Deutsch
Schweiz
Anmelden
Tipp von eurobuch.ch
Ähnliche Bücher
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Suchtools
Buchtipps
Aktuelles
Werbung
Bezahlte Anzeige
FILTER
- 0 Ergebnisse
Kleinster Preis: 45,80 €, größter Preis: 45,80 €, Mittelwert: 45,80 €
Direct End-to-Middle Authentication in Cooperative Networks - Heer, Tobias Martin
Vergriffenes Buch, derzeit bei uns nicht verfügbar.
(*)
Heer, Tobias Martin:
Direct End-to-Middle Authentication in Cooperative Networks - Taschenbuch

24, ISBN: 3844007105

ID: 156916

1., Aufl. Paperback 258 S. Broschiert Cooperative networks rely on user cooperation at the network layer to provide services, such as packet forwarding or shared access to other network resources like storage or Internet access. Examples of cooperative networks that build upon user contribution are ad-hoc networks, decentralized wireless mesh networks, micro-operator networks, wireless Internet access sharing networks or hybrids between these network types. However, while it enables new types of networks and services, the concept of cooperative network service provisioning also creates new attack possibilities for malicious and selfish users. For example, wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception of, tampering with, and forging of packets. Thus, reliable communication in such networks quintessentially depends on mechanisms to allow on-path devices, such as middleboxes, to verify the authenticity of network traffic and the identity of the communicating peers.Efficient standard authentication techniques for end-to-middle authentication typically assume the presence of shared keys within the network or rely on trusted third parties, such as on-line authentication servers. However, in cooperative scenarios, these approaches suffer from significant drawbacks in respect to functionality and efficiency. Moreover, the tight resource constraints of wireless routers and access points in cooperative scenarios make the use of more flexible but less efficient authentication techniques challenging. Hence, a careful selection of cryptographic components and the creation of new and flexible and efficient mechanisms is required to enable end-to-middle authentication in cooperative multi-hop networks.In this thesis, we address the problem of end-to-middle authentication on different levels of granularity, ranging from infrequent signaling events to rapid verification of high-bandwidth payload streams. The different security and performance requirements of signaling and payload traffic prevent the creation of a one-size-fits-all solution but requires the use of specialized approaches. We designed and analyzed three solutions that cover low-frequency signaling events as well as high-frequency payload protection.We first analyze and extend the Host Identity Protocol to enable secure publickey based end-to-middle authentication for signaling traffic. However, the use of CPU-intensive public-key verification prevents the use of this solution for verifying high-bandwidth payload streams. Consequently, our second solution focuses on more lightweight cryptographic components to provide end-to-middle authentication for payload. The Adaptive and Lightweight Protocol for Hop-By-hop Authentication, ALPHA, uses efficient hash functions and hash chains to enable rapid verification of the source and integrity of a payload packet. Finally, our third solution sacrifices end-to-middle integrity protection of the packet to further improve the verification performance. The family of Stream-based Per-packet One-time Token Schemes, SPOTS enables middleboxes to rapidly authenticate the source of a packet when the middlebox is agnostic to the contents of the forwarded packet. In combination, the three solution provide a flexible set of mechanisms that enables efficient end-tomiddle authentication for a wide range of scenarios within and beyond the setting of cooperative multi-hop networks. ISBN 9783844007107 SPOTS, Authenticated End-to-Middle Signaling, Network Security, Lightweight End-to-middle Authentication, Middleboxes, HIP, Cooperative Networks, Authentication, mit Schutzumschlag neu, [PU:Shaker,]

Neues Buch Achtung-Buecher.de
Speyer & Peters GmbH, 12165 Berlin
Versandkosten:Versandkosten innerhalb der BRD (EUR 2.30)
Details...
(*) Derzeit vergriffen bedeutet, dass dieser Titel momentan auf keiner der angeschlossenen Plattform verfügbar ist.
Direct End-to-Middle Authentication in Cooperative Networks  1., Aufl. - Heer, Tobias Martin
Vergriffenes Buch, derzeit bei uns nicht verfügbar.
(*)
Heer, Tobias Martin:
Direct End-to-Middle Authentication in Cooperative Networks 1., Aufl. - Taschenbuch

