跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.11) 您好!臺灣時間:2025/09/24 09:32
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:孫明功
研究生(外文):Ming-KungSun
論文名稱:輕量型密碼協定與應用
論文名稱(外文):Light-Weight Cryptographic Protocols and Applications
指導教授:林輝堂林輝堂引用關係
指導教授(外文):Hui-Tang Lin
學位類別:博士
校院名稱:國立成功大學
系所名稱:電腦與通信工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2013
畢業學年度:101
語文別:英文
論文頁數:87
中文關鍵詞:公開金鑰基礎建設數位簽章分散式感測網路數位智財權管理身份認證智慧卡車載網路
外文關鍵詞:PKIdigital signaturesdistributed sensor networksDRMauthenticationsmart cardsvehicular network
相關次數:
  • 被引用被引用:0
  • 點閱點閱:276
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
公開金鑰基礎建設(Public Key Infrastructure, PKI) 是以密碼學概念來設計的網路資訊安全技術與服務,其概念是現代資訊安全解決方案的重要基石。它可以貫穿於眾多不同的應用環境,如:數位簽章,秘密通訊與個人身份管理等,藉由其本身固有的特殊屬性,在系統中發揮主要或輔助的作用,來達到系統框架設計的目的。但也由於PKI本身的計算量需求十分龐大,在某些有限資源的應用環境下,雖然無法提供完整PKI所需的運算支援,卻同時存在資訊安全方面的需求,如秘密通訊與身份認證與管理等。本篇論文旨在針對不同的環境下,提出對應的輕量型的密碼協定與架構,以滿足該環境下的安全設計需求,在各自的不同領域展現其創新的應用。

首先,在分散式感測網路中,針對感測節點的低功率特性,本章提出了一個分散式金鑰分配模型,使感測網路中的節點可以在較低功耗的情況下交換金鑰,進而建立安全的資料交換與通訊。第三章則是一個PKI於現代網際網路的典型應用,數位智財權管理(Digital Rights Management, DRM)是保護多媒體內容免於受到未經授權播放和散佈的一種技術。本章提出的DRM模型結合輕量化PKI與智慧卡的特性,提供身份認證管理,可移植性和區域使用性等不同的功能,讓數位媒體的散佈能更具有系統管理性。在第四章中,PKI成為一種應用於無線車載網路環境中的基礎架構,在輕量化PKI的支援之下,本章提出一個更具效率的無線傳輸路由協定。

在電腦與網路安全的領域中,PKI的作用主要包含身份認證與資料保密兩方面,其概念是無所不在的。本篇論文探討在三種特殊的應用環境下,藉由輕量化密碼協定與PKI架構的支援進而提出嶄新的設計。

The concept of PKI is a cornerstone of modern security solutions. Its usage permeates many different applications where digital signatures, secure communications, and identity management play primary or auxiliary roles. It can be applied as a helper technology which assist other frameworks by lending its inherent attributes. This dissertation details three distinct applications of PKI concepts in three very different fields. Their respective contributions vary greatly, but they all owe their realization to the concepts of PKI.

First, in the area of Distributed Sensor Networks, a key distribution model is proposed which provides the feature of trusted communication while also giving the benefit of much lower energy use for the low powered sensor devices. The next application of PKI is in the framework of a distributed DRM model. In this model, PKI is employed to provide the benefits of identity management, authentication and revocation in combination with smart cards to additionally provide anonymity, portability, and regional limitations. The last topic is in the area of Vehicular Networking where PKI is part of the associated standard that supports and is supported by our proposed routing protocol.

The concepts of PKI are pervasive in the field of computer and network security. This dissertation show three examples in the areas of sensor networks, digital copyrights, and vehicular networks where PKI concepts are employed to provide some of the benefits that come with using PKI.

論文口試委員審定書 (中) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i
論文口試委員審定書 (英) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
摘要 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv
誌謝 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
1 Introduction and Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
2 Adaptive Key Pre-distribution Model for Distributed Sensor Networks . . . . . 3
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.1.1 Motivation and Main Contribution . . . . . . . . . . . . . . . . . 5
2.2 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2.1 The Eschenauer-Gligor (EG) Scheme . . . . . . . . . . . . . . . 6
2.2.2 Shamir's Threshold Scheme . . . . . . . . . . . . . . . . . . . . 7
2.3 The Adaptive Key Pre-distribution Model . . . . . . . . . . . . . . . . . 8
2.3.1 Phi Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.3.2 Adaptive Key Pre-distribution Model for Distributed Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.4 Example: Phi Function Based on Shamir's Threshold Scheme (PTS) . . . . 12
2.5 Performance Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.5.1 Qualitative Analysis of PTS . . . . . . . . . . . . . . . . . . . . 14
2.5.2 Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.5.3 Communication Overhead and Energy Consumption Analyses . . 17
2.5.4 Resilience against Node Capture . . . . . . . . . . . . . . . . . . 19
2.6 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3 A Trust Distributed DRM System Using Smart Cards . . . . . . . . . . . . . . 22
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.2.1 Anonymity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.2.2 Portability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.2.3 Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.2.4 Regional Restrictions . . . . . . . . . . . . . . . . . . . . . . . . 26
3.2.5 Semi-trusted Issue . . . . . . . . . . . . . . . . . . . . . . . . . 26
3.3 The Proposed Smart Card Based DRM Model . . . . . . . . . . . . . . . 27
3.3.1 Preliminaries and Assumptions . . . . . . . . . . . . . . . . . . . 27
3.3.2 Supporting Components . . . . . . . . . . . . . . . . . . . . . . 28
3.3.3 DRM Scheme Stakeholders . . . . . . . . . . . . . . . . . . . . 29
3.3.4 The Proposed DRM Process Flow . . . . . . . . . . . . . . . . . 31
3.4 Discussions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
3.4.1 Framework Capabilities and Contributions . . . . . . . . . . . . 38
3.4.2 Security Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 40
3.5 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
4 DORP: Density-Oriented Routing Protocol in Vehicular Ad Hoc Networks . . . 45
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
4.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
4.2.1 Greedy Perimeter Stateless Routing, GPSR . . . . . . . . . . . . 49
4.2.2 Vehicle-Assisted Data Delivery, VADD . . . . . . . . . . . . . . 49
4.2.3 Trajectory Based Data, TBD . . . . . . . . . . . . . . . . . . . . 51
4.3 DORP: Density-Oriented Routing Protocol . . . . . . . . . . . . . . . . 51
4.3.1 Scenario and Assumptions . . . . . . . . . . . . . . . . . . . . . 52
4.3.2 Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
4.3.3 DORP Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . 54
4.4 Performance Evaluations . . . . . . . . . . . . . . . . . . . . . . . . . . 62
4.4.1 Simulation Results . . . . . . . . . . . . . . . . . . . . . . . . . 64
4.4.2 Looping Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
4.5 Optimal Performance Modeling . . . . . . . . . . . . . . . . . . . . . . 68
4.6 Measuring Security in VANETs . . . . . . . . . . . . . . . . . . . . . . 70
4.7 Conclusions and Future Work . . . . . . . . . . . . . . . . . . . . . . . . 70
5 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
[1] K. S. J. Pister, J. M. Kahn, and B. E. Boser, ``Smart dust: Wireless networks of millimeter-scale sensor nodes,' tech. rep., Electronics Research Laboratory Research Summary, 1999.
[2] D. W. Carman, P. S. Kruus, and B. J. Matt, ``Constraints and approaches for distributed sensor network security,' Tech. Rep. 010, NAI Labs, The Security Research Division Network Associates, Inc., September 2000.
[3] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, ``System architecture directions for networked sensors,' SIGPLAN Notices, vol. 35, pp. 93--104, November 2000.
[4] R. L. Rivest, A. Shamir, and L. Adleman, ``A method for obtaining digital signatures and public-key cryptosystems,' Communications of the ACM, vol. 21, pp. 120--126, February 1978.
[5] M. Rabin, ``Digitalized signatures and public key functions as intractable as factoring,' Tech. Rep. TR-212, Laboratory for Computer Science, Cambridge, MA, USA, 1979.
[6] B. Neuman and T. Ts'o, ``Kerberos: an authentication service for computer networks,' IEEE Communications Magazine, vol. 32, pp. 33--38, September 1994.
[7] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, ``Spins: security protocols for sensor networks,' Wireless Networks, vol. 8, pp. 521--534, September 2002.
[8] J. Liu, A. Sangi, R. Du, and Q. Wu, ``Light weight network coding based key distribution scheme for manets,' in Network and System Security (J. Lopez, X. Huang, and R. Sandhu, eds.), vol. 7873 of Lecture Notes in Computer Science, pp. 521--534, Springer Berlin Heidelberg, 2013.
[9] Y. Yang, ``Broadcast encryption based non-interactive key distribution in manets,' Journal of Computer and System Sciences, 2013.
[10] L. Eschenauer and V. D. Gligor, ``A key-management scheme for distributed sensor networks,' in Proceedings of the 9th ACM conference on Computer and Communications Security, CCS '02, pp. 41--47, 2002.
[11] W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, ``A pairwise key predistribution scheme for wireless sensor networks,' ACM Transactions on Information and System Security (TISSEC), vol. 8, pp. 228--258, May 2005.
[12] D. Liu and P. Ning, ``Establishing pairwise keys in distributed sensor networks,' in Proceedings of the 10th ACM conference on Computer and communications security, pp. 52--61, ACM, 2003.
[13] H. Chan, A. Perrig, and D. Song, ``Random key predistribution schemes for sensor networks,' in Security and Privacy, 2003. Proceedings. 2003 Symposium on, pp. 197-- 213, May 2003.
[14] A. Shamir, ``How to share a secret,' Communications of the ACM, vol. 22, pp. 612--613, November 1979.
[15] D. Knuth, The Art of Computer Programming, vol 2: Seminumerical Algorithms. Addison-Wesley, 1981.
[16] C. Perkins, Ad Hoc Networking. Addison-Wesley, 2001.
[17] M. Tompa and H. Woll, ``How to share a secret with cheaters,' in Proceedings on Advances in cryptology---CRYPTO '86, pp. 261--265, Springer-Verlag, 1987.
[18] H.-Y. Lin and L. Harn, ``Fair reconstruction of a secret,' Information Processing Letters, vol. 55, no. 1, pp. 45--47, 1995.
[19] E. Brickell and D. Stinson, ``The detection of cheaters in threshold schemes,' in Advances in Cryptology —CRYPTO’88, vol. 403 of Lecture Notes in Computer Science, pp. 564--577, Springer Berlin / Heidelberg, 1990.
[20] W. Du, J. Deng, Y. Han, and P. Varshney, ``A key predistribution scheme for sensor networks using deployment knowledge,' IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 1, pp. 62--77, 2006.
[21] P. S. Graham, ``Intellectual preservation and electronic intellectual property,' in Proceedings of Technological Strategies for Protecting Intellectual Property in the Networked Multimedia Environment, Interactive Multimedia Association, January 1994.
[22] ``Webopedia: Digital rights management.' http://www.webopedia.com/TERM/D/DRM.html.
[23] ``Openmhp.' http://www.openmhp.org/.
[24] E. Diehl, ``A four-layer model for security of digital rights management,' in Proceedings of the 8th ACM workshop on Digital rights management, pp. 19--28, 2008.
[25] D. Kundur, C.-Y. Lin, B. Macq, and H. Yu, ``Special issue on enabling security technologies for digital rights management,' IEEE Proceedings, vol. 92, pp. 879--882, June 2004.
[26] T. C. Xie Lanchi and W. Xingjun, ``A device management and credit evaluation system in home network domain,' in Lecture Notes on Information Theory, vol. Vol. 1, pp. pp. 104--108, September 2013.
[27] M. Stamp, ``Digital rights management: The technology behind the hype,' Journal of Electronic Commerce Research, vol. 4, no. 3, 2003.
[28] ``Intertrust.' http://www.intertrust.com/.
[29] ``Ms-drm: License protocol specification.' http://msdn.microsoft.com/en-us/library/cc227964.aspx.
[30] ``Oma.' http://www.openmobilealliance.org/.
[31] H. PARK and J. KIM, ``Copyright protection for modifiable digital content based on distributed environment,' IEICE Transactions on Information and Systems, vol. E91.D, no. 5, pp. 1390--1397, 2008.
[32] C.-L. Chen, ``An all-in-one mobile drm system design,' International Journal of Innovative Computing, Information and Control, vol. 6, pp. 897--911, March 2010.
[33] D. Alessio and M. Joye, ``A simple construction for public-key encryption with revocable anonymity: the honest-sender case,' in Proceedings of the nineth ACM workshop on Digital rights management, pp. 11--16, 2009.
[34] J. B. Lotspiech, ``Broadcast encryption versus public key cryptography in content protection systems,' in Proceedings of the nineth ACM workshop on Digital rights management, pp. 39--46, 2009.
[35] Q. Liu, R. Safavi-Naini, and N. P. Sheppard, ``Digital rights management for content distribution,' in Proceedings of the Australasian information security workshop conference on ACSW frontiers, pp. 49--58, 2003.
[36] R. Song and L. Korba, ``Pay-tv system with strong privacy and non-repudiation protection,' IEEE Transactions on Consumer Electronics, vol. 49, pp. 408 -- 413, May
2003.
[37] S. Palavalli, U. S. Srinivas, and A. R. Pais, ``Identity based drm system with total anonymity and device flexibility using ibes,' in Proceedings of High Performance Computing & Simulation Conference, 2008.
[38] ``Project dream.' https://dream.dev.java.net/.
[39] C. Conrado, F. Kamperman, G. Schrijen, and W. Jonker, ``Privacy in an identitybased drm system,' in Proceedings of 14th International Workshop on Database and Expert Systems Applications, pp. 389 -- 395, September 2003.
[40] H.-M. Sun, C.-F. Hung, and C.-M. Chen, ``An improved digital rights management system based on smart cards,' in Proceedings of Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, pp. 308 --313, February 2007.
[41] K. Fujita and Y. Tsukada, ``An analysis of interoperability between licenses,' in Proceedings of the tenth annual ACM workshop on Digital rights management, pp. 61--72, 2010.
[42] P. A. Jamkhedkar, G. L. Heileman, and C. C. Lamb, ``An interoperable usage management framework,' in Proceedings of the 10th annual ACM workshop on Digital
rights management, pp. 73--88, 2010.
[43] B.-N. Park, J.-W. Kim, and W. Lee, ``Precept: A privacy-enhancing license management protocol for digital rights management,' in Proceedings of the 18th International Conference on Advanced Information Networking and Applications – Volume 2, p. 574, 2004.
[44] B.-N. Park, W. Lee, and J.-W. Kim, ``A license management protocol for protecting user privacy and digital contents in digital rights management systems,' IEICE Transactions on Information And Systems, vol. E88D, no. 8, pp. 1958--1965, 2005.
[45] J. Zhang, B. Li, L. Zhao, and S.-Q. Yang, ``License management scheme with anonymous trust for digital rights management,' in Proceedings of IEEE International
Conference on Multimedia and Expo, p. 4, July 2005.
[46] U. Greveler, ``Enforcing regional drm for multimedia broadcasts with and without trusted computing,' in Digital Rights Management. Technologies, Issues, Challenges and Systems (R. Safavi-Naini and M. Yung, eds.), vol. 3919 of Lecture Notes in Computer Science, pp. 332--340, Springer Berlin / Heidelberg, 2006.
[47] Y. Jeong, K. Yoon, and J. Ryou, ``A trusted key management scheme for digital rights management,' ETRI Journal, vol. 27, no. 1, pp. 114--117, 2005.
[48] J. Kim, Y. Jeong, K. Yoon, and J. Ryou, ``A trustworthy end-to-end key management scheme for digital rights management,' in Proceedings of the 14th annual ACM international conference on Multimedia, pp. 635--638, 2006.
[49] M.-K. Sun, C.-S. Laih, H.-Y. Yen, and J.-R. Kuo, ``A ticket based digital rights management model,' in Proceedings of IEEE 6th Consumer Communications and Networking Conference, pp. 1 --5, January 2009.
[50] W. Rosenblatt, W. Trippe, and S. Mooney, Digital Rights Management – Business and Technology. M & T Books, 2002.
[51] S. Subramanya and B. Yi, ``Digital rights management,' IEEE Potentials, vol. 25, pp. 31 -- 34, March-April 2006.
[52] R. J. Anderson, ``Ueps - a second generation electronic wallet,' in European Symposium on Research in Computer Security, pp. 411--418, 1992.
[53] W.-B. Lee, W.-J. Wu, and C.-Y. Chang, ``A portable drm scheme using smart cards,' Journal of Organizational Computing and Electronic Commerce, vol. 17, no. 3, pp. 247--258, 2007.
[54] A. Skordylis and N. Trigoni, ``Delay-bounded routing in vehicular ad-hoc networks,' in Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, pp. 341--350, 2008.
[55] M. Zhang and R. Wolff, ``Routing protocols for vehicular ad hoc networks in rural areas,' IEEE Communications Magazine, vol. 46, pp. 126 --131, November 2008.
[56] M. Uddin, H. Ahmadi, T. Abdelzaher, and R. Kravets, ``A low-energy, multi-copy inter-contact routing protocol for disaster response networks,' in Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1 --9, June 2009.
[57] ``Its standards advisory.' http://www.standards.its.dot.gov/Documents/advisories/dsrc_advisory.htm.
[58] G. Korkmaz, E. Ekici, F. Özgüner, and U. Özgüner, ``Urban multi-hop broadcast protocol for inter-vehicle communication systems,' in Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, VANET '04, pp. 76--85, ACM, 2004.
[59] D. Goodman, J. Borras, N. Mandayam, and R. Yates, ``Infostations: a new system model for data and messaging services,' in Proceedings of the IEEE 47th Vehicular Technology Conference, vol. 2, pp. 969 --973 vol.2, May 1997.
[60] R. Frenkiel, B. Badrinath, J. Borres, and R. Yates, ``The infostations challenge: balancing cost and ubiquity in delivering wireless data,' IEEE Personal Communications, vol. 7, pp. 66 --71, Apr. 2000.
[61] Q. Xu, T. Mak, J. Ko, and R. Sengupta, ``Vehicle-to-vehicle safety messaging in dsrc,' in Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, VANET '04, pp. 19--28, ACM, 2004.
[62] X. Yang, J. Liu, F. Zhao, and N. H. Vaidya, ``A vehicle-to-vehicle communication protocol for cooperative collision warning,' Mobile and Ubiquitous Systems, Annual International Conference on, vol. 0, pp. 114--123, 2004.
[63] J. Yin, T. ElBatt, G. Yeung, B. Ryu, S. Habermas, H. Krishnan, and T. Talty, ``Performance evaluation of safety applications over dsrc vehicular ad hoc networks,' in Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, pp. 1--9, 2004.
[64] Z. Li, C. Liu, and C. Chigan, ``On secure vanet-based ad dissemination with pragmatic cost and effect control,' IEEE Transactions on Intelligent Transportation Systems, vol. 14, no. 1, pp. 124--135, 2013.
[65] D. B. Johnson and D. A. Maltz, ``Dynamic source routing in ad hoc wireless networks,' in Mobile Computing (Imielinski and Korth, eds.), vol. 353, Kluwer Academic Publishers, 1996. [66] C. E. Perkins and E. M. Royer, ``Ad-hoc on-demand distance vector routing,' in Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '99), pp. 90 --100, February 1999.
[67] F. Li and Y. Wang, ``Routing in vehicular ad hoc networks: A survey,' IEEE Vehicular Technology Magazine, vol. 2, no. 2, pp. 12 --22, 2007.
[68] J. A. D. A. H. Fagg and B. N. Levine, ``Wearable computers as packet transport mechanisms in highly-partitioned ad-hoc networks,' in Proceedings of the 5th IEEE International Symposium on Wearable Computers, pp. 141 -- 148, Octorber 2001.
[69] J. Zhao and G. Cao, ``Vadd: Vehicle-assisted data delivery in vehicular ad hoc networks,' IEEE Transactions on Vehicular Technology, vol. 57, pp. 1910 --1922, May 2008.
[70] B. Karp and H. T. Kung, ``Gpsr: greedy perimeter stateless routing for wireless networks,' in MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 243--254, ACM, 2000.
[71] Q. Xu, R. Segupta, D. Jiang, and D. Chrysler, ``Design and analysis of highway safety communication protocol in 5.9 ghz dedicated short range communication spectrum,' in Proceedings of the the 57th IEEE Semiannual Vehicular Technology Conference, vol. 4, pp. 2451 -- 2455 vol.4, April 2003.
[72] V. Naumov and T. R. Gross, ``Connectivity-aware routing (car) in vehicular ad-hoc networks,' in The 26th IEEE International Conference on Computer Communications, pp. 1919 --1927, May 2007.
[73] J. Nzouonta, N. Rajgure, G. Wang, and C. Borcea, ``Vanet routing on city roads using real-time vehicular traffic information,' IEEE Transactions on Vehicular Technology, vol. 58, no. 7, pp. 3609 --3626, 2009.
[74] Q. Yang, A. Lim, S. Li, J. Fang, and P. Agrawal, ``Acar: Adaptive connectivity aware routing for vehicular ad hoc networks in city scenarios,' Mobile Networks and Applications, vol. 15, pp. 36--60, February 2010.
[75] J. P. Jeong, S. Guo, Y. J. Gu, T. He, and D. H. C. Du, ``Trajectory-based data forwarding for light-traffic vehicular ad hoc networks,' IEEE Transactions on Parallel and Distributed Systems, vol. 22, pp. 743--757, May 2011.
[76] K. C. Lee, U. Lee, and M. Gerla, Advances in Vehicular Ad-Hoc Networks: Developments and Challenges, ch. Survey of Routing Protocols in Vehicular Ad Hoc Networks, pp. 149--170. IGI Global, October 2009.
[77] C. Lochert, H. Hartenstein, J. Tian, H. Fuessler, D. Hermann, and M. Mauve, ``A routing strategy for vehicular ad hoc networks in city environments,' in In Proceedings of the IEEE Intelligent Vehicles Symposium, pp. 156--161, June 2003.
[78] W. Chen, R. K. Guha, T. J. Kwon, J. Lee, and Y.-Y. Hsu, ``A survey and challenges in routing and data dissemination in vehicular ad hoc networks,' Wireless Communications and Mobile Computing, vol. 11, no. 7, pp. 787--795, 2011.
[79] K. C. Lee, U. Lee, and M. Gerla, ``Geo-opportunistic routing for vehicular networks,' IEEE Communications Magazine, vol. 48, pp. 164 -- 170, May 2010.
[80] ``Tiger, tiger/line and tiger-related products.' http://www.census.gov/geo/www/tiger/.
[81] N. Wisitpongphan, F. Bai, P. Mudalige, and O. Tonguz, ``On the routing problem in disconnected vehicular ad-hoc networks,' in Proceedings of the 26th IEEE International Conference on Computer Communications, pp. 2291 --2295, May 2007.
[82] ``Move (mobility model generator for vehicular networks): Rapid generation of realistic simulation for vanet..' http://lens1.csie.ncku.edu.tw/MOVE/index.htm, 2007.
[83] K. D. and R. C., ``Sumo (simulation of urban mobility).' http://sumo.sourceforge.net/index.shtml, 2007.
[84] ``The network simulator - ns-2.' http://www.isi.edu/nsnam/ns/.
[85] C. Lochert, M. Mauve, H. Füßler, and H. Hartenstein, ``Geographic routing in city scenarios,' in Proceedings of the ACM SIGMOBILE Mobile Computing and Communications
Review, vol. 9, pp. 69--72, January 2005.
[86] F. Bohdanowicz, H. Dickel, and C. Steigner, ``Detection of routing loops,' in Proceedings of the 23rd international conference on Information Networking, ICOIN'09, (Piscataway, NJ, USA), pp. 230--234, IEEE Press, 2009.
[87] I. Azogu, M. Ferreira, and H. Liu, ``A security metric for vanet content delivery,' in IEEE Global Communications Conference (GLOBECOM), pp. 991--996, 2012.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