請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/27870完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 逄愛君(Ai-Chun Pang) | |
| dc.contributor.author | Cheng-Fu Liao | en |
| dc.contributor.author | 廖承賦 | zh_TW |
| dc.date.accessioned | 2021-06-12T18:25:06Z | - |
| dc.date.available | 2007-10-19 | |
| dc.date.copyright | 2007-08-28 | |
| dc.date.issued | 2007 | |
| dc.date.submitted | 2007-08-13 | |
| dc.identifier.citation | [1] M. Guerrero Zapata and N. Asokan, 'Securing Ad hoc Routing Protocols,' in Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe 2002), September
2002, pp. 1-10. [2] M. Guerrero Zapata, 'Secure ad hoc on-demand distance vector (saodv) routing,'Sept. 2006, iNTERNET-DRAFT draft-guerrero-manet-saodv-06.txt. [3] L. Zhou and Z. J. Haas, 'Securing ad hoc networks,' IEEE Network, vol. 13, no. 6, pp. 24-30, 1999. [Online]. Available: citeseer.ist.psu.edu/zhou99securing.html [4] S. Yi and R. Kravets, 'Key management for heterogeneous ad hoc wireless networks,' in ICNP '02: Proceedings of the 10th IEEE International Conference on Network Protocols. Washington, DC, USA: IEEE Computer Society, 2002, pp. 202-205. [5] N. Aboudagga, M. T. Refaei, M. Eltoweissy, L. A. DaSilva, and J.-J. Quisquater,'Authentication protocols for ad hoc networks: Taxonomy and research issues,' in Proceedings of the 1st ACM international workshop on Quality of service and security in wireless and mobile networks, 2005. [6] Y.-C. Hu and A. Perrig, 'A survey of secure wireless ad hoc routing,' vol. 2, no. 3, pp. 28-39, May/June 2004. [Online]. Available: http://csdl.computer.org/dl/mags/sp/2004/03/j3028.pdf [7] W. Wang and B. Bhargava, 'On vulnerability and protection of ad hoc on-demand distance vector prototol,' 2003. [Online]. Available: cite-seer.ist.psu.edu/wang03vulnerability.html [8] S. Yi, P. Naldurg, and R. Kravets, 'Security-aware ad hoc routing for wireless networks,' in Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2001), Long Beach, CA, Oct. 2001. [Online]. Available: citeseer.ist.psu.edu/yi01securityaware.html [9] Y. Hu, A. Perrig, and D. Johnson, 'Ariadne: A secure on-demand routing protocol for ad hoc networks,' 2002. [Online]. Available: cite- seer.ist.psu.edu/hu02ariadne.html [10] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, 'A secure routing protocol for ad hoc networks,' in ICNP '02: Proceedings of the 10th IEEE International Conference on Network Protocols. Washington, DC, USA: IEEE Computer Society, 2002, pp. 78-89. [11] W. Diffie and M. E. Hellman, 'Exhaustive cryptanalysis of the NBS Data Encryption Standard,' vol. 10, no. 6, pp. 74-84, June 1977. [12] K. P. A. Mishra, A. Nadkarni and V. Tech, 'Intrusion detection in wireless ad hoc networks,' IEEE Wireless Communications, vol. 11, pp. 48-60, 2004. [13] A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, 'Secure routing and intrusion detection in ad hoc networks,' percom, vol. 00, pp. 191-199, 2005. [14] C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, 'A quantitative trust establishment framework for reliable data packet delivery in manets,' in SASN '05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM Press, 2005, pp. 1-10. [15] S. Mccanne, S. Floyd, and K. Fall, 'ns2 (network simulator 2)', http://www.isi.edu/nsnam/ns. [16] J.-H. Chang and L. Tassiulas, 'Maximum lifetime routing in wireless sensor networks,' IEEE/ACM Trans. Netw., vol. 12, no. 4, pp. 609-619, 2004. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/27870 | - |
| dc.description.abstract | 近來無線隨意網路中群體通訊是越來越明顯趨勢,這些在網路中群體之間會透過彼此路由相互溝通,然而當網路中群體數目越來越多的時候,在進行資料傳遞之前的認證佔整個傳輸過程一個很大的部份,而且群體的分布也會影響到傳輸的效率。我們建構了一種安全轉運路由機制來取代傳統的認證方式,這機制分成兩個階段,分別是建立安全通訊管道以及監督整個網路運作,來保證整個資料傳遞的安全性,同時省去認證以及只透過同群體之間路由的限制。從實驗的結果來看,我們這種方法在資料傳遞有較小的延遲、在能量上消耗的較少,能夠提升整個無線隨意網路的運作效率。 | zh_TW |
| dc.description.abstract | Secure group-aware communications only transmit data among group members. However, group members might separate into several sub-groups due to the natural of location. It is necessary to allow relay by a un-trust friends. In this thesis, we proposed a secure relay scheme called AFRS. It integrates two phase schemes: one for end-to-end secure channel establishment and the other for relay behavior monitoring. The transmitted data would be protected under the end-to-end secure channel. Attacks of routing are monitored and provide a countermeasure in the monitoring phase. As the experimental results, AFRS provides an efficient way to relay data securely. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-12T18:25:06Z (GMT). No. of bitstreams: 1 ntu-96-R94922068-1.pdf: 1952732 bytes, checksum: b6ed8f2d97eda8ef6cf28ec1ed56ed78 (MD5) Previous issue date: 2007 | en |
| dc.description.tableofcontents | 1 Introduction 1
2 Background 5 2.1 Security Threats in Wireless Ad Hoc Network 5 2.2 Secure Ad Hoc On-Demand Vector Protocol 6 2.3 Diffie-Hellman Key Exchange 10 3 Authentication-Free Relay Scheme 11 3.1 Basic Assumption 11 3.2 The Proposed Authentication-Free Relay Scheme 12 3.2.1 Overview 12 3.2.2 Secure Channel Establishment 13 3.2.3 Monitor 15 4 Security and Performance Analysis 20 4.1 Security Analysis 20 4.2 Performance Analysis 23 4.2.1 Metrics 23 4.2.2 Simulation Result 25 5 Conclusion 31 Bibliography 32 | |
| dc.language.iso | en | |
| dc.subject | 資訊安全 | zh_TW |
| dc.subject | 群體通訊 | zh_TW |
| dc.subject | 轉運 | zh_TW |
| dc.subject | 認證 | zh_TW |
| dc.subject | 效能 | zh_TW |
| dc.subject | 無線隨意網路 | zh_TW |
| dc.title | 高安全效率無線隨意網路之轉運方法 | zh_TW |
| dc.title | An Efficient Secure Routing Protocol for Wireless Ad Hoc
Networks | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 95-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 郭大維(Tei-Wei Kuo),陳仁暉(Jen-Hui Chen) | |
| dc.subject.keyword | 群體通訊,轉運,認證,效能,無線隨意網路,資訊安全, | zh_TW |
| dc.subject.keyword | Group communication,Relay,Authentication,Efficiency,Wireless, | en |
| dc.relation.page | 34 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2007-08-13 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
| 顯示於系所單位: | 資訊工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-96-1.pdf 未授權公開取用 | 1.91 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