24, ISBN: 9783844007107

ID: 156916

1., Aufl. 258 S. Paperback Cooperative networks rely on user cooperation at the network layer to provide services, such as packet forwarding or shared access to other network resources like storage or Internet access. Examples of cooperative networks that build upon user contribution are ad-hoc networks, decentralized wireless mesh networks, micro-operator networks, wireless Internet access sharing networks or hybrids between these network types. However, while it enables new types of networks and services, the concept of cooperative network service provisioning also creates new attack possibilities for malicious and selfish users. For example, wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception of, tampering with, and forging of packets. Thus, reliable communication in such networks quintessentially depends on mechanisms to allow on-path devices, such as middleboxes, to verify the authenticity of network traffic and the identity of the communicating peers.Efficient standard authentication techniques for end-to-middle authentication typically assume the presence of shared keys within the network or rely on trusted third parties, such as on-line authentication servers. However, in cooperative scenarios, these approaches suffer from significant drawbacks in respect to functionality and efficiency. Moreover, the tight resource constraints of wireless routers and access points in cooperative scenarios make the use of more flexible but less efficient authentication techniques challenging. Hence, a careful selection of cryptographic components and the creation of new and flexible and efficient mechanisms is required to enable end-to-middle authentication in cooperative multi-hop networks.In this thesis, we address the problem of end-to-middle authentication on different levels of granularity, ranging from infrequent signaling events to rapid verification of high-bandwidth payload streams. The different security and performance requirements of signaling and payload traffic prevent the creation of a one-size-fits-all solution but requires the use of specialized approaches. We designed and analyzed three solutions that cover low-frequency signaling events as well as high-frequency payload protection.We first analyze and extend the Host Identity Protocol to enable secure publickey based end-to-middle authentication for signaling traffic. However, the use of CPU-intensive public-key verification prevents the use of this solution for verifying high-bandwidth payload streams. Consequently, our second solution focuses on more lightweight cryptographic components to provide end-to-middle authentication for payload. The Adaptive and Lightweight Protocol for Hop-By-hop Authentication, ALPHA, uses efficient hash functions and hash chains to enable rapid verification of the source and integrity of a payload packet. Finally, our third solution sacrifices end-to-middle integrity protection of the packet to further improve the verification performance. The family of Stream-based Per-packet One-time Token Schemes, SPOTS enables middleboxes to rapidly authenticate the source of a packet when the middlebox is agnostic to the contents of the forwarded packet. In combination, the three solution provide a flexible set of mechanisms that enables efficient end-tomiddle authentication for a wide range of scenarios within and beyond the setting of cooperative multi-hop networks. ISBN 9783844007107 Versand D: 2,30 EUR SPOTS, Authenticated End-to-Middle Signaling, Network Security, Lightweight End-to-middle Authentication, Middleboxes, HIP, Cooperative Networks, Authentication, [PU:Shaker,]

gebrauchtes bzw. antiquarisches Buch Buchfreund.de
Speyer & Peters GmbH, 67593 Westhofen
Versandkosten:Versandkosten innerhalb der BRD (EUR 2.30)
Details...
(*) Derzeit vergriffen bedeutet, dass dieser Titel momentan auf keiner der angeschlossenen Plattform verfügbar ist.
Direct End-to-Middle Authentication in Cooperative Networks - Tobias Martin Heer
Vergriffenes Buch, derzeit bei uns nicht verfügbar.
(*)
Tobias Martin Heer:
Direct End-to-Middle Authentication in Cooperative Networks - Taschenbuch

