請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/33892
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 賴飛羆(Feipei Lai) | |
dc.contributor.author | Sin-Hong Lin | en |
dc.contributor.author | 林信宏 | zh_TW |
dc.date.accessioned | 2021-06-13T05:48:20Z | - |
dc.date.available | 2006-07-12 | |
dc.date.copyright | 2006-07-12 | |
dc.date.issued | 2006 | |
dc.date.submitted | 2006-07-07 | |
dc.identifier.citation | [1] C. E. Perkins and E. M. Royer “Ad hoc On-Demand Distance Vector Routing.” IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp. 90-100.
[2] D. B. Johnson and D. A. Maltz. 'The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)', 16-Apr-03, draft-ietf-manet-dsr-09.txt. [3] http://decision.csl.uiuc.edu/~wireless/dsdv/ [4] A. Aresenault and S. Turner. “Internet X.509 public key infrastructure.” draft-ietf-pkix-roadmap-06.txt, 2000. [5] R. Perlman. “An overview of PKI trust models.” IEEE network, Nov.-Dec. 1999. [6] D. Zhu and M. Mutka. “Promoting Cooperation Among Strangers to Access Internet Services from an Ad Hoc Network.” IEEE Annual Conference on Pervasive Computing and Communication, 2004. [7] S. Lee, R. Sherwood, and B. Bhattacharjee. “Cooperative Peer Groups in NICE.” IEEE Annual Joint Conference on Computer and Communications Societies, 2003. [8] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang. “Security in Mobile Ad Hoc Networks: Challenges and Solutions.” IEEE Wireless Communications, 2004. [9] M. G. Zapata and N. Asokan. “Securing Ad hoc Routing Protocols.” In Proceedings of the ACM Workshop on Wireless Security, 2002. [10] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer. “A secure Routing Protocol for Ad Hoc Networks.” IEEE International Conference on Network Protocols, 2002. [11] M. Bechler, H.-J. Hof, D. Kraft, F. Pahlke, and L. Wolf. “A Cluster-Based Security Architecture for Ad Hoc Networks.” IEEE Computer and Communications Societies, 2004. [12] J. Chandra and L. L. Singh. “A Cluster Based Security Model for Mobile Ad Hoc Networks.” IEEE International Conference on Personal Wireless Communications, 2005. [13] S. Capkun, L. Buttyan, and J.-P. Hubaux. “Self-Organized Public-Key Management for Mobile Ad Hoc Networks.” IEEE Transaction on Mobile Computing, 2003. [14] C. P. Chang, J. C. Lin, and F. Lai. “Trust-group-based authentication services for mobile ad hoc networks.” IEEE Wireless Pervasive Computing, Jan 2006. [15] M. S. Bouassida, I. Chrisment, and O. Festor. “An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks.” Third International IFIP-TC6 Networking conference - NETWORKING 2004. [16] P. Zimmermann. Pretty good privacy user’s guide. Distribute with PGP software, June 1993. [17] P. Zimmermann. The PGP User’s Guide, October 1994. The International PGP Home Page, http://www.pgpi.org. [18] L. Zhou and Z. J. Haas. “Securing Ad Hoc Networks.” IEEE Network, 1999. [19] H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, “Self-securing ad hoc wireless networks.” IEEE Computer and Communications Societies, 2002. [20] A. Gummadi and J. P. Yoon. “Modeling Group Trust For Peer-to-Peer Access Control.” IEEE Database and Expert Systems Applications, 2004. [21] S. Gokhale and P. Dasgupta. “Distributed Authentication for Peer-to-Peer Networks.” IEEE Applications and the Internet Workshops, 2003. [22] W. Stallings. “Cryptography and Network Security: Principles and Practice, 3rd ed.”, Prentice Hall, 2003. [23] A. Varga. “The OMNeT++ Discrete Event Simulation System.” In the Proceeding of the European Simulation Multiconference (ESM'2001), Prague, Czech Republic, June 6-9, 2001. [24] Nicola Concer, http://www.cs.unibo.it/~concer/adHocSim.pdf. [25] U. Menber. “Introduction to Algorithms: A Creative Approach”, Addison-Wesley, 1989. [26] http://mathworld.wolfram.com/DominatingSet.html | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/33892 | - |
dc.description.abstract | 有別於一般的網際網路,無線隨意網路是一種缺少公共基礎建設可供安全認證的網路,並且它有動態拓樸位置以及需在有限的能源下運作等特性;因此,一般傳統的安全認證機制方法例如公共鑰匙基礎結構不能很順利的應用在無線隨意網路上。根據這個議題,我們提出了建立相互合作之信任群體方式改進公開金鑰在安全認證上的問題,為了避免在形成群體時可能造成太大的網路負擔,因此我們考慮以半徑為兩個節點的星狀拓樸產生相互合作之信任群體,此群體中的每位成員須做到保證彼此是高度互相信任的狀態,並且每位成員都將得到共享的群鑰配對用以簽發憑證。換句話說,藉由使用共享群鑰簽發憑證將可使得每位群體成員成為此群體的代理人,我們深信此觀念可用以改進一般只有點對點之間的無效率認證。 | zh_TW |
dc.description.abstract | An ad hoc network is an “infrastructure-less” network which is much different from Internet networks. The main differences are the lacking of fixed infrastructures, the dynamic topology, and the limited transmission range of mobile hosts. Therefore, it is difficult for us to apply the traditional security solution, such as PKI, from the wired network to the mobile environment. According to the issue, we propose an approach to form cooperative trust groups to solve the authentications among mobile hosts in the ad hoc network. The procedure of forming groups should avoid causing too much overhead, so only a simple star topology with radius at most 2 is taken into consideration to deploy the cooperative trust groups. Each member in the same cooperative group has high trust for its group members and all of them simultaneously own a shared group key used for the authentication of digital signature. In other words, a group member may act as a substitute of one another by issuing the certificate signed with the shared group key. We are convinced that the concept can redeem the inefficient authentication only used with the personal public key. | en |
dc.description.provenance | Made available in DSpace on 2021-06-13T05:48:20Z (GMT). No. of bitstreams: 1 ntu-95-R93922134-1.pdf: 1752854 bytes, checksum: f33ad2a2a26763537d8b5d13f7d7ccfe (MD5) Previous issue date: 2006 | en |
dc.description.tableofcontents | Chapter 1 Introduction 1
1.1 Ad Hoc Network 1 1.2 Motivation and Objective 3 1.3 Thesis Organization 6 Chapter 2 Related Works 7 2.1 Threshold Cryptography 8 2.2 Certificate Chains 9 2.3 Promoting Cooperative Groups 11 Chapter 3 Cooperative Trust Groups 14 3.1 Certificate Graphs 14 3.1.1 Certificate Issuing 15 3.1.2 Certificate Revocation 16 3.2 Trust Models 17 3.3 High-Trust Groups 19 3.3.1 Search Group Members 20 3.3.2 Issue High Trust Certificates for Group Members 24 3.3.3 Set Trust for Group Key 29 Chapter 4 Authentication 30 4.1 Construct Certificate Repositories 30 4.1.1 Certificate Issued Between Distinct Group Members 31 4.1.2 Selecting Certificate Policies (SCP) 33 4.2 Two Main Authentication Ways 35 4.2.1 Direct Authentication 35 4.2.2 Indirect Authentication 36 Chapter 5 Simulation 39 5.1 Simulation Scenarios 39 5.2 Performance of Forming Cooperative Trust Groups 40 5.3 Performance of Authentication 46 Chapter 6 Conclusion and Future Works 53 Reference 55 | |
dc.language.iso | en | |
dc.title | 在隨意網路下以相互合作之信任群體方式改進公開金鑰之確認性 | zh_TW |
dc.title | Improving Public Key Authentication in ad-hoc networks with Cooperative Trust Groups | en |
dc.type | Thesis | |
dc.date.schoolyear | 94-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 李鴻璋,林正偉,張延任,陳澤雄 | |
dc.subject.keyword | 公共鑰匙基礎結構,相互合作之信任群體,安全認證,點對點機制,星狀拓樸,群鑰配對,個人鑰匙配對,數位簽章, | zh_TW |
dc.subject.keyword | PKI,cooperative trust group,security authentication,peer-to-peer,star topology,group key pair,personal key pair,digital signature, | en |
dc.relation.page | 57 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2006-07-11 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
顯示於系所單位: | 資訊工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-95-1.pdf 目前未授權公開取用 | 1.71 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。