首页--工业技术论文--自动化技术、计算机技术论文--自动化基础理论论文--人工智能理论论文

Defending Against the Sybil Attack in Wireless Sensor Networks Using Digital Watermarking Techniques

Declaration第4页
Copyright Waiver第4-5页
Table of Contents第5-7页
Acknowledgement第7-8页
List of Figures第8-9页
List of Abbreviations第9-10页
Abstract第10页
Chapter 1: Introduction第11-19页
    1.1 Goals of this thesis第13页
    1.2 Sybil Attack Scenarios第13-14页
    1.3 Wireless network topology第14-17页
    1.4 Contribution第17页
    1.5 Organization of the Thesis第17-19页
Chapter 2: Wireless Networking第19-43页
    2.0 Overview第19-21页
    2.1 Basic Components of a wireless network第21-23页
    2.2 Types of AP第23-25页
        2.2.1 Dedicated Hardware APs第23-24页
        2.2.2 Software APs第24-25页
    2.3 Advantages of Wireless Networks第25-26页
    2.4 Structure of 802.11 MAC第26-27页
    2.5 The Sybil Attack第27-41页
        2.5.1 Background第28页
        2.5.2 Motivation第28-30页
        2.5.3 Lemmas第30-35页
        2.5.4 Conclusion第35-36页
        2.5.2 Random Key Pre-distribution第36-41页
    2.6 Summary第41-43页
        2.6.1 BSS and IBSS第41-42页
        2.6.2 Key Pool Scheme第42-43页
Chapter 3: Spread Spectrum Technology第43-55页
    3.1 Definition of Spread Spectrum (SS)第43页
    3.2 Spread Spectrum Functionality第43-45页
    3.3 Direct or Hopping第45-46页
    3.4 The Hopping Approach第46-48页
    3.5 Modulation and Demodulation第48-49页
    3.6 Coding Techniques第49-55页
        3.6.1 Jamming第51-52页
        3.6.1 Advantages of Spread Spectrum第52-54页
        3.6.2 Disadvantages of Spread Spectrum第54-55页
Chapter 4: Digital Watermarking for Sybil attack第55-67页
    4.0 Introduction第55页
    4.1 Elements of a watermarking system第55-63页
        4.1.1 Information coding第57-58页
        4.1.2 Embedding第58-60页
        4.2.1 Capacity of watermarking techniques第60-61页
        4.2.2 Robustness第61-63页
    4.3 Robust digital watermarking scheme for Sybil attack第63-67页
Chapter 5: Conclusion:第67-69页
Bibliography第69-73页
APPENDIX第73页
    Published Papers第73页
        Accepted Paper第73页
        Submitted Paper第73页

论文共73页,点击 下载论文
上一篇:受贿罪若干问题研究
下一篇:A Systemic Functional Approach to the Initiating Moves of the Hosts in Chinese Talk Shows