(3.235.25.169) 您好!臺灣時間:2021/04/20 19:17
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:郭思良
研究生(外文):Szu-Liang Kuo
論文名稱:以馬可夫決策程序為基礎的信任值計算與金鑰管理於無線群播行動隨意網路之研究
論文名稱(外文):Markov Decision Process Based Determination of Trust Value and Key Management for Wireless Multicast MANETs
指導教授:唐元亮張本杰張本杰引用關係
指導教授(外文):Yuan-Liang TangBen-Jye Chang
學位類別:碩士
校院名稱:朝陽科技大學
系所名稱:資訊管理系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:中文
論文頁數:60
中文關鍵詞:馬可夫鍊分析隨意式無線網路金鑰管理信任安全認證完全分散式
外文關鍵詞:MANETMarkov chain analysistrustkey managementsecure authenticationfully distributed
相關次數:
  • 被引用被引用:0
  • 點閱點閱:198
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:2
  • 收藏至我的研究室書目清單書目收藏:0
在隨意式無線網路中,每一節點皆是分散式架構,且在有限傳輸範圍的中繼行動節點。隨意式網路結構,是不具有固定的網路拓樸,而是屬於獨立組織的網路結構,也因此架構並無中心可信任的憑證中心,導致安全認證管理上比傳統結構性的網路更為困難。除此之外,這安全認證問題在隨意式無線網路的群播存取中,一個傳送端必須經由最小成本的群播樹要傳送即時資料或資源給多個經常異動的接收端,其問題更是難以克服。為解決完全分散式(Fully Distributed)的群播於隨意式無線網路的安全認證問題,因此,我們在分散式群播隨意式無線網路提出二個安全認證機制,其一是我們利用馬可夫鍊模式來分析一步鄰居紀錄過去的歷史記錄,並不斷的更新紀錄,以分析各行動節點在隨意式無線網路各群組的信任程度,其二是我們在隨意式無線網路群組中,以最高信任程行動節點做為憑證中心,而次高的信任程度行動節點則為備份憑證中心,當行動網路節點離開群組或發生斷線情形時,我們可利用備份憑證中心提供安全且可靠度的認證。最後,以程式模擬在不同情境下的結果,與數學分析結果近相同,故可以印證我們方法,可以利用馬可夫鍊模式在隨意式無線網路環境下,有效的計算出行動網路節點信任程度。

關鍵字:隨意式無線網路,馬可夫鍊分析,金鑰管理,信任,安全認證,完全分散式
In Mobile Ad Hoc Networks (MANETs), every node is a distributed wireless mobile forwarding node with limited transmission range. MANET is a self-organized network rather than a fixed network topology. As a result, the issue of supporting a secure authentication management in MANET is more difficult and complicated than that in a fixed wired network because MANET lacks a fixed certificate authentication (CA) server. Moreover, multicasting in MANET is an important application for a sender to send some real-time resources or critical data packets to multiple receivers through the least cost multicast tree. How to provide a secure CA for mobile nodes operating in a fully distributed multicast MANET becomes more and more troublesome. Therefore, in this work we propose a two-step secure authentication mechanism for distributed multicasting in MANET. The proposed approach consists of two main functions. First, we adopt the Markov chain analysis to determine an update-to-date trust value (TV) for all 1-hop neighbor nodes based on previous manner performance of each node in individual multicast group. Second, the mobile node with the highest TV in a group will be selected as the CA server and the second one will be selected as the backup CA server for taking over the CA when the CA server leaves the group or becomes failure. Consequently, the proposed approach achieves a secure reliable authentication in multicast MANET. Numerical results demonstrate the analysis results of TV of each mobile node under different performance situations are the same as that of simulation. That means the Markov chain analysis can accurately analyze the trust value of each member node within the same multicast group.
Keywords —MANET, Markov chain analysis, key management, trust, secure authentication, fully distributed
摘要 I
Abstract III
第一章 前言 1
第二章 網路架構 5
第三章 隨意式網路計算信任方法 8
3-1 信任關係的建立 8
3-2 信任值計算 10
3-3 信任值計算流程架構 13
3-4 金鑰管理 18
第四章 馬可夫鍊分析模式 31
4-1 CASE1:網路節點為10點的情形驗證 33
4-2 CASE2:網路節點為20點的情形驗證 38
4-3 CASE3:網路節點為30點的情形驗證 42
第五章Numerical Results 47
5-1 CASE1:降低 及提高 比率 47
5-2 CASE2: 及 相同比率 48
5-3 CASE3:以提高 及降低 比率 49
5-4 CASE4:模擬節點信任程度 50
第六章 時間複雜度分析 53
6-1 CASE1:Non-member Node加入所花費時間 54
6-2 CASE2:Non-member Node離開所花費時間 54
第七章 結論 56
參考文獻 57
[1] P. Papadimitratos, “Secure Ad Hoc Networking,” IEEE Consumer Communications and Networking Conference, Vol.1, pp.10-14, Jan. 2006.
[2] A.Mishra, K. Nadkarni and A. Patcha, “Intrusion Detection in Wireless Ad Hoc Networks,” IEEE Wireless Communications, Vol.11, Issue 1, pp.48-60, Feb. 2004.
