請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/9363
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 張堂賢 | |
dc.contributor.author | Yuan-Jui Chang | en |
dc.contributor.author | 張元瑞 | zh_TW |
dc.date.accessioned | 2021-05-20T20:19:14Z | - |
dc.date.available | 2009-06-23 | |
dc.date.available | 2021-05-20T20:19:14Z | - |
dc.date.copyright | 2009-06-23 | |
dc.date.issued | 2009 | |
dc.date.submitted | 2009-06-16 | |
dc.identifier.citation | 1. NTCIP Joint Standards Committee, “National Transportation Communications for ITS Protocol (NTCIP) Guide” , Draft Version 03.02b, October 2002
2. Joint Standard of AASHTO, ITE and NEMA, “National Transportation Communications for ITS Protocol and Simple Transportation Management Framework”, Draft Version 01.12, December 2001. 3. Telecommunication Standardization Sector of ITU, “Data Networks and Open System Communications”, X.814, November 1995. 4. Land Transportation Authority, Singapore, http://www.lta.gov.sg. 5. Daemen, J., and Rijmen, V., “Rijndael: The Advanced Encryption Standard”, Dr.Dobb’s Journal, March 2001. 6. The Legion of the Bouncy Castle, http://www.bouncycastle.org/ 7. ITS, America, http://www.itsa.org/ 8. Lidl, R., and Niederreiter, H., “Introduction to Finite Fields and Their Applications”, Cambridge: Cambridge University Press, 1994. 9. Benjamin Arazi, Senior Member, IEEE “Vehicular Implementations of Public Key Cryptographic Techniques”, IEEE Transportations on Vehicular Technology, Vol.40, No.3, August 1991. 10. Tzong-Chen We and Chien-Lung Hsu, “Cryptanalysis of Digital Multisignature Schemes for Authenticating Delegates in Mobile Code Systems”, IEEE Transportations on Vehicular Technology, Vol.52,No.2, March 2003. 11. Xun Yi Kheong Siew and Chik How Tan, “A Secure and Efficient Conference Scheme for Mobile Communications”, IEEE Transportations on Vehicular Technology, Vol.52,No.4, July 2003. 12. Archana Khetan, “M-Commerce: A JAVA Approach”, Master Thesis, Nanyang Technological University, 2002. 13. Ng Churn Wai, “On the Security of DES, Blowfish and Rijnedael”, Master Thesis, Nanyang Technological University, 2003. 14. Choy Sok Sien, “Security in Mobile AD HOC Netowrk”, Master Thesis, Nanyang Technological University, March 2003. 15. Lee Chit Boon, “Security Monitor using Java Mobile Agent”, MSc Project, Nanyang Technological University, December 2000. 16. Mar Kai Liat, “Study of Wireless LAN Security Issues”, Master Thesis, Nanyang Technological University, 2004. 17. Zhou Gang, “Wireless Network Security Analysis”, Master Thesis, Nanyang Technological University, 2002. 18. Nol Premasathian, “Design and Analysis of Dynamic Key-driven crypto Engines”, Ph.D. Thesis, University of Louisiana, Spring 2002. 19. Whitfield Diffie and Martin E. Hellman, Member, IEEE, “New Directions in Cryptography”, Proceedings of the AFIPS National Computer Conference, June 1976. 20. Rivest. R., Shamir, A., and Adleman, L., “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”, Communications of the ACM, February 1978. 21. Koblitz, N., “Elliptic Curve Cryptosystems”, Mathematics of Computation Vol. 48, Number 177, January 1987, pp 203-209. 22. Hevia, A., and Kiwi, M., “Strength of Two Data Encryption Standard Implementations Under Timing Attacks”, ACM Transactions on Information and System Security, November 1999. 23. Coppersmith, D., “The Data Encryption Standard (DES) and Its Strength against Attacks”, IBM Journal of Research and Development, May 1994 24. B.Scneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)”, Fast Software Encryption, Cambridge Workshop Proceedings (December 1993), Springer-Verlag, 1994, pp 191-201. 25. Murphy, S., “The Cryptanlysis of FEAL-4 with 20 Chosen Plaintexts”, Journal of Cryptography, No. 3, 1990. 26. William Stallings, “Cryptography and Network Security-Principles and Practices Third Edition”, May 2004. 27. Rich Helton and Johennie Helton, “JavaTM Security Solutions”, 2004. 28. Jonathan Knudsen, “Java Cryptography”, O’REILLY, March, 1999. 29. Scott Oaks, “Java Security” O’REILLY, February, 2002. 30. Boneh, D., “Twenty Years of Attacks on the RSA Cryptosystem”, Notices of the American Mathematical Society, February 1999. 31. Adams, C., “Simple and Effective Key Scheduling for Symmetric Ciphers”, Proceedings, Workshop in Selected Areas of Cryptography, SAC’94. 1994. 32. Doroty E. Denning and Giovanni Maria Sacco, “Timestamps in Key Distribution Protocols”, Communications of the ACM, August 1981 33. Alberto Partida and Diego Andina, “Applied Cryptography in Java”, 1999 IEEE 34. Enge, A., “Elliptic Curves and Their Applications to Cryptography”, Norwell, MA; Kluwer Academic Publishers, 1999. 35. Davies, D., and Price, W., “Security for Computer Networks”, New York Wiley, 1989. 36. Jueneman, R., Matyas, S. and Meyer, C., “Message Authentication”, IEEE Communications Magazine, September 1988. 37. David Hook, “Beginning Cryptography with Java” ,Wiley Publishing, Inc., 2005. 38. Jason Weiss, “Java Cryptography Extensions”, Morgan Kaufmann Publishers, 2003. 39. Michael D.Meyer and Eric J.Miller, “Urban Transportation Planning” Mc Graw Hill, 2000. 40. Y. Daniel Liang, “Introduction to Java Programming”, Prentice Hall, 2003. 41. George A. Morgan, Nancy L. Leech, Gene W. Gloeckner and Karen C. Barrett, “SPSS for Introductory Statistics”, Lawrence Erlbaum Associates, Publishers, 2004. 42. Julie Pallant, “SPSS Survival Manual”, Open University Press, 2005. 43. John Enter,William Wasserman and G.A. Whitmore, “Applied Statistics”, Allyn and Bacon, 1992. 44. 張有恆,「運輸學」,1993。 45. 中華智慧型運輸系統協會,「台灣地區智慧型運輸系統實驗城規劃計畫(一)&(二)」,交通部委託研究計劃,2001年3月。 46. 中華智慧型運輸系統協會,「符合NTCIP的無線寬頻ATMS交控示範系統(一)」,交通部委託研究計劃,2004年12月。 47. 交通部,「都市交通控制通訊協定3.0版」,2004年11月。 48. 中華顧問工程司,「先進交通控制系統協定NTCIP-CTCIP-TTCIP與我國V3.0協定轉換機制研究」,2006年11月。 49. 黃韋凱,「台灣地區專用交通管理資訊庫(TMIB)之研究」,國立台灣大學土木工程所交通組研究所碩士論文,2003年6月 50. 陳佳良,「NTCIP物件利用GPRS傳輸之時間可靠度研究」,國立台灣大學土木工程所交通組研究所碩士論文,2005年6月。 51. 劉宜傑,「ATMS資料傳輸之資訊安全研究」,國立台灣大學土木工程所交通組研究所碩士論文,2006年6月。 52. 胡育銘,「應用資訊安全於分散式測驗系統之研究」,國立台南師範學院資訊教育研究所碩士論文,2002年6月。 53. 王青青,巫坤品譯,William Stallings原著,「密碼學與網路安全原理與實務第三版」,碁峯資訊股份有限公司,2004年五月。 54. 王旭正,柯宏叡「密碼學與網路安全理論、應用與實務」,博碩文化股份有限公司,2004年5月。 55. 阮韻芳譯。Jonathan Knudsen原著,「JAVA密碼學」,1999年三月。 56. 王文中,「EXCEL於資料分析與統計學上的應用」,博碩文化股份有限公司,1997年9月。 57. 潘南飛譯,「工程統計」,全威圖書有限公司,2002年11月。 58. 鄒修銘譯,「Eclipse實用手冊」,博碩文化股份有限公司,2004年。 59. 林傑斌、林川雄、劉明德,「SPSS統計建模與應用實務」,博碩文化股份有限公司,2004年7月。 60. 楊松諺、上官飛鳳,「Java Security全方位解決方案」,碁峰資訊股份有限公司,2004年。 61. 洪維恩,「Java2.0 JDK5.0教學手冊」,博碩文化股份有限公司,2005年5月。 62. 楊豐瑞,楊豐任,「網路概論與實務」,松崗電腦圖書資料股份有限公司,2001年1月。 63. 交通部運研所網站(http://www.iot.gov.tw/mp.asp?mp=1) 64. 冠陞工程企業有限公司(http://www.kangsang.com.tw/control_center.htm) | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/9363 | - |
dc.description.abstract | ITS的目標在於促進交通安全、減少交通擁擠、提高機動性、增進經濟生產力、減少環境衝擊、提昇能源使用效率及帶動相關產業發展。而先進交通管理系統(Advanced Transportation Management System, ATMS)乃為ITS下之核心系統之一,其中最重要的乃是駕駛人所需即時交通資訊之傳輸、交通控制中心須依即時收取之資料,將最正確的訊息與決策傳給用路人與路側設施;在這環環相扣的過程中涉及許多技術專業如通訊、電機、資訊工程等領域的發展。目前, ATMS之資料傳輸中,採用NTCIP (National Transportation Communications for ITS Protocol)作為其傳輸協定,為了與現行通用之通訊協定相結合而不致有所衝突,NTCIP之堆疊(Stack)亦依循ISO-OSI(Open Systems Interconnect)之七層模型架構。
採用ISO-OSI之模型架構使得NTCIP不致於與現行通訊協定不相容,但開放式的網路環境也為NTCIP帶來許多安全性(Security)的問題,如駭客(Hacker)可在封包傳輸途中進行攔截,並對其進行竄改、偽裝、重送等攻擊,然而在實際應用上,其資料的傳輸安全性卻往往為人們所忽略。故本研究透過現行之密碼學相關技術,針對資料傳輸之確認性(Authentication)、機密性(Confidentiality)與完整性(Integrity)等對傳輸訊息進行加密保護,對於ATMS之傳輸建立ㄧ套動態安全機制(Dynamic Security Mechanism, DSM),藉此提高ATMS之傳輸安全性。 此外,在通訊安全的領域中並無所謂絕對性的安全機制;安全機制的安全性應取決於使用者的需求以及可使用之軟硬體設備、支援等。本研究DSM最大的特色為可變動式金鑰產生器DSKG (Dynamic Secret Key Generator) 以及DPKG (Dynamic Public Key Pair Generator)。此機制使得每一次的傳輸加密皆有不同的金鑰產生,藉此來達到防止駭客入侵、取得傳輸資料之安全漏洞。 由於在原有的資料傳輸過程中加入加解密程序對於原系統亦會產生其負效應,因此本研究尚進行實驗設計,以探討其封包於加密前後對於系統運作影響以及封包傳輸時間之影響,並進行統計檢定,以確認封包加密對其之影響幅度,最後會依實驗結果對於加密前後之封包於ISP與VPN之有線網路及無線網路傳輸架構下之傳輸與系統運作時間進行DSM運作效率分析,以使得採用加密機制之交控中心人員能夠依其所需,訂立相關傳輸時間之門檻值。 | zh_TW |
dc.description.abstract | ITS aims at enhancing traffic safety, reducing congestion, increasing travel mobility, enlarging economic power and controlling efficient energy-use. Advanced Transportation Management System (ATMS) is the major sub-system of ITS, and it utilizes monitor apparatus, communications and other control technologies to obtain or exchange traffic information between the traffic devices. However, during the data transmission, the situation of the data packets switching is exposed and not protected. Someone can use existing software to intercept the data packets from transmission process easily and these attacks will cause ATMS to become paralysed and disorder the signal timing or impaired traffic safety seriously. Therefore, the traffic data transmission security should be the principal issue for ATMS nowadays, but less people concern with the issue.
By these reasons, this study concentrates on the information security of ATMS data transmission through modern cryptography and sets up a suitable security mechanism which aims at the message packet exchange and transmission via Java programming language. In which, the cryptography techniques would be adopted to protect the contents of data packet from masquerading, replying and tampering; and the general encryption algorithm is used to transform the plaintext into the ciphertext via the secret keys. In the past, the secret key algorithms during the encryption/decryption procedures are invariable and regular; furthermore, and the message packets are transmitted frequently in traffic control. In these conditions, one could crack the secret key algorithms easily by the frequent transmission. Thus, this research designs and implements an encryption technique which the secret keys could be changeable for each message and suitable for the ATMS data transmission; we called it dynamic encryption technique. On the other hand, we expect the security mechanism would not only achieve the data security but also consume less resources of the core system. Unfortunately, in the process of improving the data security, it also brings some negative-effects on the core system. Therefore, the system operation efficiency is also the major consideration of the security mechanism design. In additional, the security mechanism could be suitable for the existing communications media which transportation filed commonly uses nowadays, namely: wired network communications and 3.5G mobile communications. | en |
dc.description.provenance | Made available in DSpace on 2021-05-20T20:19:14Z (GMT). No. of bitstreams: 1 ntu-98-R95521511-1.pdf: 4479141 bytes, checksum: 3eed21c2fce48eab4da2e8638dfe5a6e (MD5) Previous issue date: 2009 | en |
dc.description.tableofcontents | 引 言 ………………………………………………………………………………..i
摘 要…………………………………………………………………… ................iii ABSTRACT……...…………………………………………………………………...v TABLE OF CONTENTS……...……………………………………………………vii LIST OF TABLES……………………..……………………………………………xi LIST OF FIGURES…………………………….…………………………………xv LIST OF ABBREVIATIONS……….……………………………………………xix CHAPTER ONE INTRODUCTION……………………………………………… .1 1.1 Background…………………………………………………………………..1 1.2 Objectives of this Research…………………………………………………6 1.3 Scope of this Research…………………………….…………………………6 1.4 Research Methodology………………………………………………………7 1.5 Structure of this Research……………………………………………………8 1.6 Chapter content of this Research…………………………………………10 CHAPTER TWO FUNDAMENTALS……………………………………………13 2.1 Introduction…………………………………………………………………13 2.2 Advanced Transportation Management System……………………………13 2.3 NTCIP………………………………………………………………………15 2.3.1 Protocol and NTCIP …………………………………………………15 2.3.2 Framework, Standards and Protocol Stacks of NTCIP………………19 2.3.3 Brief Summary……………………………………………………….23 2.4 Security Elements…………………………………………………………..24 2.4.1 Network Security Model……………………………………………..24 2.4.2 Security Attack Techniques…………………………………… …...26 2.4.3 Security Services……………………………………………………29 2.5 Cryptography Technologies………………………………………………30 2.5.1 Symmetric Cryptography……………………………………………31 2.5.2 Asymmetric Cryptography…………………………………………...38 2.5.3 Message Digest and Message Authentication………………………43 2.6 The Possible Attack Discussions on ATMS Data Transmission ……...…46 2.7 Summary and Evaluations………………………………………………….51 CHAPTER THREE SECURITY MECHANISM ESTABLISHMENT AND SECURITY PROTECTION DISCUSSION………………………………………55 3.1 Introduction…………………………………………………………………55 3.2 Conceptions of Information Security in this Study…………………… …...56 3.3 Development Tool- Java Programming Language ………………………...59 3.4 Architecture of the Security Mechanism …………………………………62 3.4.1 Conceptions of the Dynamic Encryption Technique ……………...62 3.4.2 Architecture of the Dynamic Security Mechanism…………………...67 3.5 Security Analysis for the Security Mechanism…………………………….76 3.5.1 Analysis of Security Protection………………………………………77 3.5.2 Cryptanalysis ………………………………………………………80 3.5.3 Brute-Force Attack…………………………………………………85 3.6 Summary……………………………………………………………… …...87 CHAPTER FOUR EXPERIMENTS FOR SYSTEM EFFICIENCY……………89 4.1 Introduction…………………………………………………………………89 4.2 Experiment Design Principle ……………………………………………...89 4.3 Experiment Environment…………………………………………………92 4.3.1 Scope of Simulated Experiment……………………………………92 4.3.2 The protocol stacks and hardware for Simulation ……...……………94 4.3.3 NTCIP objects for the Simulation………………………………………100 4.4 Experiment Contents………………………………………………………105 4.4.1 Experiment Methodology…………………………………………..105 4.4.2 Experiment One……………………………………………………112 4.4.2 Experiment Two…………………………………………………….114 4.4.3 Experiment Three………………………………………………...…116 4.5 Expected Outcomes ………………………………………………………118 CHAPTER FIVE DATA ANALYSIS AND FINDINGS…….……………………121 5.1 Introduction………………………………………………………………121 5.2 Queue and delay phenomenon of DSM operation ………………………121 5.3 Data Analysis of Experiment One ……………………………………….125 5.3.2 Analysis in the NTCIP object size for the influence of encryption and decryption operations ……………………………………………………….129 5.3.3 Brief summary………………………………………………………132 5.4 Data Analysis of Experiment Two …………………………………….133 5.4.1 Analysis in the combinations of AES and RSA for the influence of data packet transmission delay ………………………………………………….134 5.4.2 Analysis in the combinations of AES and RSA for the influence of operation delay………………………………………………………………136 5.5 Data Analysis of Experiment Three……………………………………….142 5.5.1 Analysis in the interval of the object dispatch and the computation-capability for influence of device operation delay ……………143 5.5.2 Analysis in the interval of the object dispatch and the computation-capability for influences of data transmission delay………........147 5.5.3 Brief summary………………………………………………………150 5.6 Regression Equation of DSM Operations…………………………………152 CHAPTER SIX CONCLUSIONS AND FUTURE RESEARC…………………156 6.1 Conclusions………………………………………………………………156 6.2 Future Research and Suggestions ……………………………………….160 REFERENCE………………………………………………………………………162 APPENDIX A SNMP AND STMP…………….………………………………166 A-1 Simple Network Management Protocol ………………………………….166 A-2 Simple Transportation Management Protocol……………………………170 APPENDIX B OPERATIONS OF AES AND RSA…………………………174 B-1 AES ……………………………………………………………………174 B-2 RSA…………………………………………………………………178 APPENDIX C LIST OF EXPERIMENT CONTENTS……………………182 | |
dc.language.iso | en | |
dc.title | ATMS通訊安全動態加密技術研究 | zh_TW |
dc.title | Dynamic Security Mechanism for the Security and Efficiency of ATMS Data Transmission | en |
dc.type | Thesis | |
dc.date.schoolyear | 97-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 黃文鑑,陶治中 | |
dc.subject.keyword | 先進交通管理系統,智慧型運輸系統,動態加密,密碼學,安全性, | zh_TW |
dc.subject.keyword | ITS,ATMS,Cryptography,Security,Efficiency,Encryption, | en |
dc.relation.page | 184 | |
dc.rights.note | 同意授權(全球公開) | |
dc.date.accepted | 2009-06-17 | |
dc.contributor.author-college | 工學院 | zh_TW |
dc.contributor.author-dept | 土木工程學研究所 | zh_TW |
顯示於系所單位: | 土木工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-98-1.pdf | 4.37 MB | Adobe PDF | 檢視/開啟 |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。