跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.38) 您好!臺灣時間:2025/09/04 01:18
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:鍾昌浩
研究生(外文):Chang-Tao Chung
論文名稱:車載網路環境下之安全認證機制
論文名稱(外文):A Security Authentication Mechanism in Vehicular Ad hoc Networks
指導教授:廖鴻圖廖鴻圖引用關係郭明煌郭明煌引用關係
學位類別:碩士
校院名稱:世新大學
系所名稱:資訊管理學研究所(含碩專班)
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2010
畢業學年度:98
語文別:中文
論文頁數:70
中文關鍵詞:車載網路身分認證憑證
外文關鍵詞:Vehicular Ad hoc NetworkIdentity AuthenticationCertification
相關次數:
  • 被引用被引用:1
  • 點閱點閱:275
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
汽車是我們日常生活中使用的交通工具之一,加上智慧型車輛結合車載資訊服務業(Telematics Service)的作法,更是在整個汽車市場中佔據非常重要的地位。但是,在車載網路環境中,車載資訊服務業本身提供相當多元的服務,若是沒有提供一個安全的認證機制,在身分認證與資訊傳遞的過程中,將會面臨許多安全性的威脅與惡意的攻擊。
本研究為了確保在車載網路環境下身分認證與資訊傳遞的過程中的安全,藉由事先註冊與登入認證的過程,以減輕Certification Authority 運作時的負擔,同時對過去學者所提出的認證機制進行改善,提出一個適合在車載網路下具有一定的安全性的認證機制,並且防止相關的網路攻擊。
Motor is one of transportation that be used in our daily life. Especially, it occupied the important position in whole vehicle market, which intelligent vehicle combines with the service provider of car-mounted information (Telematics Service). However, Provider offers a lot of different service in Vehicular Ad hoc Network. When the information is passed in process, if it hasn’t ever provided the safe authentication at same time, would face the threats of a lot of securities and hostile attack.
In this paper, in order that guarantee the security for identity authentication and process of the information transmission under the environment of the Vehicular Ad hoc Network. To reduce the Certification Authority's loading by pre-registering and identity authentication, and improved the past authentication mechanism at the same time. We proposed a suitable authentication mechanism with certain security to prevent relevant attack under the Vehicular Ad hoc Network.
目錄
摘要 I
Abstract II
目錄 III
圖目錄 V
表目錄 VI
第一章 緒 論 1
1.1研究背景 1
1.2研究動機 1
1.3研究目的 2
1.4研究範圍 2
1.5論文架構 3
第二章 文獻探討 4
2.1 ECDSA機制 4
2.2 Aslam等學者的認證機制 8
2.3 Kim等學者的認證機制 14
2.4 Teo等學者的認證機制 21
2.5 Wang等學者的認證機制 26
2.6小結 32
第三章 相關理論與技術 34
3.1 IEEE 802.11p 34
3.2車載網路下認證機制之安全要求與網路相關的攻擊 35
3.3對稱式金鑰密碼系統 37
3.4非對稱式金鑰密碼系統 38
3.5雜湊函數 39
3.6互斥或運算 39
第四章 本文的認證機制 41
4.1系統簡介 41
4.2系統環境說明 41
4.3系統成員說明 42
4.4系統運作說明 43
4.5小結 49
第五章 分析與討論 50
5.1安全性分析 50
5.2功能性分析 52
5.3效能性分析 53
5.4小結 55
第六章 結論及未來研究 56
6.1結論 56
6.2未來研究 57
參考文獻 59

圖目錄
圖2-1 ECDSA機制網路環境 4
圖2-2 ECDSA機制運作過程學者 6
圖2-3 傳統的CA認證中心環境架構說明 8
圖2-4 Aslam等學者的認證機制環境架構說明 9
圖2-5 車輛A向CA註冊過程 10
圖2-6 車輛OBU向Server相互認證過程 12
圖2-7 Kim等學者的認證機制環境架構說明 15
圖2-8 車輛A向AAA Server相互認證過程 19
圖2-9 Teo等學者的認證機制環境架構說明 21
圖2-10 車輛A向AS相互認證過程 23
圖2-11 Wang等學者的認證機制環境架構說明 27
圖2-12 車輛A向路邊基礎設施RSU相互認證過程 28
圖2-13 車輛A向路邊基礎設施RSU廢止認證過程 30
圖3-1 IEEE 802.11p 兩種的連線型態 34
圖3-2 對稱式金鑰密碼系統 37
圖3-3 非對稱式金鑰密碼系統 38
圖4-1 本研究之系統架構圖 42
圖4-2 車輛OBU向CA註冊流程圖 44
圖4-3 車輛OBU向CA登入流程圖 45
圖4-4 A車輛向CA取得B車輛臨時憑證流程圖 46
圖4-5 A車輛與B車輛相互認證流程圖 47
圖4-6 A車輛與B車輛間傳遞資料流程圖 48

表目錄
表2-1 ECDSA機制符號定義表 5
表2-2 Aslam等學者的認證機制符號定義表 10
表2-3 Kim等學者的認證機制符號定義表 16
表2-4 Teo等學者的認證機制符號定義表 22
表2-5 Wang等學者的認證機制符號定義表 27
表2-6 各種認證機制所能避免的安全問題 32
表3-1 互斥或運算真值表 40
表4-1 本研究的認證機制符號定義表 43
表5-1 各學者認證機制所能避免的安全性攻擊比較表 52
表5-2 各學者認證機制功能性比較表 53
表5-3 各學者認證機制運算時間的複雜度比較表 54
[1]Baber Aslam and Cliff Zou, “Distributed Certificate and Application Architecture for VANETs,” Military Communications Conference, pp. 1-7, 2009.
