dc.contributor.author | Nguyen, Son Thanh | |
dc.date.accessioned | 2011-09-01T06:29:41Z | |
dc.date.available | 2011-09-01T06:29:41Z | |
dc.date.issued | 2009-11-20 | |
dc.identifier.citation | Secure and reliable wireless and ad hoc communications by Son Thanh Nguyen, Stavanger : University of Stavanger, 2009 (PhD thesis UiS, no. 82) | en_US |
dc.identifier.isbn | 978-82-7644-390-5 | |
dc.identifier.issn | 1890-1387 | |
dc.identifier.uri | http://hdl.handle.net/11250/181846 | |
dc.description | PhD thesis in Information technology | en_US |
dc.description | The author has published five papers and has the other two papers under review.
Below is the list of papers completed during the author's PhD study.
Published Papers
1. Son T. Nguyen, Erdal Cayirci, Liang Yan, Chunming Rong. \A Shadow
Zone Aware Routing Protocol for Tactical Acoustic Undersea Surveillance
Networks". In Proceedings of Milcom 2009, Oct 18-21, 2009, Boston, USA.
2. Erdal Cayirci, Son T. Nguyen, Chunming Rong. \Secure Many to Many
Routing for Wireless Sensor and Actuator Networks". Invited paper in
the 2nd International Conference on Security of Information and Networks
(SIN 2009), Oct 6-10, 2009, North Cyprus.
3. Son T. Nguyen, Erdal Cayirci, Liang Yan, Chunming Rong. \A Shadow
Zone Aware Routing Protocol for Acoustic Underwater Sensor Networks".
IEEE Communications Letters, Vol.13, Issue 5, pages 366-368, May 2009.
4. Son Thanh Nguyen, Chunming Rong. \ZigBee Security Using Identity-
Based Cryptography". In Proceedings of the 4th International Conference
on Autonomous and Trusted Computing (ATC'07), Jul 11-13, 2007; LNCS
4610 pages 3-12, Hong Kong, PRC.
5. Son Thanh Nguyen, Chunming Rong. \Electronic Payment Scheme Using
Identity-Based Cryptography". In Proceedings of the 4th European PKI
Workshop: Theory and Practice (EuroPKI'07) Jun 28-30, 2007; LNCS
4582 pages 330-337, Mallorca, Spain.
Papers Under Review
6. Son T. Nguyen, Erdal Cayirci, Liang Yan, Chunming Rong. \A Shadow
Zone Aware Routing Protocol for Underwater Sensor Nodes with Power
Controlled and Movable Transducer". Submitted to IEEE/ACM Transac-
tions on Networking.
7. Son T. Nguyen, Erdal Cayirci, Chunming Rong. \Secure Many to Many
Routing for Wireless Sensor and Actuator Networks". Submitted to ACM
Wireless Networks. | |
dc.description | Paper 4, 5, 6 and 7 have been added to constitute Part II of this thesis and are named Paper A, B, C and D respectively. Paper C is an extension of Paper 1
and 3 while Paper D is an extension of Paper 2. The included papers have been re-formatted to comply with the thesis layout. | |
dc.description | Part II is not available for the time being | |
dc.description | Links to papers on the publishers web site: | |
dc.description | Paper 1 : http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5380039 | |
dc.description | Paper 2 : http://dl.acm.org/citation.cfm?doid=1626195.1626239 | |
dc.description | Paper 3 :
http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F4234%2F4939326%2F04939354.pdf%3Farnumber%3D4939354&authDecision=-203 | |
dc.description | Paper 4 : https://springerlink3.metapress.com/content/e623m47t15445153/resource-secured/?target=fulltext.pdf&sid=2fq3tk15drmxafal3uyzg5h1&sh=www.springerlink.com | |
dc.description | Paper 5 : https://springerlink3.metapress.com/content/9314317177p34571/resource-secured/?target=fulltext.pdf&sid=2s1uw3lejyvad323suxfihgm&sh=www.springerlink.com | |
dc.description | To contact the author, use "sonnt3377@gmail.com" | |
dc.description.abstract | Wireless and ad hoc communication systems create additional challenges for the implementation of security and reliability services when compared to fixed networks. On the one hand, the inherent characteristics of wireless environment contribute serious system vulnerabilities if the security requirements are not met.
On the other hand, the mobility pattern as well as resource constraints of ad hoc devices make security design more difficult.
The principal objective of SWACOM project (Secure and Reliable Wireless and Ad Hoc Communications) is to analyze vulnerabilities and develop mechanisms to provide security and reliability in wireless communication networks. A particular focus is on large scale distributed ad hoc networks, which are used in many civilian and military applications.
The work contained in this PhD thesis aims to investigate and develop solutions for providing secure and reliable wireless and ad hoc communications. The research goals of this PhD work are:
Goal 1: To collect knowledge that forms a foundation for security and reliability in wireless communications, especially communication in ad hoc networks.
Goal 2: To create solutions for securing and providing reliable wireless communication services, especially for ad hoc network applications.
This PhD project contains a number of distinct, but related works tied to SWACOM project research theme. The main contributions of this thesis are:
Contribution 1: Propose an alternative approach to secure wireless and ad hoc communications by using identity-based cryptography. Paper A introduces a new application of identity-based cryptography to replace current ZigBee security solution, while Paper B proposes an application of identity-based cryptography to secure a distributed electronic payment scheme using mobile phones.
Contribution 2: Propose a routing algorithm to provide reliable communications for underwater sensor networks. Sensor devices running our algorithm can actively move out of shadow zones areas, which causes network disconnection, to keep themselves connected. The solution helps to increase the availability and reliability of underwater sensor network operations. This contribution is presented in Paper C.
Contribution 3: Propose a new secure multicast routing algorithm to increase energy e ciency in actuator and sensor networks. We use existing security building blocks for providing security services while introducing a new solution for reducing energy consumption for multicast communication in sensor and actuator networks. Paper D presents this work.
The thesis is divided into two parts. The first part is an introduction that contains two chapters while the second part is a collection of papers, which consists of four papers.
Chapter 1 presents the background and motivation for this PhD research. In this chapter, we briefly review the security for wireless and ad hoc networks, as well as the use of identity-based cryptography to simplify security implementations. We also discuss security and reliability issues in sensor networks, including underwater sensors with different characteristics. Chapter 2 summarizes paper contents and presents contributions of our papers. This chapter ends with conclusions and discussion of open problems.
Four papers in Part II are grouped into two categories. Paper A and B are the applications of identity-based cryptography for securing wireless and ad hoc applications. Paper C and D are solutions for secure and reliable communications in wireless sensor networks. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | University of Stavanger, Norway | en_US |
dc.relation.ispartofseries | PhD thesis UiS;82 | |
dc.rights | Copyright the author, all right reserved | |
dc.subject | informasjonsteknologi | en_US |
dc.title | Secure and reliable wireless and ad hoc communications | en_US |
dc.type | Doctoral thesis | en_US |
dc.subject.nsi | VDP::Mathematics and natural science: 400::Information and communication science: 420 | en_US |
dc.source.pagenumber | 46 | en_US |