ISBN: 9783844007107

[ED: Taschenbuch], [PU: Shaker Verlag], Neuware - Cooperative networks rely on user cooperation at the network layer to provide services, such as packet forwarding or shared access to other network resources like storage or Internet access. Examples of cooperative networks that build upon user contribution are ad-hoc networks, decentralized wireless mesh networks, micro-operator networks, wireless Internet access sharing networks or hybrids between these network types. However, while it enables new types of networks and services, the concept of cooperative network service provisioning also creates new attack possibilities for malicious and selfish users. For example, wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception of, tampering with, and forging of packets. Thus, reliable communication in such networks quintessentially depends on mechanisms to allow on-path devices, such as middleboxes, to verify the authenticity of network traffic and the identity of the communicating peers. Efficient standard authentication techniques for end-to-middle authentication typically assume the presence of shared keys within the network or rely on trusted third parties, such as on-line authentication servers. However, in cooperative scenarios, these approaches suffer from significant drawbacks in respect to functionality and efficiency. Moreover, the tight resource constraints of wireless routers and access points in cooperative scenarios make the use of more flexible but less efficient authentication techniques challenging. Hence, a careful selection of cryptographic components and the creation of new and flexible and efficient mechanisms is required to enable end-to-middle authentication in cooperative multi-hop networks. In this thesis, we address the problem of end-to-middle authentication on different levels of granularity, ranging from infrequent signaling events to rapid verification of high-bandwidth payload streams. The different security and performance requirements of signaling and payload traffic prevent the creation of a one-size-fits-all solution but requires the use of specialized approaches. We designed and analyzed three solutions that cover low-frequency signaling events as well as high-frequency payload protection. We first analyze and extend the Host Identity Protocol to enable secure publickey based end-to-middle authentication for signaling traffic. However, the use of CPU-intensive public-key verification prevents the use of this solution for verifying high-bandwidth payload streams. Consequently, our second solution focuses on more lightweight cryptographic components to provide end-to-middle authentication for payload. The Adaptive and Lightweight Protocol for Hop-By-hop Authentication, ALPHA, uses efficient hash functions and hash chains to enable rapid verification of the source and integrity of a payload packet. Finally, our third solution sacrifices end-to-middle integrity protection of the packet to further improve the verification performance. The family of Stream-based Per-packet One-time Token Schemes, SPOTS enables middleboxes to rapidly authenticate the source of a packet when the middlebox is agnostic to the contents of the forwarded packet. In combination, the three solution provide a flexible set of mechanisms that enables efficient end-tomiddle authentication for a wide range of scenarios within and beyond the setting of cooperative multi-hop networks., [SC: 0.00], Neuware, gewerbliches Angebot, FixedPrice, [GW: 383g]

Neues Buch Booklooker.de
Buchhandlung Kühn GmbH
Versandkosten:Versandkostenfrei, Versand nach Deutschland (EUR 0.00)
Details...
(*) Derzeit vergriffen bedeutet, dass dieser Titel momentan auf keiner der angeschlossenen Plattform verfügbar ist.
Direct End-to-Middle Authentication in Cooperative Networks - Heer, Tobias Martin
Vergriffenes Buch, derzeit bei uns nicht verfügbar.
(*)
Heer, Tobias Martin:
Direct End-to-Middle Authentication in Cooperative Networks - Taschenbuch

24, ISBN: 3844007105

ID: 156916

1. Aufl. Paperback 258 S. Broschiert ISBN 9783844007107 Cooperative Networks; Middleboxes; Authentication; Network Security; Authenticated End-to-Middle Signaling; HIP; Lightweight End-to-middle Authentication; SPOTS; Hop (Vermittlungstechnik)[DNB]; Funknetz[DNB]; Authentifikation[DNB]; Signalisierung[DNB]; Datenstrom[DNB]; Public-Key-Kryptosystem[DNB]; HIP (Kommunikationsprotokoll)[DNB]; Kryptoanalyse[DNB], met couverture neu, [PU:Shaker,]

Neues Buch Achtung-Buecher.de
Speyer & Peters GmbH, 12165 Berlin
Versandkosten:Versendingskosten in Duitsland (EUR 2.30)
Details...
(*) Derzeit vergriffen bedeutet, dass dieser Titel momentan auf keiner der angeschlossenen Plattform verfügbar ist.
Direct End-to-Middle Authentication in Cooperative Networks - Heer, Tobias Martin
Vergriffenes Buch, derzeit bei uns nicht verfügbar.
(*)
Heer, Tobias Martin:
Direct End-to-Middle Authentication in Cooperative Networks - Taschenbuch

2012, ISBN: 9783844007107

[ED: Taschenbuch], [PU: Shaker], DE, [SC: 0.00], Neuware, gewerbliches Angebot, 258, [GW: 383g], 1., Aufl.

Neues Buch Booklooker.de
verschiedene Anbieter
Versandkosten:Versandkostenfrei, Versand nach Deutschland (EUR 0.00)
Details...
(*) Derzeit vergriffen bedeutet, dass dieser Titel momentan auf keiner der angeschlossenen Plattform verfügbar ist.