請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/30033
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 賴飛羆 | |
dc.contributor.author | Yu-Hsuan Chien | en |
dc.contributor.author | 簡于軒 | zh_TW |
dc.date.accessioned | 2021-06-13T01:31:50Z | - |
dc.date.available | 2007-07-30 | |
dc.date.copyright | 2007-07-30 | |
dc.date.issued | 2007 | |
dc.date.submitted | 2007-07-13 | |
dc.identifier.citation | [1] I C. E. Perkins and E. M. Royer, “Ad hoc On-Demand Distance Vector Routing,” IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp. 90-100
[2] D. B. Johnson and D. A. Maltz, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR),” 16-Apr-03, draft-ietf-manet-dsr-09.txt. [3] S. Corson and J. Macker, “Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations,” IETF RFC 2501. [4] E. M. Royer, S. Barbara and C. K. Toh, “A review of current routing protocols for ad hoc mobile wireless networks,” IEEE Personal Communications Magazine, April 1999, pp. 46-55. [5] M. G. Zapata and N. Asokan, “Securing Ad hoc Routing Protocols,” In Proceedings of the ACM Workshop on Wireless Security, 2002. [6] R. Perlman, “An overview of PKI trust models,” IEEE network, Nov.-Dec. 1999. [7] Djenouri, D. Khelladi, L. Badache and A.N., “A survey of security issues in mobile ad hoc and sensor networks,” IEEE Communications Surveys and Tutorials, Fourth Quarter 2005, pp. 2-28. [8] H. Yang, H. Luo, F. Ye, S. Lu and L. Zhang, “Security in Mobile Ad Hoc Networks: Challenges and Solutions,” IEEE wireless communications vol. 1 issue 1, February 2004, pp. 38-47. [9] L. Zhou and Z. J. Hass, “Securing Ad Hoc Networks,” IEEE Network vol. 13, no. 6, Novemember/Decemeber 1999, pp. 24-30. [10] H. Luo and S. Lu., “URSA: Ubiquitous and Robust Access Control for Mobile Ad-hoc Networks,” UCLA, 2004. [11] H. Luo, P. Zerfos, J. Kong, S. Lu and L. Zhang, “Self-securing ad hoc wireless networks,” IEEE Computer and Communications Societies, 2002. [12] S. Yi and R. Kravets, “Composite Key Management for Ad Hoc Networks,” Proceedings of the 1st annual international conference on mobile and ubiquitous systems: networking and services (MobiQuitous'04). 2004. p. 52-61. [13] B. Wu, J. Wu, E. B. Fernandez, M. Ilyas, and S. Magliveras, “Secure and Efficient Key Management in Mobile Ad Hoc Networks,” Journal of Network and Computer Applications, 2005. [14] S. Capkun, L. Buttyan, and J.P. Hubaux, “Self-organized public-key management for mobile ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 2 January/March 2003, pp. 52-64. [15] S. Marti, T.J. Giuli, K. Lai, M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” 6th MobiCom, Boston, Massachusetts, August 2000. [16] Animesh Patcha and Amitabh Mishra, “Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad Hoc Networks,” Proceedings of RAWCON ’03, pp.75-78, 2003. [17] C.H. Ngai and M.R. Lyu, “Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks,” Proc. 2nd International Workshop on Mobile Distributed Computing (MDC'04), Tokyo, Japan, March 23-26 2004. [18] C.H. Ngai, M.R. Lyu, and R.T. Chin, “An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks,” IEEE Proceedings on Aerospace Conference, vol. 2, March 2004, pp. 1275-1285 [19] T. Beth, B. Malte, and K. Birgit, “Valuation of Trust in Open Networks,” Proceedings of the Conference on Computer Security, Sprinter-Verlag, New York, pp. 3-18, 1994. [20] S. Lee, R. Sherwood, and B. Bhattacharjee, “Cooperative Peer Groups in NICE,” IEEE Annual Joint Conference on Computer and Communications Societies, 2003. [21] S. Capkun, L. Buttyan, and J.P. Hubaux, “Mobility Helps Peer-to-Peer Security,” IEEE Transactions on Mobile Computing, January 2006. [22] Patrick McDaniel and Sugih Jamin, “Windowed Certificate Revocation,” in Proceedings of IEEE Info-. com 2000, pp. 1406–1414, March 2000. [23] A. Aresenault and S. Turner, “Internet X.509 public key infrastructure,” drafi-ietf-pkix-roadmap-06.txt, 2000. [24] J. Kohl and B. Neuman, “The Kerberos network authentication service (version 5),” RFC 1510 [25] A. Varga. “The OMNeT++ Discrete Event Simulation System,” in the Proceeding of the European Simulation Multiconference (ESM'2001), Prague, Czech Republic, June 6-9, 2001 [26] N. Concer, “Ad Hoc Sim version 1.1” [27] W. Stallings. “Cryptography and Network Security: Principles and Practice, 3rd ed.”, Prentice Hall, 2003. [28] http://en.wikipedia.org/wiki/Locality | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/30033 | - |
dc.description.abstract | 在最近幾年間,由於行動裝置數量上的快速增長,關於隨意網路的研究議題變得受人注目。較早的研究主要的目的在於提出協定來解決一些像路由的基本問題。然而隨意網路的特色使得它較一般傳統網路更容易遭受攻擊。追根究底,導致這些安全問題的根本原因就在於每一個行動主機的移動性。
在本篇論文中,我們著重於如何在隨意網路中提供認證的服務。一個稱為「區域性」的新觀念將在我們的認證架構中被採用來描述所有位於隨意網路中行動主機的移動特性。在我們的方法中,我們稱這種加入「區域性」觀念的移動模型為「區域性移動模型」。「區域性移動模型」的基本想法在於每一個行動主機有很高的機率會在隨意網路的一個固定小區域中活動,而且位於同一區域中的行動主機能夠更容易的監控彼此的行動。以「區域性移動模型」為基礎,我們提出了一個實際而且有效率的分散式公開金鑰管理系統,以此來提供行動主機間的安全通訊。我們的方法包含了以群組為基礎的網路模型和信任模型,藉此來讓行動主機更有效率的交換憑證以及用信任估算的方式來對彼此進行評估的動作。最後我們使用模擬的方式對我們提出的方法做全面性的評估並用實驗的結果來說明我們提出方法的有效性。 | zh_TW |
dc.description.abstract | In recent years, with the rapid increasing of mobile equipments, the research topics about mobile ad hoc networks (MANETs) become attractive. Earlier studies aimed at proposing protocols for solving some fundamental problems such as routing. However, the features of MANETs make it more vulnerable than traditional wireless networks. To get to the bottom of these security problems, the mobility of each mobile host is the fundamental factor.
In this thesis, we focus on how to provide authentication services in MANETs. A new concept which names “locality” is introduced into our authentication architecture to model the movement of all mobile hosts in the MANET. This mobility model with locality property is called “mobile locality model” in our approach. The basic idea of “mobile locality model” is that each mobile host has high probability for roaming at a fixed and small region of whole MANET and each mobile host in the same locality can monitor the behavior of each other more easily. Based on “mobile locality model”, we present a practical and efficient distributed public key management system for providing secure communication between mobile hosts. Our solution includes group-based network model and trust model which allow mobile hosts to exchange certificates efficiently and rate each other with a trust evaluation metric. Finally, we perform an overall evaluation of our solution through simulation to demonstrate the effectiveness of the proposed scheme. | en |
dc.description.provenance | Made available in DSpace on 2021-06-13T01:31:50Z (GMT). No. of bitstreams: 1 ntu-96-R94922137-1.pdf: 663220 bytes, checksum: cf99bb9a4f4d497e55614df8e7af0a1d (MD5) Previous issue date: 2007 | en |
dc.description.tableofcontents | Abstract I
Content II List of Figures IV List of Tables V Chapter 1 Introduction 1 1.1 Introduction to mobile ad hoc networks 1 1.2 Motivation 4 1.3 Objective 5 1.4 Thesis organization 7 Chapter 2 Related Works 8 2.1 Distributed Certificate Authority 8 2.2 Self-Organized Approach 10 2.3 Watchdog 12 2.4 Trust- and Clustering-Based Approach 12 Chapter 3 Architecture of Authentication Services 15 3.1 Mobile locality model 16 3.2 Network Model 18 3.3 Trust Model 19 Chapter 4 Security Operations 23 4.1 Public Key Certificate 23 4.1.1 Generation of Public Key Certificate 23 4.1.2 Revocation of Public Key Certificate 26 4.2 Locality Trust Group 27 4.2.1 The Requirements of Locality Trust Group 27 4.2.2 Construction of Locality Trust Group 29 4.2.3 Certificate Issuing by Locality Trust Group 30 4.3 Trust Evaluation 33 4.3.1 Fundamental Rules of Trust Evaluation 34 4.3.2 Trust Value Calculation 36 4.3.2.1 Formulas for Calculating Trust Value 36 4.3.2.2 Examples 37 4.3.3 Trust Value Update 38 4.3.4 Trust Value Decay 39 4.4 Authentication 40 4.4.1 Direct Authentication 41 4.4.2 Indirect Authentication 42 4.4.3 Procedures of Authentication 42 Chapter 5 Simulation 46 5.1 Simulation Environment 46 5.2 Simulation Metrics 48 5.3 Simulation Results 49 5.3.1 Effects of Locality 49 5.3.2 Improvement by Locality Trust Group 51 Chapter 6 Conclusion 55 Reference 56 | |
dc.language.iso | en | |
dc.title | 在隨意網路下以區域性為基礎建構之群組認證服務 | zh_TW |
dc.title | Locality-Based Trust Group Authentication Services in Mobile Ad Hoc Networks | en |
dc.type | Thesis | |
dc.date.schoolyear | 95-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 陳澤雄,李鴻璋,林正偉 | |
dc.subject.keyword | 移動性,區域性,移動模型,區域性移動模型,分散式公開金鑰管理系統,以群組為基礎的網路模型,信任模型, | zh_TW |
dc.subject.keyword | mobility,locality,mobility model,mobile locality model,distributed public key management system,group-based network model,trust model, | en |
dc.relation.page | 58 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2007-07-17 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
顯示於系所單位: | 資訊工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-96-1.pdf 目前未授權公開取用 | 647.68 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。