跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.86) 您好!臺灣時間:2025/02/08 01:46
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:龔晉弘
研究生(外文):Chin-Hung Kung
論文名稱:ATM安全協定對資料傳送效能影響之研究
論文名稱(外文):Study on the efficiency of data transfer under ATM Security protocol
指導教授:張豫虎陳彥文陳彥文引用關係
指導教授(外文):Yuh-Huu ChangYen-Wen Chen
學位類別:碩士
校院名稱:中原大學
系所名稱:電子工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2000
畢業學年度:88
語文別:中文
論文頁數:83
中文關鍵詞:非同步傳輸模式隨機細胞遺失比率突發細胞遺失比率安全訊息交換協定
外文關鍵詞:ATMRandom Cell Loss RatioBurst Cell Loss RatioSMEP
相關次數:
  • 被引用被引用:0
  • 點閱點閱:201
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
非同步傳輸模式(Asynchronous Transfer Model,ATM)技術已被視為下一代網際網路骨幹之基礎。而網際網路之發展除需提供寬頻及服務品質保證外,對於安全技術也需加以提升,才能符合未來寬頻網路服務之需求。因此ATM必須有能力提供快速可測量且適合不同應用的安全服務。
ATM論壇針對ATM安全協定已提出版本1.0的建議規格,定義一連串在ATM使用者面和控制面的安全服務。另外,載送安全相關訊息的機制及所需要的安全架構也被定義,討論在連結建立時和傳送資料期間,其傳送安全訊息的機制。本論文之研究重點即在探討在快速ATM連線中,安全訊息交換協定的使用對於資料傳送效能影響之評估。我們分就網路上隨機細胞遺失比率及突發細胞遺失比率可能造成收/送兩端金匙失去同步,而使得資料解密錯誤的現象,進行模擬探討。實驗結果顯示,其中突發性細胞遺失比率所造成的影響極大,資料解密錯誤的資料甚至會高於細胞遺失比率數百倍。本實驗結果應可提供ATM網路服務規劃之參考。

Asynchronous Transfer Model (ATM) has been considered the infrastructure of Internet backbone in the next generation. By developing of Internet, besides providing wide-band and quality guaranty, we also need to rise the security technique to meet what we want in wide-band network in the future. ATM will provide scalable and high performance application-independent security services. ATM Forum has reported the specification of the security protocol Version 1.0 which define a number of security services for the ATM user plane and control plane. In addition, mechanisms for carrying security-related messages and required security infrastructure mechanisms are also being defined. Then the security messaging mechanisms at connection establishment and during connection lifetime phase are discussed. This paper discussed the influence of data transfer efficiency about using security message exchange protocol (SMEP) during quickly ATM connection. We simulate individually the Random Cell Loss Ratio and Burst Cell Loss Ratio may result in the synchronous in receiving/delivering key. This further makes mistakes during the process of data decrypting. This experiment shows that the Burst Cell Loss Ratio will make hundreds times mistakes during the process of data decrypting than the Random Cell Loss Ratio. This experiment could provide the suggestion in planning. ATM Internet service.

摘要………………………………………………………………………..Ⅰ
英文摘要………………………………………………………………….Ⅱ
目錄……………………………………………………………………….Ⅲ
圖目錄…………………………………………………………………….Ⅴ
表目錄…………………………………………………………………… Ⅷ
第一章 緒論…………………………………………………………….....1
第二章 文獻回顧……………………………………………………….... 3
2.1 ATM通訊協定模型…………………………………………….............3
2.2 近代密碼學技術……………………………………………… ............4
2.3 適用在底層的安全協定……………………………………….............5
2.4 使用者資料傳輸的安全層…………………………………….............9
2.5 ATM安全服務設計…………………………………………...............15
第三章 ATM的安全服務………………………..……………………….17
3.1 使用者面的安全服務………………………..........………………….17
3.2 安全代理者架構…………………………………..........…………….21
3.3 控制面安全服務………………………………………..........……….23
第四章 安全訊息交換協定與架構……………………………………...25
4.1 初始認證、金匙交換和安全服務選擇的協商.........………………..25
4.2 在使用者面和控制面傳送安全訊息………………..........………….31
4.3 安全資訊單元交換………………………………………..........…….37
4.4 金匙交換和會議金匙更新…..........………………………………….38
第五章 計數模式和加密器同步的方法…….…………………………..45
5.1 ATM改良加密模式………………………...........……………………45
5.2 計數模式………………………………………….........……………..51
5.3 計數模式同步問題與模擬分析……………………….........………..54
第六章 電腦模擬結果與分析…...………………………………………65
6.1 AAL3/4和AAL5的突發遺失模擬結果分析…............……………….68
6.2 AAL3/4和AAL5在高斯分佈和指數分佈突發遺失的模擬….............72
6.3 降低突發性連續細胞遺失的方法…………………………….......…78
第七章 結論….………………………………………………………..…80
參考文獻…...…………………………………………………………….82

[1] P.E.Sholander et al.,"The Effect of Algorithm-Agile Encryption on ATM Quality of Service,"Proc.IEEE Globecom '97,IEEE CS Press,Los Alamitors,Calif.,1997,pp.470-474
[2] Bird, et. al., "The KrypoKnight Family of Light-Weight Protocols for Authentication and Key Distribution," IEEE/ACM Trans. on Networking, vol. 3, No. 1, pp.31-41, Feb., 1995.
[3] "ATM Security Specification Version 1.0", af-sec-0100.000, Feb., 1999.
[4] C. Kaufman,R. Perlman,M. Speciner,"Network Security Private Communicationin a Public World,pp265-326,1999
[5] 賴溪松,韓亮,張真誠,"近代密碼學及其應用",pp70-90,1998
[6] Federal Information Processing Standards Publication 46-2(FIPS PUB 46- 2),"Data Encryption Standard(DES),"Dec.30,1993
[7] McDysan,Spohn,"ATM Theory and Application"pp417-437,1999
[8] Miyaguhi,S.,et.al, 'Expansion of FEAL Cipher," NTT Review, Vol.2, No.6, pp. 117-127, November 1990
[9] "Asynchronous transfer mode security Peyravian", T.D. IEEE Network
Volume: 11 3 , May-June 1997 , Page(s): 34 -40
[10] "Secure communications in ATM networks" Laurent, M.; Bouabdallah, A.; Delahaye, C.; Leitold, H.; Posch, R.; Areizaga, E.; Robotiker, F.; Mateos, J.M.; Ingeniera, I. Computer Security Applications Conference, 1999. (ACSAC '99). Proceedings. 15th Annual , 1999 , Page(s): 84 -93
[11] C. Kaufman,R. Perlman,M. Speciner,"Network Security Private Communicationin a Public World,pp367-368,1999
[12]孫海榮,李樂民,"ATM技術概念.原理與應用",pp8-10,1996
[13] McDysan,Spohn,"ATM Theory and Application"pp217-223,1999
[14] "Security for ATM networks" ,Varadharajan, V.; Shankaran, R.Global Telecommunications Conference, 1997. GLOBECOM '97., IEEE Volume: 1 , 1997 , Page(s): 475 -480 vol.1
[15] "Security services and public key infrastructure for ATM networks",Varadharajan, V.; Shankaran, R.; Hitchens, M.Local Computer Networks, 1997. Proceedings., 22nd Annual Conference on , 1997 , Page(s): 253 -262
[16] "Secure signaling and access control for ATM networks", Shankaran, R.; Varadharajan, V. Computer Security Applications Conference, 1998. Proceedings.14th Annual , 1998 , Page(s):212 -222
[17]H.T.Kung and Rebert Morris,"Credit-Based Flow Control for ATM Network",IEEE Network,pp40-48,March/April 1995
[18] "Securing data transfer in asynchronous transfer mode networks", Deng, R.H.; Li Gong; Lazar, A.A. Global Telecommunications Conference, 1995. GLOBECOM '95.,IEEE Volume: 2 , 1995 , Page(s): 1198 -1202 vol.2
[19] "Secure signaling and access control for ATM networks",Shankaran, R.;
adharajan, V.Computer Security Applications Conference, 1998. Proceedings 14th Annual , 1998 , Page(s): 212 -222
[20] Flavio Bonomi and Kerry W.Fendick,"The Rate-Based Flow Control Framework for the Available Bit Rate ATM Service",IEEE Network,pp.25-39 March/April 1995
[21] "Design of a key agile cryptographic system for OC-12c rate ATM", Stevenson, D.; Hillery, N.; Byrd, G.; Fengmin Gong; Winkelstein, D.Network and Distributed System Security, 1995., Proceedings of the Symposium on , 1995 , Page(s): 17 -30
[22] "ATM-encryption with 155 Mbit/s", Kuhn, S.; Ruland, C.; Wollenweber, K.ATM Workshop, 1999. IEEE Proceedings , 1999 , Page(s): 307-312
[23] "A secure ATM VP coordination protocol", Kroculick, J.; Hood, C.Military Communications Conference, 1998. MILCOM 98. Proceedings., IEEE Volume: 3 , 1998 , Page(s): 1023 -1027 vol.3

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top