請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/38721完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 賴飛羆 | |
| dc.contributor.author | Chih-Peng Chang | en |
| dc.contributor.author | 張志鵬 | zh_TW |
| dc.date.accessioned | 2021-06-13T16:43:26Z | - |
| dc.date.available | 2005-07-15 | |
| dc.date.copyright | 2005-07-15 | |
| dc.date.issued | 2005 | |
| dc.date.submitted | 2005-06-30 | |
| dc.identifier.citation | [1] R. Molva and P. Michiardi, “Security in Ad hoc Networks,” in Proceedings of Personal Wireless Communication, September.
[2] H. Yang, H. Luo, F. Ye, S. Lu and L. Zhang “Security in Mobile Ad Hoc Networks: Challenges and Solutions” IEEE wireless communications vol. 1 issue 1, February 2004, pp. 38-47. [3] S. Corson and J. Macker, “Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations,” IETF RFC 2501. [4] E. M. Royer, S. Barbara and C. K. Toh, “A review of current routing protocols for ad hoc mobile wireless networks,” IEEE Personal Communications Magazine, April 1999, pp. 46-55. [5] L. Zhou and Z. J. Hass, “Securing Ad Hoc Networks,” IEEE Network vol. 13, no. 6, Novemember/Decemeber 1999, pp. 24-30. [6] J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing robust and ubiquitous security support for mobile ad-hoc networks,” The 9th International Conference on Network Protocols, November 2001, pp. 251-260 [7] S. Capkun, L. Buttyan, J.P. Hubaux, “Self-organized public-key management for mobile ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 2 January/March 2003, pp. 52-64. [8] D. Balfanz, D. K. Smetters, P. Stewart and H. Chi. Wong, “Talking to Strangers: Authentication in Ad-Hoc Wireless Networks,” In Symposium on Network and Distributed Systems Security, 2002. [9] J. P. HuBaux, L. Buttyan and S. Capkun, “The quest for security in mobile ad hoc networks,” In Proc. ACM MOBICOM, 2001, pp.146-155. [10] P. Zimmermann, The Official PGP User’s Guide. MIT Press, 1995. [11] F. Stajano and R. J. Anderson, “The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks,” The 7th International Workshop on Security Protocols, 2000, pp.172-182. [12] F. Stajano, “The Resurrecting Duckling - what next?” The 8th International Workshop on Security Protocols, 2001, pp.204-214. [13] A. Shamir, How to share a secret, Communications of ACM 1979. [14] A. Aresenault and S. Turner, “Internet X.509 public key infrastructure,” drafi-ietf-pkix-roadmap-06.txt, 2000. [15] J. Kohl and B. Neuman, “The Kerberos network authentication service (version 5), “ RFC 1510 [16] “OMNET++ Community Site”, “http://www.omnetpp.org/index.php. [17] N. Concer, “Ad Hoc Sim version 1.1” | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/38721 | - |
| dc.description.abstract | 在最近幾年,因為隨意網路很容易建置,所以受到來越來多的關注。然而,因為隨意網路的特性,相較於有線網路,無線網路更容易遭受到安全性的威脅。因此,為了讓隨意網路更安全實用,安全性是最主要的考量。
這本篇論文中,我們針對在隨意網路上的身分確認問題來探討。為了提供身分確認的服務,公開金鑰是一個理想的機制。雖然這個機制在有線網路上已經很成熟,不過受限於隨意網路的共享無線媒體,電池的限制,變動的網路拓樸,在隨意網路上以公開金鑰為基礎的身份確認仍然是件挑戰的事。在本篇論文中,我們提出一個有效率的公開金鑰管理系統, 相仿於信任網(web-of-trust),創新之處在於我們導入信任團體的概念。最後我們使用模擬程式來驗證評估我們方法的正確及有效性。 | zh_TW |
| dc.description.abstract | In recent years, mobile ad hoc networks have received more attention, because of their easy deployment. However, the characteristic of mobile ad hoc networks are more prone to physical security threats than the wired network environments. Therefore, it has become a primary concern of securing mobile ad hoc networks.
In this thesis, we address the problem of authentication in mobile ad hoc networks. Public-key based mechanisms are ideal to provide the authentication services. Although this is already mature in a fixed network, providing public key based authentication is still very challenging in mobile ad-hoc networks because of shared wireless medium, energy constrains, dynamic network topology. Here, we present a more efficient public key management system, like web-of-trust, but include the concept of trust group for mobile ad hoc networks. Finally, we evaluate our solution through the simulation. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-13T16:43:26Z (GMT). No. of bitstreams: 1 ntu-94-R92922076-1.pdf: 4272245 bytes, checksum: b33a9a308ea7a145a2d03d7d886779a2 (MD5) Previous issue date: 2005 | en |
| dc.description.tableofcontents | Abstract I
Content II List of Figures III List of Table IV Chapter 1 Introduction 1 1.1 Fundamental of mobile ad hoc networks 1 1.1.1 Characteristics of mobile ad hoc networks 1 1.1.2 Routing protocols 2 1.2 Motivation 5 1.3 Objective 6 1.4 Thesis organization 7 Chapter 2 Related works 8 Chapter 3 Basic operations of public key management system 10 3.1 Creation of Public keys and Public-key Certificates 11 3.2 Trust Group 12 3.2.1 The concept of trust group 13 3.2.2 The requirements of trust group 14 3.2.3 Construct trust group 16 3.2.4 Break up trust group 19 3.3 Certificate exchange 19 3.4 Constructing the update certificate cache 21 3.4.1 Maximum weight-degree algorithm 21 3.5 Key authentication 24 Chapter 4 Simulation 27 4.1 Simulation metrics 27 4.2 Simulation environment 28 4.3 Result and analysis 29 Chapter 5 Conclusion 39 Reference 41 | |
| dc.language.iso | en | |
| dc.subject | 信任群體 | zh_TW |
| dc.subject | 公開金鑰管理系統 | zh_TW |
| dc.subject | 隨意網路 | zh_TW |
| dc.subject | 身份確認 | zh_TW |
| dc.subject | trust group | en |
| dc.subject | public key management system | en |
| dc.subject | mobile ad hoc networks | en |
| dc.subject | authentication | en |
| dc.title | 在隨意網路下以信任群體為基礎的身分確認服務 | zh_TW |
| dc.title | Trust-group-based authentication services for mobile ad hoc networks | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 93-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 廖婉君,梁明正,李鴻章,陳澤雄 | |
| dc.subject.keyword | 信任群體,身份確認,隨意網路,公開金鑰管理系統, | zh_TW |
| dc.subject.keyword | trust group,authentication,mobile ad hoc networks,public key management system, | en |
| dc.relation.page | 42 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2005-06-30 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
| 顯示於系所單位: | 資訊工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-94-1.pdf 未授權公開取用 | 4.17 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
