跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.17) 您好!臺灣時間:2025/09/03 01:15
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:黃昱讓
研究生(外文):Yu Jang Huang
論文名稱:用於車載行動通訊網路的分散式聲譽管理系統
論文名稱(外文):Distributed Reputation Management System for VANETs
指導教授:李春良
指導教授(外文):C. L. Lee
學位類別:碩士
校院名稱:長庚大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2013
畢業學年度:101
論文頁數:71
中文關鍵詞:分散式車載行動網路聲譽式
外文關鍵詞:DistributedVANETReputation
相關次數:
  • 被引用被引用:0
  • 點閱點閱:351
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
  近年來各國政府與各車廠都積極投入研發能讓車輛更安全和有效率的交通運輸系統,智慧型運輸系統的應用在多個國家被相繼提出,並開始改變交通運輸系統原有的樣貌。ITS (Intelligent Transport Systems) 是應用電子、通信、資訊與感測等技術用以整合人、路、車的管理策略。提供即時資訊以增進運輸系統的安全、效率及舒適性,同時也減少交通對環境的衝擊。其中藉由無線通訊技術讓車輛實現車與車之間和車與路邊交換單元之間通訊、交換資料
所建立的網路,稱為車載隨意網路(Vehicular Ad Hoc Network,簡稱VANET)。
  當VANET 用於傳送交通資訊的資料遭到惡意攻擊,這項新技術可能會引發新的威脅,因此不良行為的預防對於研究者來說將是一個具有挑戰性的問題。目前VANET 是藉由路側單元傳輸,使用集中式的方式來處理,後端伺服器進行資訊收集、處理與判斷後,再由後端伺服器將有問題的車輛進行隔離或限制。
  但是集中式處理的穩定性與容錯性不佳的問題。此外,在基礎建設不足夠的鄉間、山區或是經濟能力尚不足以負擔的國家是難以實現。因此我們提出一個用於車載行動通訊網路的分散式聲譽系統,藉由車輛節點的傳輸行為計算出車輛節點的聲譽值,藉以偵測出車輛節點的攻擊行為。實驗結果顯示我們提出的方法最高能提高20% 的封包遞送成功率,就算是在不同傳輸速率與車輛密度下也能夠保持有穩定的封包遞送成功率表現。
  In recent years, governments and automobile manufacturers are actively engaged in research to make vehicles safer and more efficient in orders of transport system. Applications of Intelligent Transportation Systems (ITS) have been proposed in a number of countries. The modification for the original transport system has started its appearance in current development. ITS applies to the application of electronics, communications, information and sensing technology, to the integrate people, road and vehicle management strategies. ITS provides real time information to improve the transport system safety, efficiency and comfort of transportation. It also reduces the impact of transport according to the environment. With wireless communication technology, vehicle can exchange information between vehicles and roadside units. The exchanged information forms a network, called VANETs (Vehicular Ad Hoc Network, referred VANET).
  When VANET transmit traffic information to surrounding nodes, the information might be tampered by malicious nodes. Thus, this new threats need a supporting mechanism to prevent this misconduct. In order to provide a centralized methodology, VANET needs to transmit information to surrounding roadside units. After acquiring these information, the roadside unit forwards these information to a back-end server to handle information collection, process and judgment of isolation or restrictions.
  However, a centralized processing mechanism lacks stability and robustness. In addition to these drawbacks, in the case of insufficient infrastructure in countryside, mountain or unaffordable national economic capacity is difficult to provide such mechanism. Therefore, we propose a mobile communication network for vehicle distributed reputation system. Each vehicle node needs to compute the reputation value of its surrounding nodes. A threshold is assigned with the information provided from a network history table. This threshold is compared to the reputation value to identify whether the vehicle node is a threat. Experimental results show that our proposed method can improve the 20% maximum packet delivery success rate even in different transmission rates, while vehicle density is also able to maintain a steady success rate of packet delivery performance.
