Staff View
Building information-theoretic confidentiality and traffic privacy into wireless networks

Descriptive

TypeOfResource
Text
TitleInfo (ID = T-1)
Title
Building information-theoretic confidentiality and traffic privacy into wireless networks
Identifier
ETD_2824
Identifier (type = hdl)
http://hdl.rutgers.edu/1782.1/rucore10001600001.ETD.000056577
Language
LanguageTerm (authority = ISO639-2); (type = code)
eng
Genre (authority = marcgt)
theses
Subject (ID = SBJ-1); (authority = RUETD)
Topic
Electrical and Computer Engineering
Subject (ID = SBJ-2); (authority = ETD-LCSH)
Topic
Wireless communication systems--Security measures
Abstract (type = abstract)
This dissertation studies how information-theoretically secure mechanisms for confidentiality and data-traffic privacy can be incorporated into existing and emerging wireless systems. The dissertation consists of three parts. In the first two parts, we study how certain properties of wireless channels can be employed to enhance confidentiality services that have traditionally been the responsibility of higher layers. We first explore the use of the wireless medium for the extraction of secret keys at the two ends of a wireless link, wherein the transceivers at either end are separated by a rich multipath scattering environment. We build a low complexity algorithm that allows two wireless devices to extract a common sequence of random secret bits, by repeatedly probing and estimating a time-varying channel between themselves. Further, we report on an implementation and evaluation of our algorithm on a modified 802.11a system. Next, we study the problem of securely pairing wireless devices in proximity of one another by establishing a shared secret key using a public source of RF transmissions. We employ measurement data to characterize the rate at which bits can be extracted and explore the simultaneous use of multiple transmitters to increase rate. Finally, we study the case when the public transmitter itself is under the arbitrary control of an adversary and we demonstrate a method that can allow successful key-extraction even with such an active adversary. In the final part of this dissertation, we introduce the problem of an unintended information-leakage channel in data traffic consisting of varying packet sizes. Packet sizes convey semantic information that can be related to their con- tent, which can be used as a fingerprint for classification. We formally study the packet-size side channel and explore obfuscation approaches to prevent infor- mation leakage, while considering padded dummy traffic and delay as bounded resources. We show that randomized algorithms for obfuscation can be studied as well known information-theoretic constructs, such as discrete channels with and without memory, and often lead to efficiently solvable constrained optimization problems.
PhysicalDescription
Form (authority = gmd)
electronic resource
Extent
xvi, 147 p. : ill.
InternetMediaType
application/pdf
InternetMediaType
text/xml
Note (type = degree)
Ph.D.
Note (type = bibliography)
Includes bibliographical references
Note (type = vita)
Includes vita
Note (type = statement of responsibility)
by Suhas Mathur
Name (ID = NAME-1); (type = personal)
NamePart (type = family)
Mathur
NamePart (type = given)
Suhas
NamePart (type = date)
1980-
Role
RoleTerm (authority = RULIB)
author
DisplayForm
Suhas Mathur
Name (ID = NAME-2); (type = personal)
NamePart (type = family)
Trappe
NamePart (type = given)
Wade
Role
RoleTerm (authority = RULIB)
chair
Affiliation
Advisory Committee
DisplayForm
Wade Trappe
Name (ID = NAME-3); (type = personal)
NamePart (type = family)
Mandayam
NamePart (type = given)
Narayan
Role
RoleTerm (authority = RULIB)
co-chair
Affiliation
Advisory Committee
DisplayForm
Narayan Mandayam
Name (ID = NAME-4); (type = personal)
NamePart (type = family)
Raychaudhuri
NamePart (type = given)
Dipankar
Role
RoleTerm (authority = RULIB)
internal member
Affiliation
Advisory Committee
DisplayForm
Dipankar Raychaudhuri
Name (ID = NAME-5); (type = personal)
NamePart (type = family)
Gruteser
NamePart (type = given)
Marco
Role
RoleTerm (authority = RULIB)
internal member
Affiliation
Advisory Committee
DisplayForm
Marco Gruteser
Name (ID = NAME-6); (type = personal)
NamePart (type = family)
Reznik
NamePart (type = given)
Alex
Role
RoleTerm (authority = RULIB)
outside member
Affiliation
Advisory Committee
DisplayForm
Alex Reznik
Name (ID = NAME-1); (type = corporate)
NamePart
Rutgers University
Role
RoleTerm (authority = RULIB)
degree grantor
Name (ID = NAME-2); (type = corporate)
NamePart
Graduate School - New Brunswick
Role
RoleTerm (authority = RULIB)
school
OriginInfo
DateCreated (qualifier = exact)
2010
DateOther (qualifier = exact); (type = degree)
2010-10
Place
PlaceTerm (type = code)
xx
RelatedItem (type = host)
TitleInfo
Title
Rutgers University Electronic Theses and Dissertations
Identifier (type = RULIB)
ETD
RelatedItem (type = host)
TitleInfo
Title
Graduate School - New Brunswick Electronic Theses and Dissertations
Identifier (type = local)
rucore19991600001
Location
PhysicalLocation (authority = marcorg); (displayLabel = Rutgers, The State University of New Jersey)
NjNbRU
Identifier (type = doi)
doi:10.7282/T3M61K05
Genre (authority = ExL-Esploro)
ETD doctoral
Back to the top

Rights

RightsDeclaration (AUTHORITY = GS); (ID = rulibRdec0006)
The author owns the copyright to this work.
Copyright
Status
Copyright protected
Availability
Status
Open
Reason
Permission or license
RightsHolder (ID = PRH-1); (type = personal)
Name
FamilyName
Mathur
GivenName
Suhas
Role
Copyright Holder
RightsEvent (ID = RE-1); (AUTHORITY = rulib)
Type
Permission or license
DateTime
2010-08-25 22:37:35
AssociatedEntity (ID = AE-1); (AUTHORITY = rulib)
Role
Copyright holder
Name
Suhas Mathur
Affiliation
Rutgers University. Graduate School - New Brunswick
AssociatedObject (ID = AO-1); (AUTHORITY = rulib)
Type
License
Name
Author Agreement License
Detail
I hereby grant to the Rutgers University Libraries and to my school the non-exclusive right to archive, reproduce and distribute my thesis or dissertation, in whole or in part, and/or my abstract, in whole or in part, in and from an electronic format, subject to the release date subsequently stipulated in this submittal form and approved by my school. I represent and stipulate that the thesis or dissertation and its abstract are my original work, that they do not infringe or violate any rights of others, and that I make these grants as the sole owner of the rights to my thesis or dissertation and its abstract. I represent that I have obtained written permissions, when necessary, from the owner(s) of each third party copyrighted matter to be included in my thesis or dissertation and will supply copies of such upon request by my school. I acknowledge that RU ETD and my school will not distribute my thesis or dissertation or its abstract if, in their reasonable judgment, they believe all such rights have not been secured. I acknowledge that I retain ownership rights to the copyright of my work. I also retain the right to use all or part of this thesis or dissertation in future works, such as articles or books.
Back to the top

Technical

ContentModel
ETD
MimeType (TYPE = file)
application/pdf
MimeType (TYPE = container)
application/x-tar
FileSize (UNIT = bytes)
3747840
Checksum (METHOD = SHA1)
0bfe5243c9b4fb96c432849cab1928d393ce901d
Back to the top
Version 8.5.5
Rutgers University Libraries - Copyright ©2024