Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/38179
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor逄愛君(Ai-Chun Pang)
dc.contributor.authorSheng-Kun Chanen
dc.contributor.author詹勝zh_TW
dc.date.accessioned2021-06-13T16:27:31Z-
dc.date.available2005-07-20
dc.date.copyright2005-07-20
dc.date.issued2005
dc.date.submitted2005-07-14
dc.identifier.citationBibliography
[1] G. Apostolopoulos, V. Peris, P. Pradhan, and D. Saha. Securing Electronic Commerce: Reducing the SSL Overhead. In IEEE Network, 2000.
[2] S. Bohacek, J. P. Hespanha, K. Obraczka, J. Lee, and C. Lim. Enhancing Security via Stochastic Routing. In International Conference on Computer Communications
and Networks (ICCCN), 2002.
[3] D. Collins. Carrier Grade Voice Over IP. McGraw-Hill, 2003.
[4] T. H. Cormen, C. E. Leiserson, and R. L. Rivest. Introduction to Algorithms. MIT Press, 1990.
[5] J. Daemen and V. Rijmen. The design of Rijndael: AES | the Advanced Encryption Standard. Springer-Verlag, 2002.
[6] S. Frankel, R. Glenn, and S. Kelly. The AES-CBC Cipher Algorithm and Its Use with IPSec, Request for comments (RFC 3602). September 2003.
[7] FreeS/WAN. http://www.freeswan.org.
[8] I. Gojmerac, T. Ziegler, F. Ricciato, and P. Reichl. Adaptive Multipath Routing for Dynamic Tra±c Engineering. In IEEE Global Telecommunications Conference, 2003.
[9] D. Harkins and D. Carrel. Internet Key Exahange (IKE), Request for comments (RFC 2409). November 1998.
[10] C. Hopps. Analysis of an Equal-Cost Multi-Path Algorithm, Request for comments (RFC 2992). November 2000.
[11] C. Kaufman, R. Perlman, and M. Speciner. Network Security - PRIVATE Communication in a PUBLIC World, 2nd Edition. Prentice Hall PTR, 2002.
[12] J. F. Kurose and K. W. Ross. Computer Networking - A Top-Down Approach Featuring the Internet. Addison Wesley, 2003.
[13] S.-H. Liu, Y.-F. Lu, C.-F. Kuo, A.-C. Pang, and T.-W. Kuo. The Performance Evaluation of a Dynamic Con‾guration Method over IPSEC. In IEEE Real-Time
Systems Symposium: Works in Progress Session, 2003.
[14] W. Lou and Y. Fang. A Multipath Routing Approach for Secure Data Delivery. In IEEE Military Communications Conference (MilCom'2001), 2001.
[15] W. Lou, W. Liu, and Y. Fang. SPREAD: Improving network security by multipath routing. In IEEE Military Communications Conference (MilCom'2003), 2003.
[16] G. Malkin. Routing Information Protocol (RIP) Version 2 Carrying Additional Information, Request for comments (RFC 1723). November 1994.
[17] October 2004 Map poster of the GEANT topology.
http://www.geant.net/upload/pdf/topology oct 2004.pdf.
[18] D. L. Mills. DCN Local-Network Protocols, Request for comments (RFC 891). December 1983.
[19] J. Moy. Open Shortest Path First (OSPF) Version 2, Request for comments (RFC 1247). July 1991.
[20] C. Perkins and P. Bhagwat. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In ACM SIGCOMM'94 Conference on Com-
munications Architectures, Protocols and Applications, pages 234-244, 1994.
[21] Secure Sockets Layer (SSL). http://www.openssl.org/.
[22] Cisco Systems. White Paper: EIGRP. September 2002.
[23] R. Thayer, N. Doraswamy, and R. Glenn. IP Security Document Roadmap, Request for comments (RFC 2411). November 1998.
[24] The Network Simulator-ns2. http://www.isi.edu/nsnam/ns/.
