Title of Dissertation : Multi - User Security : A Signal Processing and Networking Perspective
نویسندگان
چکیده
Title of Dissertation: Multi-User Security: A Signal Processing and Networking Perspective Wade Trappe, Doctor of Philosophy, 2002 Dissertation directed by: Professor K. J. Ray Liu Applied Mathematics and Scientific Computing Department of Electrical and Computer Engineering Institute for Systems Research The advancements in communication and multimedia technologies have paved the way for a new suite of multi-user applications that will allow users to interact. Although the new communication infrastructure makes it easier to reach the end user, it also makes it easier for adversaries to mount attacks against security measures intended to protect data. Thus, there must be mechanisms in place that guarantee the confidentiality and rights of both the customer and the service provider during the delivery of content across future communication networks. This thesis examines security issues related to communications involving more than two participants or adversaries. We approach the problem of multi-user security by developing security measures at different stages of the content distribution process, ranging from the establishment of initial keying information before transmission, to key management while delivering through networks, and finally to content protection and collusion prevention/tracing after delivery. We address the issue of establishing a group key prior to content delivery by introducing the butterfly scheme and a conference keying scheme that addresses user heterogeneity. These schemes employ the two-party Diffie-Hellman scheme in conjunction with an underlying algorithmic tree called the conference tree. In order to address client heterogeneity, we design the conference tree using source coding techniques to account for the different user cost and budget profiles. We also introduce the PESKY performance measure, which quantifies the likelihood that a conference key can be established in a heterogeneous environment. We then consider the problem of managing keys during content delivery by proposing a multicast key management system that uses a composite message format with member join and departure operations. Compared with the traditional format of the rekeying messages used in tree-based multicast key management, our composite message format reduces the amount of header information, while maintaining the same payload size. Finally, we address the issue of protecting the digital rights of multimedia content after it has left the protected or encrypted domain. Since traditional multimedia fingerprints are susceptible to collusion attacks made by a coalition of adversaries, we develop fingerprints for multimedia that are based upon code modulation and able to identify groups of colluders. Multi-User Security: A Signal Processing and Networking Perspective
منابع مشابه
Securing Multi-Layer Communications: A Signal Processing Approach
Title of Dissertation: SECURING MULTI-LAYER COMMUNICATIONS: A SIGNAL PROCESSING APPROACH Yinian Mao, Doctor of Philosophy, 2006 Dissertation directed by: Professor Min Wu Department of Electrical and Computer Engineering Security is becoming a major concern in this information era. The development in wireless communications, networking technology, personal computing devices, and software engine...
متن کاملA Novel Multi-user Detection Approach on Fluctuations of Autocorrelation Estimators in Non-Cooperative Communication
Recently, blind multi-user detection has become an important topic in code division multiple access (CDMA) systems. Direct-Sequence Spread Spectrum (DSSS) signals are well-known due to their low probability of detection, and secure communication. In this article, the problem of blind multi-user detection is studied in variable processing gain direct-sequence code division multiple access (VPG D...
متن کاملDamage detection and structural health monitoring of ST-37 plate using smart materials and signal processing by artificial neural networks
Structural health monitoring (SHM) systems operate online and test different materials using ultrasonic guided waves and piezoelectric smart materials. These systems are permanently installed on the structures and display information on the monitor screen. The user informs the engineers of the existing damage after observing signal loss which appears after damage is caused. In this paper health...
متن کاملTitle of Dissertation : MULTI - USER SECURITY FOR MULTICAST COMMUNICATIONS
Title of Dissertation: MULTI-USER SECURITY FOR MULTICAST COMMUNICATIONS Yan Sun, Doctor of Philosophy, 2004 Dissertation directed by: Professor K. J. Ray Liu Department of Electrical and Computer Engineering The ubiquity of communication networks is facilitating the development of wireless and Internet applications aimed at allowing users to communicate and collaborate amongst themselves. In th...
متن کاملEfficiency of Target Location Scenarios in the Multi-Transmitter Multi-Receiver Passive Radar
Multi-transmitter multi-receiver passive radar, which locates target in the surveillance area by the reflected signals of the available opportunistic transmitter from the target, is of interest in many applications. In this paper, we investigate different signal processing scenarios in multi-transmitter multi-receiver passive radar. These scenarios include decentralized processing of reference ...
متن کامل