跳到主要內容

臺灣博碩士論文加值系統

(216.73.217.165) 您好!臺灣時間:2026/05/20 07:12
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:李奕汎
研究生(外文):LEE, Yi-Fan
論文名稱:大型及移動式網路防禦機制之研究
論文名稱(外文):Defense Mechanism Against Malicious and Selective Forwarding Attacks in Large & Mobile Wireless Networks
指導教授:莊詠婷莊詠婷引用關係
指導教授(外文):Chuang, Yung-Ting
口試委員:莊詠婷李珮如黃正魁
口試委員(外文):Chuang, Yung-TingLee, Pei-JuHuang, Cheng-kui
口試日期:2017-09-27
學位類別:碩士
校院名稱:國立中正大學
系所名稱:資訊管理系研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2017
畢業學年度:106
語文別:中文
論文頁數:60
中文關鍵詞:大規模移動式無線網路分散式系統自我適應機制
外文關鍵詞:Large & Mobile Wireless NetworksDistribution Systemself-adaptation mechanism
相關次數:
  • 被引用被引用:0
  • 點閱點閱:389
  • 評分評分:
  • 下載下載:1
  • 收藏至我的研究室書目清單書目收藏:0
隨著時代的演變,行動裝置的興起,無線網路架構儼然是一種新的趨勢,但無線網路最為人所詬病的舊是安全性以及穩定性的問題,所以本研究針對大規模分散式的無線網路提出一種新的演算法,能夠針對以下狀況給予因應:1)節點數量且網路範圍廣泛,本研究針對所能夠支援的網路節點約為10萬個;2)可以針對網路流動率高的情況,在本研究中我們會針對流失率高的網站提出因應措施,讓網路仍舊保持高搜尋成功率;3)針對網路的惡意攻擊,我們也提出因應措施,即使網路在不安全的情況下仍舊保持高搜尋成功率;4)自我適應機制,本研究的演算法會針對網路情況的變化而改變我們的行為,進而有效的降低網路運行成本,兼具高效能與低成本的特性。
分散式的無線網路最容易產生的問題就是安全性,本研究針對此部分提出一個解決方案,首先我們修正了許多過往研究所提出的網路模型,整理出一個適合大規模無線網路情況的網路運行模式,接著針對網路的攻擊的部分,我們透過對每次搜尋結果所產生得資訊,與我們預先分析出來的預期結果進行分析,比對出目前網路的情況,根據該情況去調整搜尋發送的數量,來維持網路的高搜尋成功率。
本研究也將所提出的演算法與其他演算法進行比對,在相同的系統環境下,我們模擬具有龐大數量節點的大規模的無線網路,並且針對其耗費的成本以及搜尋成功率進行比較以及研究,結果證實,我們的演算法在耗費成本以及整體效能的平衡的表現最為優秀。

In this study, we want to propose a new algorithm for large-scale distributed wireless networks, which can be applied to the following conditions: 1) The number of nodes and the wide range of networks, this study is based on supporting the network node is up to 100,000 ; 2) In the high rate of network flow, we will respond to the high rate in this study, so that the network will still maintain a high match probability; 3) We also responded to the malicious attacks on the network, even if the network is still maintain a high match probability; 4) self-adaptation mechanism, our algorithm will change behavior when the network changes, and thus effectively reducing the network operating costs, both high-performance and low-cost characteristics.

The most likely problem with Large & Mobile Wireless Network is security. This study presents a solution to this. First, we have revised many of the network models proposed by the previous research to address a situation suitable for large-scale wireless networks. Then, we have modified many of the networks proposed by our past studies. We sort out a suitable scenario for large-scale wireless network of the network mode to operate properly. Then for the network attacks, we have generated information on each search result. After analyzing this information with our pre-determined results, we compared this information with the current network situation, and then adjust the number of request to maintain the high match probability.

This study also compares the proposed algorithm with other algorithms. In the same system environment, we simulate a large-scale wireless network with a large number of nodes, and then compare distribution cost and the search cost and research. The results confirm that our algorithm requires low costs but can still achieve high match probability.

第一章 緒論 1
1.1 研究背景與動機 1
1.2 研究問題與目的 5
1.3 預期成果與貢獻 6
第二章 文獻探討 7
2.1 對等式網路中的分散式搜尋(Distribution search in Peer-to-Peer) 7
2.2 無線感測網路(WSN)和隨建即連網路(MANET) 10
2.3 移動指數加權平均(EWMA)和卡方統計(Chi-Squared Statistic) 12
2.4 防止惡意攻擊 13
2.5 防止選擇性轉發攻擊 14
2.6 區域敏感雜湊函數 15
第三章 研究方法 16
3.1 MSLM系統流程 17
3.2 節點類型 19
3.3 加入區域 21
3.4 離開區域 20
3.5 發佈詮譯資料 21
3.6 發佈查詢訊息 25
3.7 中繼節點 27
3.8 分割文檔(Shingling of Documents) 28
3.9 杰卡德相似度(Jaccard Similarity)與k-grams 29
3.10 最小化雜湊(Minhashing) 29
3.11 區域敏感雜湊函數(Locality Sensitive Hash ,LSH) 32
3.12 以概率密度函數(Probability Density Function)進行分析 33
3.13 訊息轉發的配對率(Match Probabilities With Message Forwarding) 34
3.14 指數加權移動平均法(Exponential Weighted Moving Average Method) 36
3.15 正規化(Normalization) 37
3.16 修正卡方統計(Modified Chi-Square) 38
第四章 實驗結果與分析 39
4.1 實驗環境 39
4.2 實驗變數 40
4.3 評估指標 42
4.4 實驗結果 43
4.4.1 搜尋成功率 43
4.4.2 訊息成本 46
4.4.3 研究實驗總結 48
第五章 研究結論與未來方向 49
5.1 研究結論 49
5.2 未來方向與建議 50
參考文獻 51

Alajmi, N., & Elleithy, K. (2015). Multi-Layer Approach for the Detection of Selective Forwarding Attacks. Sensors, 15(11), 29332-29345.
Andoni, A., & Indyk, P. (2006). Near-optimal hashing algorithms for near neighbor problem in high dimensions. Paper presented at the Proceedings of the Symposium on the Foundations of Computer Science.
Belen, R. (2009). Detecting disguised missing data. MIDDLE EAST TECHNICAL UNIVERSITY.
Bianchi, S., Felber, P., & Gradinariu, M. (2007). Content-based publish/subscribe using distributed r-trees. Paper presented at the European Conference on Parallel Processing.
Bilal, D. (2012). Ranking, relevance judgment, and precision of information retrieval on children's queries: Evaluation of Google, Yahoo!, Bing, Yahoo! Kids, and ask Kids. Journal of the Association for Information Science and Technology, 63(9), 1879-1896.
Broder, A. Z., Charikar, M., Frieze, A. M., & Mitzenmacher, M. (1998). Min-wise independent permutations. Paper presented at the Proceedings of the thirtieth annual ACM symposium on Theory of computing.
Brownlee, K. A., & Brownlee, K. A. (1965). Statistical theory and methodology in science and engineering (Vol. 150): Wiley New York.
Busse, M., Haenselmann, T., & Effelsberg, W. (2006). Energy-efficient forwarding schemes for wireless sensor networks. Paper presented at the Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks.
Chen, X., Shen, J., Groves, T., & Wu, J. (2009). Probability delegation forwarding in delay tolerant networks. Paper presented at the Computer Communications and Networks, 2009. ICCCN 2009. Proceedings of 18th Internatonal Conference on.
Clarke, I., Sandberg, O., Wiley, B., & Hong, T. W. (2001). Freenet: A distributed anonymous information storage and retrieval system. Paper presented at the Designing Privacy Enhancing Technologies.
Condie, T., Kamvar, S. D., & Garcia-Molina, H. (2004). Adaptive peer-to-peer topologies. Paper presented at the Peer-to-Peer Computing, 2004. Proceedings. Proceedings. Fourth International Conference on.
Deering, S. E., & Cheriton, D. R. (1990). Multicast routing in datagram internetworks and extended LANs. ACM Transactions on Computer Systems (TOCS), 8(2), 85-110.
Demirbas, M., Lu, X., & Singla, P. (2009). An in-network querying framework for wireless sensor networks. IEEE transactions on parallel and distributed systems, 20(8), 1202-1215.
Deng, H., Sun, X., Wang, B., & Cao, Y. (2009). Selective forwarding attack detection using watermark in WSNs. Paper presented at the 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.
Erramilli, V., Crovella, M., Chaintreau, A., & Diot, C. (2008). Delegation forwarding. Paper presented at the Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing.
Fan, K.-W., Liu, S., & Sinha, P. (2008). Dynamic forwarding over tree-on-dag for scalable data aggregation in sensor networks. IEEE Transactions on Mobile Computing, 7(10), 1271-1284.
Farley, A. M. (1979). Minimal broadcast networks. Networks, 9(4), 313-332.
Farley, A. M. (1980). Broadcast time in communication networks. SIAM Journal on Applied Mathematics, 39(2), 385-390.
Feller, W. (1968). An introduction to probability theory and its applications: volume I (Vol. 3): John Wiley & Sons London-New York-Sydney-Toronto.
Ferreira, R. A., Ramanathan, M. K., Awan, A., Grama, A., & Jagannathan, S. (2005). Search with probabilistic guarantees in unstructured peer-to-peer networks. Paper presented at the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).
Frey, H., & Stojmenovic, I. (2010). On delivery guarantees and worst-case forwarding bounds of elementary face routing components in ad hoc and sensor networks. IEEE Transactions on Computers, 59(9), 1224-1238.
Geethu, P., & Mohammed, A. R. (2013). Defense mechanism against selective forwarding attack in wireless sensor networks. Paper presented at the Computing, Communications and Networking Technologies (ICCCNT), 2013 Fourth International Conference on.
Ghosh, A. K., & Schwartzbard, A. (1999). A Study in Using Neural Networks for Anomaly and Misuse Detection. Paper presented at the USENIX Security.
Goonatilake, R., Herath, A., Herath, S., Herath, S., & Herath, J. (2007). Intrusion detection using the chi-square goodness-of-fit test for information assurance, network, forensics and software security. Journal of Computing Sciences in Colleges, 23(1), 255-263.
Gu, Y., & He, T. (2007). Data forwarding in extremely low duty-cycle sensor networks with unreliable communication links. Paper presented at the Proceedings of the 5th international conference on Embedded networked sensor systems.
Gupta, A., Sahin, O. D., Agrawal, D., & Abbadi, A. E. (2004). Meghdoot: content-based publish/subscribe over P2P networks. Paper presented at the Proceedings of the 5th ACM/IFIP/USENIX international conference on Middleware.
Haas, Z. J., Halpern, J. Y., & Li, L. (2006). Gossip-based ad hoc routing. IEEE/ACM Transactions on Networking (ToN), 14(3), 479-491.
Hai, T. H., & Huh, E.-N. (2008). Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge. Paper presented at the Network Computing and Applications, 2008. NCA'08. Seventh IEEE International Symposium on.
Hales, D. (2004). From selfish nodes to cooperative networks-emergent link-based incentives in peer-to-peer networks. Paper presented at the Peer-to-Peer Computing, 2004. Proceedings. Proceedings. Fourth International Conference on.
Hedetniemi, S. M., Hedetniemi, S. T., & Liestman, A. L. (1988). A survey of gossiping and broadcasting in communication networks. Networks, 18(4), 319-349.
Helman, P., & Bhangoo, J. (1997). A statistically based system for prioritizing information exploration under uncertainty. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 27(4), 449-466.
Herrmann, M., Zhang, R., Ning, K.-C., Diaz, C., & Preneel, B. (2014). Censorship-resistant and privacy-preserving distributed web search. Paper presented at the Peer-to-Peer Computing (P2P), 14-th IEEE International Conference on.
Ho, J. C., Zhang, Q., & Lee, C.-S. (2011). Google's retreat from China: Two competing theories. Paper presented at the Technology Management in the Energy Smart World (PICMET), 2011 Proceedings of PICMET'11:.
Isdal, T., Piatek, M., Krishnamurthy, A., & Anderson, T. (2010). Privacy-preserving p2p data sharing with oneswarm. Paper presented at the ACM SIGCOMM Computer Communication Review.
Jesi, G. P., Hales, D., & Van Steen, M. (2007). Identifying malicious peers before it's too late: a decentralized secure peer sampling service. Paper presented at the First International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007).
Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc networks, 1(2), 293-315.
Khosrow-Pour, M. (2008). Encyclopedia of information science and technology (Vol. 1): IGI Global.
Lazarevic, A., Ertöz, L., Kumar, V., Ozgur, A., & Srivastava, J. (2003). A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection. Paper presented at the SDM.
Lee, H. Y., & Cho, T. H. (2007). Fuzzy-based reliable data delivery for countering selective forwarding in sensor networks. Paper presented at the International Conference on Ubiquitous Intelligence and Computing.
Lee, W., & Stolfo, S. J. (1998). Data Mining Approaches for Intrusion Detection. Paper presented at the Usenix security.
Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014). Mining of massive datasets: Cambridge University Press.
Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014). Mining of massive datasets: Cambridge University Press.
Li, J., Jannotti, J., De Couto, D. S., Karger, D. R., & Morris, R. (2000). A scalable location service for geographic ad hoc routing. Paper presented at the Proceedings of the 6th annual international conference on Mobile computing and networking.
Lotfinezhad, M., Liang, B., & Sousa, E. S. (2008). Adaptive cluster-based data collection in sensor networks with direct sink access. IEEE Transactions on Mobile Computing, 7(7), 884-897.
Mathur, A., Newe, T., & Rao, M. (2016). Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT. Sensors, 16(1), 118.
Melliar-Smith, P. M., Moser, L. E., Lombera, I. M., & Chuang, Y.-T. (2012). iTrust: Trustworthy information publication, search and retrieval. Paper presented at the International Conference on Distributed Computing and Networking.
Mischke, J., & Stiller, B. (2004). A methodology for the design of distributed search in P2P middleware. IEEE network, 18(1), 30-37.
Morselli, R., Bhattacharjee, B., Marsh, M. A., & Srinivasan, A. (2007). Efficient lookup on unstructured topologies. IEEE Journal on selected areas in communications, 25(1), 62-72.
Moser, L. E., & Melliar-Smith, P. (2013). Probabilistic analysis of message forwarding. Paper presented at the 2013 22nd International Conference on Computer Communication and Networks (ICCCN).
Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing (No. 2070-1721).
Press, W. H. (2007). Numerical recipes 3rd edition: The art of scientific computing: Cambridge university press.
Ratnasamy, S., Karp, B., Shenker, S., Estrin, D., Govindan, R., Yin, L., et al. (2003). Data-centric storage in sensornets with GHT, a geographic hash table. Mobile networks and applications, 8(4), 427-442.
Risson, J., & Moors, T. (2006). Survey of research towards robust peer-to-peer networks: search methods. Computer networks, 50(17), 3485-3521.
Roberts, S. (2000). Control chart tests based on geometric moving averages. Technometrics, 42(1), 97-101.
Sasson, Y., Cavin, D., & Schiper, A. (2003). Probabilistic broadcast for flooding in wireless mobile ad hoc networks. Paper presented at the Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE.