[25] J. Yang and S. Papavassiliou. Improving Network Security by Multipath Traffic Dispersion. In IEEE Military Communications Conference (MilCom'2001), 2001.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/38179-
dc.description.abstract資訊安全已經成為在無線網路及有線網路上傳輸資料的重要議題。過去的研究主要是在加解密演算法的設計以及系統架構上的整合。我們則是針對利用網路上的路由機制,來達到增加資訊安全性的目的。我們提出了一個動態路由機制,能夠隨機的挑選傳送封包的路徑、減少路徑相似度(連續兩個封包傳送路徑的相同連結數)。所提出的機制容易實作,而且可以與目前現存的網路路由機制相容,像是有線網路上的Routing Information Protocol (RIP) 或是無線網路上的 Destination-Sequenced Distance Vector (DSDV) 路由機制,且沒有增加控制封包的數量。我們也在數學分析上做了相關的研究,並使用了相關的實驗方法來驗證所提出的機制。zh_TW
dc.description.abstractSecurity has become one of the major issues for data communication
over wired and wireless networks. In the past decades, various
security-enhanced measures have been proposed to improve the
security of data transmission over public networks. Existing work
on security-enhanced data transmission includes the designs of
cryptography algorithms and system infrastructures and
security-enhanced routing methods. The common objectives of the
aforementioned methods are often to defeat various threats over
the network, including eavesdropping, spoofing, session hijacking,
etc.
Different from the past work on the designs of cryptography
algorithms and system infrastructures, we aim at the proposing of
a dynamic routing algorithm that could randomize delivery paths
for data transmission. Based on distance-vector exchanges, the
algorithm can be easily implemented over the existing popular
routing protocol, such as Routing Information Protocol (RIP) in
wired networks and Destination-Sequenced Distance Vector (DSDV)
Protocol in wireless networks, without introducing extra control
messages.
A proper integration of dynamic routing and cryptography-based
system designs would further and significantly enhance the
security of data transmission over the networks. For example, the
security level could be increased when the feedback cipher mode of
block ciphering algorithms (e.g., DES and AES), such as Cipher
Block Chaining (CBC) and Cipher Feedback (CFB), is adopted.
Furthermore, if a key-exchange mechanism (e.g., the Internet Key
Exchange (IKE)) is used during data transmission, less packets
encrypted by some specific key can be obtained by attackers, which
makes it more difficult to derive the original plain text.
An analytic study on the proposed algorithm is presented, and a
series of performance evaluation is conducted to verify the
analytic results and the capability of the proposed algorithm.
Analytic and experimental results show that our proposed algorithm
introduces a considerably small emph{path similarity} (i.e., the
number of common links between two paths) of two consecutive
packets transmitted and greatly outperforms the standard
shortest-path and equal-cost routing algorithms.
en
dc.description.provenanceMade available in DSpace on 2021-06-13T16:27:31Z (GMT). No. of bitstreams: 1
ntu-94-R92922002-1.pdf: 361053 bytes, checksum: 1d75360642c139e7dede34ee1a394332 (MD5)
Previous issue date: 2005
en
dc.description.tableofcontentsContents
List of Tables I
List of Figures II
1 Introduction 1
2 Problem Statement 5
3 Security-Enhanced Dynamic Routing 8
3.1 Notations and Data Structures 8
3.2 A Distributed Dynamic Routing Algorithm 10
3.3 An Analytic Study 17
3.4 Implementation Remarks 20
4 Performance Evaluation 21
4.1 Effect of l on E[SimPSl] 23
4.2 Effect of l on Single-Trip Time and Jitter 26
5 Conclusion and Future Work 29
5.1 Conclusion 29
5.2 Future Work 30
Bibliography 31
dc.language.isoen
dc.subject路由機制zh_TW
dc.subject網路安全zh_TW
dc.subjectsecurityen
dc.subjectroutingen
dc.title具有安全性考量的動態路由機制zh_TW
dc.titleDynamic Routing with Security Considerationsen
dc.typeThesis
dc.date.schoolyear93-2
dc.description.degree碩士
dc.contributor.oralexamcommittee郭大維(Tei-Wei Kuo),施吉昇(Chi-Sheng Shih)
dc.subject.keyword路由機制,網路安全,zh_TW
dc.subject.keywordrouting,security,en
dc.relation.page33
dc.rights.note有償授權
dc.date.accepted2005-07-14
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept資訊工程學研究所zh_TW
顯示於系所單位:資訊工程學系

文件中的檔案:
檔案 大小格式 
ntu-94-1.pdf
  未授權公開取用
352.59 kBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved