Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/27870
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor逄愛君(Ai-Chun Pang)
dc.contributor.authorCheng-Fu Liaoen
dc.contributor.author廖承賦zh_TW
dc.date.accessioned2021-06-12T18:25:06Z-
dc.date.available2007-10-19
dc.date.copyright2007-08-28
dc.date.issued2007
dc.date.submitted2007-08-13
dc.identifier.citation[1] M. Guerrero Zapata and N. Asokan, 'Securing Ad hoc Routing Protocols,' in Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe 2002), September
2002, pp. 1-10.
[2] M. Guerrero Zapata, 'Secure ad hoc on-demand distance vector (saodv) routing,'Sept. 2006, iNTERNET-DRAFT draft-guerrero-manet-saodv-06.txt.
[3] L. Zhou and Z. J. Haas, 'Securing ad hoc networks,' IEEE Network, vol. 13, no. 6, pp. 24-30, 1999. [Online]. Available: citeseer.ist.psu.edu/zhou99securing.html
[4] S. Yi and R. Kravets, 'Key management for heterogeneous ad hoc wireless networks,' in ICNP '02: Proceedings of the 10th IEEE International Conference on
Network Protocols. Washington, DC, USA: IEEE Computer Society, 2002, pp.
202-205.
[5] N. Aboudagga, M. T. Refaei, M. Eltoweissy, L. A. DaSilva, and J.-J. Quisquater,'Authentication protocols for ad hoc networks: Taxonomy and research issues,'
in Proceedings of the 1st ACM international workshop on Quality of service and security in wireless and mobile networks, 2005.
[6] Y.-C. Hu and A. Perrig, 'A survey of secure wireless ad hoc routing,' vol. 2, no. 3, pp. 28-39, May/June 2004. [Online]. Available:
http://csdl.computer.org/dl/mags/sp/2004/03/j3028.pdf
[7] W. Wang and B. Bhargava, 'On vulnerability and protection of ad hoc on-demand distance vector prototol,' 2003. [Online]. Available: cite-seer.ist.psu.edu/wang03vulnerability.html
[8] S. Yi, P. Naldurg, and R. Kravets, 'Security-aware ad hoc routing for wireless networks,' in Proceedings of the ACM Symposium on Mobile Ad Hoc Networking
and Computing (MobiHOC 2001), Long Beach, CA, Oct. 2001. [Online]. Available:
citeseer.ist.psu.edu/yi01securityaware.html
[9] Y. Hu, A. Perrig, and D. Johnson, 'Ariadne: A secure on-demand routing protocol for ad hoc networks,' 2002. [Online]. Available: cite-
seer.ist.psu.edu/hu02ariadne.html
[10] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, 'A secure routing protocol for ad hoc networks,' in ICNP '02: Proceedings of the 10th IEEE
International Conference on Network Protocols. Washington, DC, USA: IEEE Computer Society, 2002, pp. 78-89.
[11] W. Diffie and M. E. Hellman, 'Exhaustive cryptanalysis of the NBS Data Encryption Standard,' vol. 10, no. 6, pp. 74-84, June 1977.
[12] K. P. A. Mishra, A. Nadkarni and V. Tech, 'Intrusion detection in wireless ad hoc networks,' IEEE Wireless Communications, vol. 11, pp. 48-60, 2004.
[13] A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, 'Secure routing and intrusion detection in ad hoc networks,' percom, vol. 00, pp. 191-199, 2005.
[14] C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, 'A quantitative trust establishment framework for reliable data packet delivery in manets,' in SASN '05:
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM Press, 2005, pp. 1-10.
[15] S. Mccanne, S. Floyd, and K. Fall, 'ns2 (network simulator 2)', http://www.isi.edu/nsnam/ns.
[16] J.-H. Chang and L. Tassiulas, 'Maximum lifetime routing in wireless sensor networks,' IEEE/ACM Trans. Netw., vol. 12, no. 4, pp. 609-619, 2004.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/27870-
dc.description.abstract近來無線隨意網路中群體通訊是越來越明顯趨勢,這些在網路中群體之間會透過彼此路由相互溝通,然而當網路中群體數目越來越多的時候,在進行資料傳遞之前的認證佔整個傳輸過程一個很大的部份,而且群體的分布也會影響到傳輸的效率。我們建構了一種安全轉運路由機制來取代傳統的認證方式,這機制分成兩個階段,分別是建立安全通訊管道以及監督整個網路運作,來保證整個資料傳遞的安全性,同時省去認證以及只透過同群體之間路由的限制。從實驗的結果來看,我們這種方法在資料傳遞有較小的延遲、在能量上消耗的較少,能夠提升整個無線隨意網路的運作效率。zh_TW
dc.description.abstractSecure group-aware communications only transmit data among group members. However, group members might separate into several sub-groups due to the natural of location. It is necessary to allow relay by a un-trust friends. In this thesis, we proposed a secure relay scheme called AFRS. It integrates two phase schemes: one for end-to-end secure channel establishment and the other for relay behavior monitoring. The transmitted data would be protected under the end-to-end secure channel. Attacks of routing are monitored and provide a countermeasure in the monitoring phase. As the experimental results, AFRS provides an efficient way to relay data securely.en
dc.description.provenanceMade available in DSpace on 2021-06-12T18:25:06Z (GMT). No. of bitstreams: 1
ntu-96-R94922068-1.pdf: 1952732 bytes, checksum: b6ed8f2d97eda8ef6cf28ec1ed56ed78 (MD5)
Previous issue date: 2007
en
dc.description.tableofcontents1 Introduction 1
2 Background 5
2.1 Security Threats in Wireless Ad Hoc Network 5
2.2 Secure Ad Hoc On-Demand Vector Protocol 6
2.3 Diffie-Hellman Key Exchange 10
3 Authentication-Free Relay Scheme 11
3.1 Basic Assumption 11
3.2 The Proposed Authentication-Free Relay Scheme 12
3.2.1 Overview 12
3.2.2 Secure Channel Establishment 13
3.2.3 Monitor 15
4 Security and Performance Analysis 20
4.1 Security Analysis 20
4.2 Performance Analysis 23
4.2.1 Metrics 23
4.2.2 Simulation Result 25
5 Conclusion 31
Bibliography 32
dc.language.isoen
dc.subject資訊安全zh_TW
dc.subject群體通訊zh_TW
dc.subject轉運zh_TW
dc.subject認證zh_TW
dc.subject效能zh_TW
dc.subject無線隨意網路zh_TW
dc.title高安全效率無線隨意網路之轉運方法zh_TW
dc.titleAn Efficient Secure Routing Protocol for Wireless Ad Hoc
Networks
en
dc.typeThesis
dc.date.schoolyear95-2
dc.description.degree碩士
dc.contributor.oralexamcommittee郭大維(Tei-Wei Kuo),陳仁暉(Jen-Hui Chen)
dc.subject.keyword群體通訊,轉運,認證,效能,無線隨意網路,資訊安全,zh_TW
dc.subject.keywordGroup communication,Relay,Authentication,Efficiency,Wireless,en
dc.relation.page34
dc.rights.note有償授權
dc.date.accepted2007-08-13
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept資訊工程學研究所zh_TW
顯示於系所單位:資訊工程學系

文件中的檔案:
檔案 大小格式 
ntu-96-1.pdf
  未授權公開取用
1.91 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved