跳到主要內容

臺灣博碩士論文加值系統

(44.220.251.236) 您好!臺灣時間:2024/10/09 08:03
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:王智鵬
研究生(外文):WANG JHIH PENG
論文名稱:資訊戰身分識別在無線隨意網路中之研究
論文名稱(外文):Authentication in Ad Hoc Networks for Information Warfare
指導教授:伍台國
學位類別:碩士
校院名稱:國防管理學院
系所名稱:國防資訊研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
論文頁數:82
中文關鍵詞:Ad Hoc網路身分識別資訊戰智慧卡驗證金鑰
外文關鍵詞:Ad Hoc NetworksAuthenticationInformation WarfareSmart CardAuthenticated Key
相關次數:
  • 被引用被引用:1
  • 點閱點閱:459
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
Ad Hoc網路源起於軍事通訊的需求,因具機動性及易於各種環境操作的獨特條件,所以非常適合於軍事作戰、急難搜救等機動性任務使用。波灣戰爭以來,世界各先進國家莫不漸次明暸資訊戰(Information Warfare,IW)為贏得戰爭勝利之碁石,也證明了科技領先者主宰戰爭勝負,因此皆積極開發相關技術。而資訊戰之要角首推網路戰,通訊網路目前已為我軍傳遞情資之重要媒介,因此如何建立一套完備的網路安全環境,其重要性不言可喻。
資訊戰中欲透過網路進行情資交換前,雙方如何確認身分為首要之務,當雙方身分驗證無誤,接下來依彼此的傳輸需求,傳遞的資訊可能具有機密性而需加以保護,因此,為通訊的雙方分配一把共有且兼具鑑別性的會議金鑰(session key)以做為傳遞資訊的安全之用,也已逐漸成為伴隨身分驗證的基本需求。本論文以身分識別機制及後續如何為雙方建立具鑑別性之會議金鑰為主要研究方向,提出適用於Ad-Hoc網路環境,具安全性的方案,並結合智慧卡的使用,降低Ad-Hoc網路中行動設備計算成本與電力消耗,同時兼顧效率性,或可為我軍資訊戰之參考。
Ad Hoc network starts from the need of military communication. It is very suitable for using in such flexible tasks as military fighting, misfortune search and rescue, etc. Because it possess mobility and easy to operate under various kinds of environments. Each world advanced country have got to understand that Information Warfare (IW) is the victorious foundation of wining war and proved technological leading one deciding the war since Gulf War. So all of them developed relevant technology actively. The protagonist of the IW is a fight of the network. Communication network is the important media that we have already transmitted the information at present. It is very momentous how to set up a perfect network security environment.
It is the primary affair that how to confirm the identity both sides before exchanging the information through the network in IW. The confidential information transmitted needs protection according to the mutual transmission demand as the identities of both sides are verified correctly. It has already become the basic demand and followed that the identity verifies gradually for distributing a session key for both sides owning in common and authentication as securely transmitting information. The main department in research is identity authentication and setting up authenticated key. We try to put forward the secure scheme with smart card for Ad Hoc network. It can reduce the calculation and electricity consuming of mobility equipment efficiently. Perhaps it can be for our troops reference.
摘 要 I
ABSTRACT I
目錄 III
圖目錄 VI
表目錄 VIII
第一章 緒論 1
1.1 研究背景與動機 1
1.2 研究目的 4
1.3 研究範圍與限制 5
1.4 研究步驟與流程 5
1.5 論文結構 7
第二章 文獻探討 9
2.1 Ad Hoc網路 10
2.2 資訊戰 12
2.3 密碼學背景知識介紹 17
2.3.1 單向雜湊函數 17
2.3.2 互斥或特性 18
2.3.3 橢圓曲線密碼系統之研究 19
2.4 無線網路攻擊類型 23
2.5 智慧卡 26
2.6 本研究相關技術 30
2.6.1結合智慧卡之遠端身分認證機制 31
2.6.2以Diffie-Hellman為基礎的驗證金鑰協定 35
2.6.3橢圓曲線驗證金鑰協定 37
第三章 雙向身分識別機制 40
3.1 系統運作模式 40
3.2 雙向身分識別機制演算法 41
3.3 雙向身分識別機制實例說明 47
3.3.1註冊階段 47
3.3.2登入階段 48
3.3.3驗證階段 48
3.3.4通行碼變更階段 49
第四章 驗證金鑰建立模式 51
4.1 系統運作模式 51
4.2 機密情資傳遞演算法 52
第五章 安全性與效率分析 56
5.1 效率方面 56
5.2 安全方面 58
第六章 結論與未來研究方向 63
6.1 結論 63
6.2 未來發展方向 64
參考文獻 67
中文部分 67
英文部分 70
中文部分
[1]郭強毅(民八九),「植基於弱通行碼建立安全的會議金匙」,中興大學資訊科學系碩士論文。
[2]張德竟(民九十),「以密碼為基礎的動態會議金鑰系統」,交通大學資訊科學系碩士論文。
[3]巫坤品、曾志光譯(民九十.九月),「密碼學與網路安全:原理與實務第二版」,碁峯資訊股份有限公司。
[4]林峻立(民九二),「使用者通行碼之身分驗證與金鑰交換協定」,中華民國資訊安全學會,資訊安全通訊第九卷,第三期,頁43-52。
[5]「美伊戰爭誤擊事件評析」(民九二.四月三日),聯合報2版。
[6]「我國PKI互通管理及推動計畫-行動式PKI技術及應用研究報告」(民九二),工研院電通所。
[7]賴溪松、韓亮、張真誠(民九二.八月),「近代密碼學及其應用」,旗標出版股份有限公司。
[8]賴峙樺(民九二),「以橢圓曲線為基礎之簽密法的研究」,淡江大學資訊工程系碩士論文。
[9]周伯錕(民九二),「利用智慧卡之遠端身分認證之研究」,中興大學資訊科學系碩士論文。
[10]「資安事件頻傳 攘外必先安內」(民九二),凱隆智慧股份有限公司http://www.klitc.com/html_event/events031111-N.htm.
[11]黃裕彰譯(民九二.五月),「802.11無線網路技術通論」,美商歐萊禮O'reilly出版社。
[12]陳彥學(民九三),「無線區域網路認證技術簡介」,中華民國資訊安全學會,資訊安全通訊第十卷,第二期,頁78-92。
[13]「個人資料遭盜賣 立委擬提國賠」 (民九三.五月二十八日), 聯合報A6版。
[14]「數字簽名遭遇911」(民九四),http://blog.xuite.net/hdc1/futurelife/107562。
[15]王偲穎(民九四),「動態會議金鑰分配機制之研究」,世新大學資訊管理系碩士論文。
[16]許沁如(民九四),「結合智慧卡之通行碼認證機制研究」,世新大學資訊管理系碩士論文。
[17]「智慧卡IC將成為全球電子身分識別方案」(民九四),電子工程專輯,http://www.eettaiwan.com/ART_8800374644_617723_8c77e4fe_no.HTM
[18]謝文川、趙士元、黃立璁(民九四.八月),「無線區域網路安全威脅與防護」,碁峯資訊股份有限公司。
[19]「4000萬張信用卡資料外洩」(民九四.六月十九日),自由電子報http://www.libertytimes.com.tw/2005/new/jun/19/today-int1.htm
[20]王智鵬、伍台國、陳正鎔(民九五),「身分識別安全策略之研究-以網路銀行為例」,2006年數位科技與創新管理國際研討會,華梵大學主辦,台北縣。
英文部分
[21]Ai-fen Sui, L.C.K.Hui, S.M.Yiu, K.P.Chow, W.W.Tsang, C.F.Chong, K.H.Pun , H.W.Chan [2005], “An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication ”, Wireless Communications and Networking Conference,vol.4,pp.2088-2093.
[22]A. Lawrence Gordon, Martin P. Loeb, Deloitte, Touche Faculty Fellow, William Lucyshyn, Robert Richardson ,2005 CSI/FBI Computer Crime and Security Survey ”, http://www.gocsi.com/ , 2006.
[23]A.Shamir [1984], “Identity-based cryptosystems and signature schemes ”,Proceedings CRYPTO’84,LNCS 196,pp.47-53.
[24]C.C.Lee,M.S.Hwang,and W.P.Yang [2002],“A flexible remote user authentication scheme using smart cards”,ACM Operating Systems Review,vol.36,no.3, pp.46-52.
[25]C.K.Chan and L.M.Cheng [2000], “Cryptanalysis of a remote user authentication scheme using smart cards”,IEEE Transactions on Consumer Electronics ,vol.46,no.4, pp.992-993.
[26]C.L.Hsu [2003], “Security of Chien et al.’s remote user authentication scheme using smart cards”,Computer Standards & Interfaces,Article in press.
[27]D. Johnson, A. Menezes and S. Vanstone [2001], “The Elliptic Curve Digital Signature Algorithm (ECDSA),” International Journal of Information Security, vol. 1,Issue 1, Springer-Verlag, pp. 36-63.
[28]E.J.Yoon,K.Y.Yoo [2005], “More Efficient and Secure Remote User Authentication Scheme using Smart Cards”, IEEE 11th International Conference on Parallel and Distributed Systems - Workshops (ICPADS'05), pp.73-77.
