MARC보기
LDR00000nam u2200205 4500
001000000432058
00520200224113102
008200131s2019 ||||||||||||||||| ||eng d
020 ▼a 9781085710749
035 ▼a (MiAaPQ)AAI13900992
040 ▼a MiAaPQ ▼c MiAaPQ ▼d 247004
0820 ▼a 620
1001 ▼a Karmoose, Mohammed.
24510 ▼a Application-Tailored Security: Lessons from Theory to Practice.
260 ▼a [S.l.]: ▼b University of California, Los Angeles., ▼c 2019.
260 1 ▼a Ann Arbor: ▼b ProQuest Dissertations & Theses, ▼c 2019.
300 ▼a 132 p.
500 ▼a Source: Dissertations Abstracts International, Volume: 81-03, Section: B.
500 ▼a Advisor: Fragouli, Christina .
5021 ▼a Thesis (Ph.D.)--University of California, Los Angeles, 2019.
506 ▼a This item must not be sold to any third party vendors.
520 ▼a With the increase of inter-connected devices, it is of paramount importance to ensure the security of the exchanged information. While cryptographic techniques provide tools to provide confidentiality and data integrity, such techniques may not provide the most efficient solutions. In addition, applications today have challenging performance requirements, with the emergence of time-critical applications such as vehicle networks, as well as resource-limited inter-connected devices such as the devices used in the Internet-of-Things. For such applications, novel security solutions that are application-tailored are needed to meet the performance requirements while adhering to the constraints imposed by the available resources. In this thesis, we adopt this methodology for security design: by understanding the nature of the application, the possible adversaries that may target the communication system, as well as the performance requirements, we design suitable and efficient security solutions. We show this methodology in the context of three different scenarios. The first scenario is data broadcasting in the context of the index coding problem. We study the problem of providing privacy guarantees against curious clients who are interested in knowing the requests and side information sets of other clients. We first design index codes with higher privacy levels than conventional index codes. We also provide a mechanism, which we call k-limited-access schemes, which transforms any index coding technique into another code with higher privacy guarantees. The second scenario is in the context of communication systems which relies on millimeter waves. We tackle the problem of secret key establishment. We propose a secret key establishment protocol which allows two communicating parties to establish shared secret keys at very high rates. We showcase the performance of our proposed technique in two different applications: in millimeter wave wireless systems such as 5G networks and IEEE 802.11ay, and vehicle platooning. The last scenario is in the context of Cyber-Physical Systems. We first argue that, in many situations, an adversary is interested in learning the state vector of the control system. In such cases, a more suitable security metric would be a distortion-based one which leads the adversary to make state estimates that are far from the actual value. We then propose security schemes that require a very small number of secret key bits and still perform well according to the proposed metric: we show that our proposed schemes are in fact optimal for many cases.
590 ▼a School code: 0031.
650 4 ▼a Electrical engineering.
650 4 ▼a Information technology.
690 ▼a 0544
690 ▼a 0489
71020 ▼a University of California, Los Angeles. ▼b Electrical and Computer Engineering 0333.
7730 ▼t Dissertations Abstracts International ▼g 81-03B.
773 ▼t Dissertation Abstract International
790 ▼a 0031
791 ▼a Ph.D.
792 ▼a 2019
793 ▼a English
85640 ▼u http://www.riss.kr/pdu/ddodLink.do?id=T15492262 ▼n KERIS ▼z 이 자료의 원문은 한국교육학술정보원에서 제공합니다.
980 ▼a 202002 ▼f 2020
990 ▼a ***1008102
991 ▼a E-BOOK