Group Testing Theory in Network Security An Advanced Solution
Group Testing Theory in Network Security explores a new branch of group testing theory with an application which enhances research results in network security. This brief presents new solutions on several advanced network security problems and mathematica
- PDF / 2,158,492 Bytes
- 93 Pages / 439.37 x 666.142 pts Page_size
- 16 Downloads / 197 Views
For further volumes: http://www.springer.com/series/8918
My T. Thai
Group Testing Theory in Network Security An Advanced Solution
123
My T. Thai Department of Computer and Information Science and Engineering University of Florida Gainesville, FL 32611 USA e-mail: [email protected]
ISSN 2190-8354 ISBN 978-1-4614-0127-8 DOI 10.1007/978-1-4614-0128-5
e-ISSN 2191-575X e-ISBN 978-1-4614-0128-5
Springer New York Dordrecht Heidelberg London Library of Congress Control Number: 2011938392 Mathematics Subject Classification (2010):90C31, 68U07, 62P30 Ó My T. Thai 2012 All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, LLC, 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)
To my parents!
Preface
The idea of group testing is to discover defective items in a large population with the minimum number of tests, where each test, is applied to a subset of items, instead of testing them one by one. Although this powerful theory has been applied to many fields such as medical testing, codes, and multi-access channel communication, its newly emerging application into network security has been only recently discovered. Similar to all the earlier applications of group testing, this new application requires modifications or renovations of the classical group testing models and algorithms, so as to overcome the obstacles of applying the theoretical models to practical scenarios in network security. For example, under which conditions can group testing be constructed and tested on wireless sensor networks? This monograph presents several new challenges and provides new group testing-based solutions for advanced network security problems. In particular, Chap. 2 presents a solution for Denial-of-Service attacks on the Internet in which a size constraint group testing is required. That is, there is a limit on the number of items in each subset and on the number of total subsets. Chapter 3 provides a solution for reactive jamming attacks in wireless sensor networks. Since the group testing is performed on wireless sensor networks, a careful design of an interference-free group testing, where each test result does not intefere with each other, is required. A more advanced solution for more sophisticated reactive jamming attacks is discussed in Chap. 4. Specifically, Chap. 4 provides a randomized faulttolerant group testing
Data Loading...