Shah, N., & Qian, D. (2011). An efficient unstructured p2p overlay over manet using underlying proactive routing. Paper presented at the Mobile Ad-hoc and Sensor Networks (MSN), 2011 Seventh International Conference on.
Sharma, P., Souza, D., Fiore, E., Gottschalk, J., & Marquis, D. (2012). A case for MANET-aware content centric networking of smartphones. Paper presented at the World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a.
Shen, H., Li, Z., & Chen, K. (2014). A scalable and mobility-resilient data search system for large-scale mobile wireless networks. IEEE transactions on parallel and distributed systems, 25(5), 1124-1134.
Shen, H., Zhao, L., & Li, Z. (2011). A distributed spatial-temporal similarity data storage scheme in wireless sensor networks. IEEE Transactions on Mobile Computing, 10(7), 982-996.
Terpstra, W. W., Kangasharju, J., Leng, C., & Buchmann, A. P. (2007). Bubblestorm: resilient, probabilistic, and exhaustive peer-to-peer search. Paper presented at the ACM SIGCOMM Computer Communication Review.
Tran, D. A., & Pham, C. (2010). Enabling content-based publish/subscribe services in cooperative P2P networks. Computer Networks, 54(11), 1739-1749.
Tsoumakos, D., & Roussopoulos, N. (2003). A Comparison of Peer-to-Peer Search Methods. Paper presented at the WebDB.
Viinikka, J., & Debar, H. (2004). Monitoring IDS background noise using EWMA control charts and alert information. Paper presented at the International Workshop on Recent Advances in Intrusion Detection.
Wong, B., & Guha, S. (2008). Quasar: a probabilistic publish-subscribe system for social networks. Paper presented at the IPTPS.
Xiao, B., Yu, B., & Gao, C. (2007). CHEMAS: Identify suspect nodes in selective forwarding attacks. Journal of Parallel and Distributed Computing, 67(11), 1218-1230.
Xing, G., Li, M., Luo, H., & Jia, X. (2009). Dynamic multiresolution data dissemination in wireless sensor networks. IEEE Transactions on Mobile Computing, 8(9), 1205-1220.
Xin-Sheng, W., Yong-zhao, Z., Shu-ming, X., & Liang-min, W. (2009). Lightweight defense scheme against selective forwarding attacks in wireless sensor networks. Paper presented at the Cyber-Enabled Distributed Computing and Knowledge Discovery, 2009. CyberC'09. International Conference on.
Xu, B. (2014). Media censorship in China. Council on Foreign Relations, 25.
Xu, J., Tang, X., & Lee, W.-C. (2008). A new storage scheme for approximate location queries in object-tracking sensor networks. IEEE transactions on parallel and distributed systems, 19(2), 262-275.
Yang, H., Ye, F., & Sikdar, B. (2008). A swarm-intelligence-based protocol for data acquisition in networks with mobile sinks. IEEE Transactions on Mobile Computing, 7(8), 931-945.
Ye, N., & Chen, Q. (2001). An anomaly detection technique based on a chi‐square statistic for detecting intrusions into information systems. Quality and Reliability Engineering International, 17(2), 105-112.
Yu, B., & Xiao, B. (2006). Detecting selective forwarding attacks in wireless sensor networks. Paper presented at the Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
Zhou, B., Shi, Q., & Merabti, M. (2006). Intrusion detection in pervasive networks based on a chi-square statistic test. Paper presented at the 30th Annual International Computer Software and Applications Conference (COMPSAC'06).
Zuo, M., Zhang, X., & Liu, Q. (2008). The Development of Search Engine in China and its Problems Revealed in Net Information Retrieval. Paper presented at the Information Processing (ISIP), 2008 International Symposiums on.
財團法人台灣網路資訊中心(民105)。 2016 年台灣寬頻網路使用調查報告。民105年1月,取自:財團法人台灣網路資訊中心網站:http://www.twnic.net.tw/download/download_01.htm

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top