-390-5
dc.identifier.issn1890-1387
dc.identifier.urihttp://hdl.handle.net/11250/181846
dc.descriptionPhD thesis in Information technologyen_US
dc.descriptionThe author has published five papers and has the other two papers under review. Below is the list of papers completed during the author's PhD study. Published Papers 1. Son T. Nguyen, Erdal Cayirci, Liang Yan, Chunming Rong. \A Shadow Zone Aware Routing Protocol for Tactical Acoustic Undersea Surveillance Networks". In Proceedings of Milcom 2009, Oct 18-21, 2009, Boston, USA. 2. Erdal Cayirci, Son T. Nguyen, Chunming Rong. \Secure Many to Many Routing for Wireless Sensor and Actuator Networks". Invited paper in the 2nd International Conference on Security of Information and Networks (SIN 2009), Oct 6-10, 2009, North Cyprus. 3. Son T. Nguyen, Erdal Cayirci, Liang Yan, Chunming Rong. \A Shadow Zone Aware Routing Protocol for Acoustic Underwater Sensor Networks". IEEE Communications Letters, Vol.13, Issue 5, pages 366-368, May 2009. 4. Son Thanh Nguyen, Chunming Rong. \ZigBee Security Using Identity- Based Cryptography". In Proceedings of the 4th International Conference on Autonomous and Trusted Computing (ATC'07), Jul 11-13, 2007; LNCS 4610 pages 3-12, Hong Kong, PRC. 5. Son Thanh Nguyen, Chunming Rong. \Electronic Payment Scheme Using Identity-Based Cryptography". In Proceedings of the 4th European PKI Workshop: Theory and Practice (EuroPKI'07) Jun 28-30, 2007; LNCS 4582 pages 330-337, Mallorca, Spain. Papers Under Review 6. Son T. Nguyen, Erdal Cayirci, Liang Yan, Chunming Rong. \A Shadow Zone Aware Routing Protocol for Underwater Sensor Nodes with Power Controlled and Movable Transducer". Submitted to IEEE/ACM Transac- tions on Networking. 7. Son T. Nguyen, Erdal Cayirci, Chunming Rong. \Secure Many to Many Routing for Wireless Sensor and Actuator Networks". Submitted to ACM Wireless Networks.
dc.descriptionPaper 4, 5, 6 and 7 have been added to constitute Part II of this thesis and are named Paper A, B, C and D respectively. Paper C is an extension of Paper 1 and 3 while Paper D is an extension of Paper 2. The included papers have been re-formatted to comply with the thesis layout.
dc.descriptionPart II is not available for the time being
dc.descriptionLinks to papers on the publishers web site:
dc.descriptionPaper 1 : http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5380039
dc.descriptionPaper 2 : http://dl.acm.org/citation.cfm?doid=1626195.1626239
dc.descriptionPaper 3 : http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F4234%2F4939326%2F04939354.pdf%3Farnumber%3D4939354&authDecision=-203
dc.descriptionPaper 4 : https://springerlink3.metapress.com/content/e623m47t15445153/resource-secured/?target=fulltext.pdf&sid=2fq3tk15drmxafal3uyzg5h1&sh=www.springerlink.com
dc.descriptionPaper 5 : https://springerlink3.metapress.com/content/9314317177p34571/resource-secured/?target=fulltext.pdf&sid=2s1uw3lejyvad323suxfihgm&sh=www.springerlink.com
dc.descriptionTo contact the author, use "sonnt3377@gmail.com"
dc.description.abstractWireless and ad hoc communication systems create additional challenges for the implementation of security and reliability services when compared to fixed networks. On the one hand, the inherent characteristics of wireless environment contribute serious system vulnerabilities if the security requirements are not met. On the other hand, the mobility pattern as well as resource constraints of ad hoc devices make security design more difficult. The principal objective of SWACOM project (Secure and Reliable Wireless and Ad Hoc Communications) is to analyze vulnerabilities and develop mechanisms to provide security and reliability in wireless communication networks. A particular focus is on large scale distributed ad hoc networks, which are used in many civilian and military applications. The work contained in this PhD thesis aims to investigate and develop solutions for providing secure and reliable wireless and ad hoc communications. The research goals of this PhD work are: Goal 1: To collect knowledge that forms a foundation for security and reliability in wireless communications, especially communication in ad hoc networks. Goal 2: To create solutions for securing and providing reliable wireless communication services, especially for ad hoc network applications. This PhD project contains a number of distinct, but related works tied to SWACOM project research theme. The main contributions of this thesis are: Contribution 1: Propose an alternative approach to secure wireless and ad hoc communications by using identity-based cryptography. Paper A introduces a new application of identity-based cryptography to replace current ZigBee security solution, while Paper B proposes an application of identity-based cryptography to secure a distributed electronic payment scheme using mobile phones. Contribution 2: Propose a routing algorithm to provide reliable communications for underwater sensor networks. Sensor devices running our algorithm can actively move out of shadow zones areas, which causes network disconnection, to keep themselves connected. The solution helps to increase the availability and reliability of underwater sensor network operations. This contribution is presented in Paper C. Contribution 3: Propose a new secure multicast routing algorithm to increase energy e ciency in actuator and sensor networks. We use existing security building blocks for providing security services while introducing a new solution for reducing energy consumption for multicast communication in sensor and actuator networks. Paper D presents this work. The thesis is divided into two parts. The first part is an introduction that contains two chapters while the second part is a collection of papers, which consists of four papers. Chapter 1 presents the background and motivation for this PhD research. In this chapter, we briefly review the security for wireless and ad hoc networks, as well as the use of identity-based cryptography to simplify security implementations. We also discuss security and reliability issues in sensor networks, including underwater sensors with different characteristics. Chapter 2 summarizes paper contents and presents contributions of our papers. This chapter ends with conclusions and discussion of open problems. Four papers in Part II are grouped into two categories. Paper A and B are the applications of identity-based cryptography for securing wireless and ad hoc applications. Paper C and D are solutions for secure and reliable communications in wireless sensor networks.en_US
dc.language.isoengen_US
dc.publisherUniversity of Stavanger, Norwayen_US
dc.relation.ispartofseriesPhD thesis UiS;82
dc.rightsCopyright the author, all right reserved
dc.subjectinformasjonsteknologien_US
dc.titleSecure and reliable wireless and ad hoc communicationsen_US
dc.typeDoctoral thesisen_US
dc.subject.nsiVDP::Mathematics and natural science: 400::Information and communication science: 420en_US
dc.source.pagenumber46en_US


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel