請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/38586
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 賴飛羆(Feipei Lai) | |
dc.contributor.author | Lin-Jiun Tsai | en |
dc.contributor.author | 蔡林峻 | zh_TW |
dc.date.accessioned | 2021-06-13T16:38:17Z | - |
dc.date.available | 2005-07-13 | |
dc.date.copyright | 2005-07-13 | |
dc.date.issued | 2005 | |
dc.date.submitted | 2005-07-05 | |
dc.identifier.citation | [1] William Stallings, “Cryptography and Network Security: Principles and Practice, 3/E”, Prentice Hall, 2003.
[2] P. Michiardi and R. Molva, 'Ad hoc network security,' ST Journal of System Research, Volume 4, N1, March 2003. [3] András Varga, 'The OMNeT++ Discrete Event Simulation System', In the Proceedings of the European Simulation Multiconference (ESM'2001), Prague, Czech Republic, June 6-9, 2001. [4] Nicola Concer, http://www.cs.unibo.it/~concer/adHocSim.pdf [5] D. Amis, R. Prakash, D. Huynh, and T. Vuong, 'Max-min D-cluster formation in wireless ad hoc networks,' in IEEE INFOCOM, 2000, pp. 32--41. [6] H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, “Self-securing ad hoc wireless networks,” in Proc. 7th IEEE Symp. on Comp. and Communications (ISCC), Taormina, 2002. [7] M. Bechler, H.-J. Hof, D. Kraft, F. Pählke, and L. Wolf, “A Cluster-Based Security Architecture for Ad Hoc Networks,” IEEE Infocom 2004. [8] Suvo Mittra, “Iolus: A Framework for Scalable Secure Multicasting”, ACM SIGCOMM, 1997. [9] S. Capkun, L. Buttyan, and J-P Hubaux, “Self-Organized Public-Key Management for Mobile Ad Hoc Networks”, in ACM International Workshop on Wireless Security, WiSe 2002. [10] Y. C. Tseng , S. Y. Ni , Y. S. Chen and J. P. Sheu, 'The broadcast storm problem in a mobile ad hoc network', Wireless Networks, Volume 8, Issue 2/3, March 2002. [11] J.Wu and F.Dai, “A generic distributed broadcast scheme in ad hoc wireless networks”, IEEE Trans. on Computers, Sept. 2004. [12] T. H. Corman, C. E. Leiserson, R. L. Rivest, and C. Stein, “Introduction to Algorithms”, The MIT Press and McGraw-Hill Book Company, Cambridge, Massachusetts and New York, second edition, 2001. [13] A. Shamir, “How to share a secret”, Communications of ACM, 22:612-613, 1979. [14] A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, “Proactive Secret Sharing”, Extended abstract, 1995. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/38586 | - |
dc.description.abstract | 有別於傳統的有線網路可使用特定的成員負責身份認證或金鑰管理等網路安全機制,缺少固有架構的無線隨意網路(ad hoc wireless networks)並無法有效地利用大部份傳統的有線網路安全方案。我們採用了一個網路分群演算法並且修改它以符合安全上的需求,藉此在無線隨意網路中建立一個有彈性的、群組化的安全認證架構。這個新的架構可以讓成員之間彼此驗證身份,建立許多網路安全功能,它不僅僅能適合大型網路,也不像其他分散式的網路安全方案必須依賴高密度、高機動性的網路環境。當設定好一個群組半徑參數並在網路中分別建立起眾多群組之後,這個架構就可以讓各個獨立的群組依不同的實際狀況或安全需求建立各自的憑證管理系統。接著網路中的任何成員都會得知所有群組彼此間的虛擬網路拓樸和每個群組憑證系統的公開金鑰。這個拓樸即為群組之間的虛擬信任網絡,它用來描述各群組之間的交互信任關係也藉以評估各個群組的可信賴度。各個獨立憑證系統的公開金鑰則用來驗證不同群組所發出的成員身份憑證。最後,我們也在不同的網路設定之下做出實驗模擬,以評估這個網路安全機制的表現及效能。 | zh_TW |
dc.description.abstract | Unlike wired networks that use dedicated nodes to support security functions like authentication and key management. Most of traditional security mechanisms do not work well in ad hoc wireless networks due to the lack of infrastructure. We use a clustering heuristic and adapt it for security requirements to provide a scalable authentication framework in the clustered ad hoc network. This novel approach can be used to achieve a variety of security objectives through the peer-to-peer authentication scheme. It scales well to large network size and does not require high node density and mobility speed like other distributed schemes. After forming clusters with a radius parameter, it allows separate authentication services to be employed for different physical conditions or security requirements into independent clusters, and each node in the network can obtain the topology of the clusters as well as the keys of all authentication services. The topology, which is called the virtual trust backbone of clusters, describes the trust relationship among clusters and is used to evaluate the trustworthiness of clusters, and the keys are used to verify entity certificates from distinct clusters. Finally, we evaluate the security scheme and simulate its performance on various configurations of ad hoc networks. | en |
dc.description.provenance | Made available in DSpace on 2021-06-13T16:38:17Z (GMT). No. of bitstreams: 1 ntu-94-R92922071-1.pdf: 4959492 bytes, checksum: 3b539d538bb44f5d55b3ccafa0a17b4b (MD5) Previous issue date: 2005 | en |
dc.description.tableofcontents | Abstract i
Table of Contents ii List of Figures and Tables iv List of Acronyms v 1 Introduction 1 1.1 Motivation and Objective 2 1.2 Thesis Organization 3 2 Related Works and Issues 4 2.1 Frameworks based on Personal Certificate Repositories 4 2.2 Threshold Secret Sharing Scheme 5 2.3 Previous Cluster-based Architecture 6 2.4 Problems and Challenges 6 3 Secure Clustering of Ad hoc Networks 9 3.1 Overview and Profit of the Max-Min Heuristic 9 3.2 Procedure of the Max-Min Clustering Heuristic 10 3.3 Adapt the Heuristic to Security Requirements 12 4 Building a Multi-CA Framework 15 4.1 Concept and Overview 15 4.2 Architecture of the Multi-CA Framework 16 4.3 Distributing CA’s Public Keys among Clusters 20 4.4 Providing More Security Functions 22 5 Security Issues of the Multi-CA Framework 24 5.1 Security Issues of Constructing CA in a Cluster 24 5.2 Reliability of Certificates from Different Clusters 25 5.2.1 Validity of the CA’s key 25 5.2.2 Reliance of the foreign CA service 26 6 Performance Evaluation 27 6.1 Performance of Clustering 28 6.2 Performance of Node Reporting Process 30 6.3 Evaluation of the Number of Clusters 31 6.4 Performance of Distributing the CA Certificates 34 6.5 Performance of Constructing the Backbone 38 7 Conclusion 40 References 41 | |
dc.language.iso | en | |
dc.title | SWARM─無線隨意網路的安全憑證系統 | zh_TW |
dc.title | SWARM—Secure Wireless Ad-hoc network Reliance Management | en |
dc.type | Thesis | |
dc.date.schoolyear | 93-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 廖婉君(Wanjiun Liao),梁明正(Ming-Cheng Liang),李鴻璋,陳澤雄 | |
dc.subject.keyword | 無線網路安全,憑證管理,隨意網路,群組式架構,max-min網路分群法,PGP,公開金鑰基礎建設, | zh_TW |
dc.subject.keyword | wireless network security,certificate authentication,ad hoc networks,cluster-based framework,max-min clustering,PGP,PKI, | en |
dc.relation.page | 42 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2005-07-05 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
顯示於系所單位: | 資訊工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-94-1.pdf 目前未授權公開取用 | 4.84 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。