[2]Barzegar M., Mozayani N. and Fathy M., “Secure Safety Messages Broadcasting in Vehicular Network,” International Conference on Advanced Information Networking and Applications Workshops, pp. 1150-1160, 2009.
[3]Caballero-Gil P., Caballero-Gil C., Molina-Gil J. and Hernandez-Goya C., “Flexible Authentication in Vehicular Ad Hoc Networks,” the 15th Asia-Pacific Conference on Communication, pp. 876-879, 2009.
[4]Caballero-Gil P. and Hernandez-Goya C., “Designing Communication-oriented Node Authentication for VANETs,” 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, pp. 13-16, 2009.
[5]Christian Tchepnda, Hassnaa Moustafa, Houda Labiod and Gilles Bourdon, “A Layer-2 Multi-Hop Authentication and Credential Delivery Scheme for Vehicular Networks,” Global Telecommunications Conference, pp. 1-6, 2008.
[6]Christian Tchepnda, Hassnaa Moustafa, Houda Labiod and Gilles Bourdon, “Prioritizing and Enhancing Vehicular Networks Authentication Process Using DSRC Channels Diversity,” IEEE International Conference on Wireless and Mobile Computing, pp. 1-6, 2008.
[7]Etienne Coronado and Soumaya Cherkaoui, “An AAA Study for Service Provisioning in Vehicular Networks,” IEEE Conference on Local Computer Networks, pp. 669-676, 2007.
[8]Haojin Zhu, Rongxing Lu, Xuemin Shen and Xiaodong Lin, “Security in Service-oriented Vehicular Networks,” IEEE Wireless Communications Magazine, pp. 16-22, 2009.
[9]Jiang D. and Delgrossi L., “IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments,” IEEE Vehicular Technology Conference, pp. 2036-2040, 2008.
[10]Jian Wang and Nan Jiang, “A Simple and Efficient Security Scheme for Vehicular Ad Hoc Networks,” IEEE International Conference on Network Infrastructure and Digital Content, pp. 591-595, 2009.
[11]Jingliang Zhang, Lizhen Ma, Wanli Su and Yumin Wang, “Privacy-Preserving Authentication Based on Short Group Signature in Vehicular Networks,” The First International Symposium on Data, Privacy, and E-Commerce, pp. 138-142, 2007.
[12]Joseph Chee Ming Teo, Lek Heng Ngoh and Huaqun Guo, “An Anonymous DoS-Resistant Password-Based Authentication, Key Exchange and Pseudonym Delivery Protocol for Vehicular Networks,” International Conference on Advanced Information Networking and Applications, pp. 675-682, 2009.
[13]Jun Liu, Xiaoyan Hong, Qunwei Zheng and Lei Tang, “Privacy-Preserving Quick Authentication in Fast Roaming Networks,” Proceedings of IEEE Conference on Local Computer Networks, pp. 975-982, 2006.
[14]Kewei Sha, Yong Xi, Loren Schwiebert and Tao Zhang, “Adaptive Privacy-Preserving Authentication in Vehicular Networks,” First International Conference on Communications and Networking, pp. 25-27, 2006.
[15]Konstantinos Papapanagiotou, Giannis F. Marias and Panagiotis Georgiadis, “A Certificate Validation Protocol for VANETs,” IEEE Globecom Conference, pp. 1-9, 2007.
[16]Lei Zhang, Qianhong Wu, Solanas, A.and Domingo-Ferrer, J., “A Scalable Robust Authentication Protocol for Secure Vehicular Communications,” IEEE Transactions on Vehicular Technology, pp. 1606-1607, 2009.
[17]Nai-Wei Lo and Hsiao-Chien Tsa, “Illusion Attack on VANET Applications - A Message Plausibility Problem,” IEEE Globecom Conference, pp. 1-8, 2007.
[18]Shen Wan, Jian Tang and Wolff, R.S, “Reliable Routing for Roadside to Vehicle Communications in Rural Areas,” IEEE International Conference on Communications, pp. 3017-21, 2008.
[19]Song-Hee Lee, Jin-Young Choi, Yiu and Nam-Sup Park, “FMIPv6 based Secure Binding Update Authentication in Wireless Vehicular Networks,” 4th International Symposium on Wireless Pervasive Computing, pp. 11-13, 2009.
[20]S. S. Manvi, M. S. Kakkasageri and D. G. Adiga, “Message Authentication in Vehicular Ad Hoc Networks: ECDSA Based Approach,” International Conference on Future Computer and Communication, pp. 16-20, 2009.
[21]Sung Hoon Kim, Bum Han Kim, Young Ki Kim and Dong Hoon Lee, “Auditable and Privacy-Preserving Authentication in Vehicular Networks,” The Second International Conference on Mobile Ubiquitous Computing, pp. 19-24 2008.
[22]Tat Wing Chim, Yiu, S.M, Yiu, Hui, L.C.K. and Li, V.O.K., “Security and Privacy Issues for Inter-vehicle Communications in VANETs,” 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops, pp. 22-26, 2009.
[23]Verma, M. and Dijiang Huang, “SeGCom: Secure Group Communication in VANETs,” 6th IEEE Communications and Networking Conference, pp. 1-5, 2009.
[24]Xiaoyan Sun,Yuanlu Bao and Wolff, R.S, “Performance Analysis of Inter-vehicle Communications in Multilane Traffic Streams,” 22nd International Conference on Advanced Information Networking and Applications Workshops, pp. 1-6, 2009.
[25]Yi Wang, Ahmed, A., Krishnamachari, B. and Psounis, K., “IEEE 802.11p Performance Evaluation and Protocol Enhancement,” IEEE International Conference on Vehicular Electronics and Safety, pp. 317-322, 2008.
[26]王旭正、楊中皇、雷欽隆、ICCL資訊密碼暨建構實驗室,「電腦與網路安全實務」,博碩文化股份有限公司,2009年。
[27]杜建男,「An Efficient Data Dissemination Model for VANETs」,中央大學通訊工程學系碩士論文,2007年。
[28]林羿妏,「世界第一簡單密碼學」,世茂出版有限公司,2009年。
[29]周淑美,「車載網路資訊安全應用之探討」,東華大學資訊工程學系碩士論文,2008年。
[30]陳柏全、柯亮宇,「智慧安全車輛與車載無線通訊國際發展趨勢簡介」,財團法人車輛研究測試中心,2008年。
[31]柯亮宇、陳柏全,「車間無線通訊標準研究」,財團法人車輛研究測試中心,2008年。
[32]莊耘坤,「可調式家用網路身分認證方法之研究」,世新大學資訊管理學系碩士論文,2008年。
[33]粘添壽,「資訊與網路安全技術」,旗標出版股份有限公司,2009年。
[34]黃祥哲、吳惠麟、盧長青、張峰誠、羅浩、潘正祥,「資訊安全原理與實驗」,碁峰資訊股份有限公司,2008年。
[35]賴榮樞,「密碼學與網路安全」,台灣培生教育出版股份有限公司,2007年。
[36]Exclusive or - Wikipedia, the Free Encyclopedia,網址:http://en.wikipedia.org/wiki/Exclusive_or
[37]IEEE 1609 - Family of Standards for Wireless Access in Vehicular Environments (WAVE),網址:http://www.standards.its.dot.gov/fact_sheet.asp?f=80
[38]IEEE 802.11p - Wikipedia, the Free Encyclopedia,網址:http://en.wikipedia.org/wiki/IEEE_802.11p
[39]RFC 2631 – Diffie–Hellman Key Agreement Method ,網址:http://tools.ietf.org/html/rfc2631
[40]Status of Project IEEE 802.11 Task Group p,網址:http://grouper.ieee.org/groups/802/11/Reports/tgp_update.htm
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top