目錄
指導教授推薦書
口試委員會審定書
授權書. . . . . . . . . . . . iii
誌謝. . . . . . . . . . . . iv
中文摘要. . . . . . . . . . . . v
英文摘要. . . . . . . . . . . . vi
目錄. . . . . . . . . . . . viii
表目錄. . . . . . . . . . . . x
圖目錄. . . . . . . . . . . . xi
1 序論. . . . . . . . . . . . 1
1.1 相關背景. . . . . . . . . . . . 1
1.2 研究動機. . . . . . . . . . . . 2
1.3 研究目的. . . . . . . . . . . . 3
1.4 論文架構. . . . . . . . . . . . 5
2 相關研究. . . . . . . . . . . . 7
2.1 用於VANET 防止不良行為演算法. . . . . . . . . . . . 7
2.1.1 SLEP and PRP. . . . . . . . . . . . 7
2.1.2 LEAVE. . . . . . . . . . . . 8
2.1.3 Data-Centric Trust Establishment. . . . . . . . . . . . 8
2.2 基於獎賞機制的演算法. . . . . . . . . . . . 8
2.2.1 Nuglets. . . . . . . . . . . . 9
2.2.2 Sprite. . . . . . . . . . . . 10
2.3 基於名譽機制的演算法. . . . . . . . . . . . 11
2.3.1 Watchdog and Pathrater. . . . . . . . . . . . 11
2.3.2 CONFIDANT. . . . . . . . . . . . 11
2.3.3 CORE. . . . . . . . . . . . 13
2.3.4 T-GPSR. . . . . . . . . . . . 13
2.4 GPSR 路由演算法. . . . . . . . . . . . 14
3 用於車載行動通訊網路的分散式聲譽管理系統. . . . . . . . . . . . 15
3.1 封包監聽. . . . . . . . . . . . 15
3.2 發送封包路由選擇. . . . . . . . . . . . 17
3.3 事件加入與聲譽的計算. . . . . . . . . . . . 18
4 模擬實驗與結果分析. . . . . . . . . . . . 24
4.1 模擬環境與參數設定. . . . . . . . . . . . 24
4.1.1 模擬環境. . . . . . . . . . . . 24
4.1.2 車輛移動模型. . . . . . . . . . . . 24
4.1.3 量化公式. . . . . . . . . . . . 24
4.2 實驗結果與分析. . . . . . . . . . . . 30
4.2.1 方法比較. . . . . . . . . . . . 30
4.2.2 參數分析. . . . . . . . . . . . 42
5 結論與未來研究. . . . . . . . . . . . 55
參考文獻. . . . . . . . . . . . 56
表目錄
4.1 模擬實驗參數. . . . . . . . . . . . 25
4.2 Overhead. . . . . . . . . . . . 42
圖目錄
1.1 車輛通訊示意圖. . . . . . . . . . . . 2
1.2 警急事故發生. . . . . . . . . . . . 4
2.1 Nuglets 運作方式. . . . . . . . . . . . 10
2.2 Watchdog 發送並監聽. . . . . . . . . . . . 12
2.3 Watchdog 轉發成功. . . . . . . . . . . . 12
3.1 監聽列表的維持. . . . . . . . . . . . 16
3.2 封包監聽. . . . . . . . . . . . 17
3.3 警告封包發送. . . . . . . . . . . . 18
3.4 警告封包接收. . . . . . . . . . . . 19
3.5 發送封包路由選擇. . . . . . . . . . . . 21
3.6 事件加入與聲譽的計算. . . . . . . . . . . . 22
3.7 RT(r)value 計算. . . . . . . . . . . . 23
3.8 事件個數與Weight. . . . . . . . . . . . 23
4.1 模擬實驗地圖. . . . . . . . . . . . 26
4.2 不同不良車輛節點比率效率. . . . . . . . . . . . 32
4.3 不同不良車輛節點比率鄰居辨識量. . . . . . . . . . . . 33
4.4 沒有不良車輛節點在不同傳輸率的PDR. . . . . . . . . . . . 34
4.5 沒有不良車輛節點在不同傳輸率的封包丟棄. . . . . . . . . . . . 35
4.6 50% 不良車輛節點在不同傳輸率的PDR 與影響主因. . . . . . . . . . . . 36
4.7 50% 不良車輛節點在不同傳輸率的封包丟棄. . . . . . . . . . . . 37
4.8 沒有不良車輛節點在不同車輛密度的PDR. . . . . . . . . . . . 38
4.9 沒有不良車輛節點在不同車輛密度的封包丟棄. . . . . . . . . . . . 39
4.10 50% 不良車輛節點在不同車輛密度的PDR 與影響主因. . . . . . . . . . . . 40
4.11 50% 不良車輛節點在不同車輛密度的封包丟棄. . . . . . . . . . . . 41
4.12 沒有不良車輛時辨識鄰居速度. . . . . . . . . . . . 43
4.13 50% 不良車輛時辨識鄰居速度. . . . . . . . . . . . 44
4.14 每個封包的平均hop 數. . . . . . . . . . . . 45
4.15 不同好的門檻值PDR 表現. . . . . . . . . . . . 46
4.16 不同好的門檻值在不同連線距離平均跳數. . . . . . . . . . . . 47
4.17 不同Event Length 的PDR. . . . . . . . . . . . 48
4.18 不同Event Length 參數的辨識數. . . . . . . . . . . . 49
4.19 不同最大警告封包接收範圍參數. . . . . . . . . . . . 50
4.20 Weight=0.1 和不良行為門檻值參數. . . . . . . . . . . . 51
4.21 Weight=0.2 和不良行為門檻值參數. . . . . . . . . . . . 52
4.22 Weight=0.3 和不良行為門檻值參數. . . . . . . . . . . . 52
4.23 不同Send Alert Message Threshold 參數. . . . . . . . . . . . 54
[1] K. Dar, M. Bakhouya, J. Gaber, M. Wack, and P. Lorenz, “Wireless Communication Technologies for ITS Applications,” IEEE Communications Magazine, Vol. 48, No.5, pp.156-162, 2010.
[2] ITS EUROPE, http://www.ertico.com.
[3] ITS AMERICA, http://www.itsa.org.
[4] ITS JAPAN, http://www.its-jp.org.
[5] Intelligent Transportation Society of TAIWAN, http:// www.itstaiwan.org.tw/C/Home.aspx.
[6] V. Psaraki, I. Pagoni, and A. Schafer, “Techno-economic Assessment of the Potential of Intelligent Transport Systems to Reduce CO2 Emissions,” IET Intelligent Transport Systems, Vol. 6, No. 4, pp. 355-363, 2012.
[7] Auto Mart, http://blog.automart.co.za/2013/03/27/embrace-car-2-car-communication.
[8] Paul Resnick, Richard Zeckhauser, Eric Friedman, and Ko Kuwabara, “Reputation Systems,” Magazine on Communications of the ACM, Vol. 43, No. 12, pp. 45-48, 2000.
[9] Li Qin, A. Malip, K.M. Martin, Ng Siaw-Lynn, and Zhang Jie, “A Reputation-Based Announcement Scheme for VANETs,” IEEE Transactions on Vehicular Technology, Vol. 61, No.9, PP. 4095-4108, 2012.
[10] Kim Chil-Hwa, and Bae Ihn-Han, “A Misbehavior-Based Reputation Management System for VANETs,” Embedded and Multimedia Computing Technology and Service, pp. 441-450, 2012.
[11] Mármol Félix Gómez, and Pérez Gregorio Martínez, “TRIP, A Trust and Reputation Infrastructure-based Proposal for vehicular Ad Hoc Networks,” Journal of Network and Computer Applications, Vol. 35, No. 3, pp. 934-941, 2012.
[12] ebay, http://www.ebay.com.
[13] Yahoo, http://tw.bid.yahoo.com.
[14] Xuejun Zhuo, Jianguo Hao, Duo Liu, and Yiqi Dai, “Removal of Misbehaving Insiders in Anonymous VANETs,” 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems, pp. 106-115, 2009.
[15] M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux, “Eviction of Misbehaving and Faulty Nodes in Vehicular Networks,”IEEE Journal on Selected Areas in Communications, Vol. 25, No. 8, pp. 1557-1568, 2007.
[16] M. Raya, P. Papadimitratos, V.D. Gligor, and J.-P. Hubaux, “On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks,”27th IEEE Conference on Computer Communications, pp. 1238-1246, 2008.
[17] B. Ostermaier, F. Dotzer, and M. Strassberger, “Enhancing the Security of Local DangerWarnings in VANETs - A Simulative Analysis of Voting Schemes,” The Second International Conference on Availability, Reliability and Security, pp. 422-431, 2007.
[18] L. Buttyan, and J. Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,” ACM/Kluwer Mobile Networks and Applications, Vol. 8, No. 5, pp. 579-592, 2003.
[19] S. Zhong, J. Chen, and Y. R. Yang, “Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad Hoc Networks,” 22th Joint Conference of the IEEE Computer and Communications, Vol. 3, pp. 1987-1997, 2003.
[20] S. Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” 6th Annual International Conference on Mobile Computing and Networking, pp. 255-265, 2000.
[21] S. Buchegger, and J.Y. Le Boudec, “Performance Analysis of the CONFIDANT Protocol,” 3th ACM international symposium on Mobile ad hoc networking and computing, pp. 226-236, 2002.
[22] P. Michiardi, and R. Molva, “CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks,”6th Joint Working Conference on Communications and Multimedia Security, Vol. 100, pp. 107-121, 2002.
[23] A.A. Pirzada, and C. McDonald, “Trusted Greedy Perimeter Stateless Routing,” 15th IEEE International Conference on Networks, pp. 206-211, 2007.
[24] B. Karp, and H.T. Kung, “GPSR:Greedy Perimeter Stateless Routing for Wireless Networks,” 6th Annual International Conference on Mobile Computing and Networking, pp. 243-254, 2000.
[25] James Bernsen, and D. Manivannan, “Unicast Routing Protocols for Vehicular Ad Hoc Networks: A Critical Comparison and Classification,”Pervasive and Mobile Computing, Vol. 5, No. 1, pp. 1-18, 2009.
[26] S. Ruj, M.A. Cavenaghi, Huang Zhen, A. Nayak, and I. Stojmenovic, “On Data-Centric Misbehavior Detection in VANETs,” IEEE Vehicular Technology Conference, pp. 1-5, 2011.
[27] The Network Simulator, http://http://www.isi.edu/nsnam/ns/.
[28] VanetMobiSim, http://vanet.eurecom.fr/.
[29] A. Rodriguez-Mayol, and J. Gozalvez, “On the Implementation Feasibility of Reputation Techniques for Cooperative Mobile Ad-Hoc Networks,” European Wireless Conference, pp. 616-623, 2010.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top