[29]H.Luo,P.Zefros, J.Kong, S.Lu,and L.Zhang [2002], “Self-Securing Ad Hoc Wireless Networks”,The Seventh IEEE Symposium on Computer and Communications.
[30]H.M.Sun [2000] ,“An efficient remote user authentication scheme using smart cards”,IEEE Transactions on Consumer Electronics,vol.46,no.4,pp.958-961.
[31]H.Y.Chien,J.K.Jan, and Y.M.Tseng [2002], “An efficient and practical solution to remote authentication:smart cards ”,Computer & Security,vol.21,no.4,pp.372-375.
[32]J.R Chen, E.H Lu ,J.H Chiu, Y.I Cheng, P.L Chang [2006] , “Comment on Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Mobile communication”, Feng Chia University,12th Mobile Computing Workshop, pp 522-525.
[33]J.Kong,H.Luo, K.Xu, D.L.Gu, M.Gerla, and S.Lu [2002], “Adaptive Security for Multi-Layer Ad Hoc Networks”, Special Issue of Wireless Communication and Mobile Computing, Wiley Interscience Press.
[34]J.Hubaux,L.Buttyan, and S.Capkun [2001], “The Quest for Security in Mobile Ad Hoc Networks”, Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing.
[35]J.J.Shen , C.W.Lin ,and M.S.Hwang [2003], “A Modified Remote User Authentication Scheme Using Smart Cards” ,IEEE Transactions on Consumer Electronics,vol.49,no.2,pp.414-416.
[36]J.K.Lee, S.R.Ryu, and K.Y.Yoo [2002], “Fingerprint-based remote user authentication scheme using smart cards”, IEE Electronics Letters,vol.38,no.12,pp.554-555.
[37]J.Pollard [1978],“Monte Carlo methods for index computation mod P”, Mathematics of Computation,32,pp 918-924.
[38]L.Gong [1992], “A security risk of depending on synchronized clocks”, Operating Systems Review,vol.26,no.1,pp.49-53.
[39]M.Sahar Ghanem and Hussein Abdel-Wahab [2000], “A simple XOR- based technique for distributing group key in secure multicasting, ”In Proc. The Fifth IEEE Symposium on Computers and Communications , pp.166-171.
[40]M.S.Hwang and L.H.Li [2000], “A new remote user authentication scheme using smart cards”, IEEE Transactions on Consumer Electronics, vol.46,no.1,pp.28-30.
[41]M.Steiner, G.Tsudik and M.Waidner [1995], “Refinement and extension of encrypted key exchange,” ACM Operating Systems Review, Vol. 29, No. 3, pp. 22–30.
[42]NBS FIPS PUB 46-1 [1988], “Data Encryption Standard”, National Bureau of Standards, U.S.Department of Commerce.
[43]N.Koblitz [1987],“Elliptic curve cryptosystems”, Mathematics of Computation,vol.48,no.177,pp.203-209.
[44]R. Rivest, A. Shamir, and L. Adleman [1978],“A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM,vol.21,No.2, pp.120 –126.
[45]S. M. Bellovin and M.Merritt [1992] , “Encrypted key exchange password-based protocols secure against dictionary attacks”, IEEE Symposium on Research in Security and Privacy, pp.72–84.
[46]S.Vanstone [1997],“Elliptic curve cryptosystem - the answer to strong, fast public-key cryptography for securing constrained environments” , Information Security Technical Report Elsevier,vol.2,No. 2, pp.78-87.
[47]S.W.Lee,H.S.Kim, and K.Y.Yoo [2004], “Improved Efficient Remote User Authentication Scheme using Smart Cards”, IEEE Transactions on Consumer Electronics,vol.50,no.2,May,pp.565-567.
[48]T.ElGamal [1985],“A public key cryptosystem and a signature scheme based on discrete logarithms” IEEE Transactions on Information Theory,OL.IT-31,No. 4,pp. 469-472.
[49]U.S.Army Training and Doctrine Command [1995], “Conpects for Information Operations”, pp.525-526,America.
[50]V.S. Miller [1986], “ Use of elliptic curves in cryptography ”, Advances in Cryptology:Crypto’85,Springer-Verlag,pp.417-426.
[51]W.Diffie and M.Hellman [1976], “New directions in cryptography,” IEEE Transactions on Information Theory, Vol. 22, No. 6, pp. 644–654.
[52]Y. Ding and P. Horster [1995], “Undetectable on-line password guessing attacks,” ACM SIGOPS Operating Systems Review, vol.29, no.4, pp. 77–86, October.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top