[3] S. Giordano, “Mobile Ad-Hoc Networks,” Book chapter in Handbook of Wireless Networks and Mobile Computing. John Wiley & Sons, Feb. 2002.
[4] PKIX Working Group, “Internet X.509 Public Key Infrastructure,” draft-ietf-pkix-rfc3280bis-08.txt, 2007.
[5] C. Neuman, T. Yu., S. Hartman and K. Raeburn, “The Kerberos network authentication service (version 5),” RFC 4120, July 2005.
[6] A. Josang and S. Pope, “Semantic Constraints for Trust Transitivity,” The 2nd Asia-Pacific Conference on Conceptual Modeling, Vol.43, pp.59-68, Jan. 2005.
[7] T. Repantis and V. Kalogeraki, “Decentralized Trust Management for Ad-hoc Peer-to-Peer Networks,” The 4th International Workshop on Middleware for Pervasive and Ad-Hoc Computing, Vol.182, p.6, Nov. 2006.
[8] A. Jsang, R. Ismail, and C. Boyd, “A survey of trust and reputation s ystems for online service provision,” Decision Support Systems, Vol. 43 pp. 618-644, March. 2005.
[9] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, “The eigentrust algorithm for reputation management in p2p networks,” in Proceedingsof 12th International World Wide Web Conferences, pp. x640-651, May 2003.
[10] P. R. Zimmermann, The Official PGP User’s Guide, MIT Press, 1995.
[11] S. Buchegger and J. L. Boudec, “Performance analysis of the confidant protocol,” in Proceedings of ACM Mobihoc, pp. 226-236, Jun 2002.
[12] P. Michiardi and R. Molva, “Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks,” Communication and Multimedia Security, pp. 107-121, Sep. 2002.
[13] G. Theodorakopoulos and J. S. Baras, “Trust evaluation in ad-hoc networks,” in Proceedings of the ACM Workshop on Wireless Security (WiSE’04), pp. 1-10, Oct. 2004.
[14] Y. Sun, W. Yu, Z. Han, and K. J. Ray Liu, “Information theoretic framework of trust modeling and evaluation for ad hoc networks,” IEEE JSAC special issue on security in wireless ad hoc networks, Vol. 24 pp. 305-319, Feb. 2006.
[15] D. Gambetta, “Trust: Making and Breaking Cooperative Relations,” Basil Blackwell, chapter 13, pp.213-237, 1988.
[16] G. Suryanarayana, M.H. Diallo, J.R. Erenkrantz and R.N. Taylor “Architectural support for trust models in decentralized applications,” The 28th International Conference on Software Engineering, pp.52-61, May 2006.
[17] L. Xiong and L. Liu, “Building Trust in Decentralized Peer to Peer Electronic Communities,” Proc. 5th Int’l Conf. Electronic Commerce Research (ICECR-5), pp. 207-216, Nov. 2002.
[18] E. Kotsovinos, A. Williams, “BambooTrust: Practical Scalable Trust Management for Global Public Computing,” ACM Symposium on Applied Computing, pp.1893 – 1897, Apr. 2006.
[19] G. Zacharia, “Trust Management through Reputation Mechanisms,” Proc. Workshop in Deception, Fraud, and Trust in Agent Societies, 3rd Int’l Conf. Autonomous Agents, pp. 881-907, May. 1999.
[20] S. Buchegger and J.Y.L. Boudec, “Performance Analysis of theConfidant Protocol: Cooperation of Nodes—Fairness in Dynamic Ad Hoc Networks,” Proc. IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing, pp. 226-236, June. 2002.
[21] Abdul-Raduman Alfarez, “The PGP Trust Model,” In EDI-Forum: The Journal of Electronic Commerce, Vol.3 pp. 27-31, Apr. 1997.
[22] H. Sun and J. Song “Strategy Proof Trust Management in Wireless Ad Hoc Network,” Canadian Conference 2004, Vol. 3, pp.1593 - 1596, May 2004.
[23] E.C.H. Ngai, M.R. Lyu, and R.T. Chin, “An authentication service against dishonest users in mobile ad hoc networks,” Aerospace Conference 2004, Vol. 2, pp. 1275–1285, Mar. 2004.
[24] C. Candolin and H.H. Kari, “Distributing incomplete trust in wireless ad hoc networks,” IEEE SoutheastCon 2003, pp. 68 - 73, Apr. 2003.
[25] D.K. Chiu, C. Wang, H.-F. Leung, I. Kafeza and E. Kafeza, “Supporting the legal identities of contracting agents with an agent authorization platform,” International Conference on Electronic Commerce, Vol. 113, pp. 721-728, Aug. 2005.
[26] G.D. Hachtel, E. Macii, A. Pardo, and F. Somenzi, “Markovian Analysis of Large Finite State Machines,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vo. 15, Issue 12, pp. 1479-1493, Dec. 1993.
電子全文 電子全文(本篇電子全文限研究生所屬學校校內系統及IP範圍內開放)
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 王同茂(2002):學校運動場館委託民間營運作業評估。學校體育,12(3),11-16。
2. 田文政(1993):大專院校運動場地使用規劃之研究。體育學報,16,115-132。
3. 宋維煌(1993):運動場地設施經營之探討,體育與運動,88,103-106。
4. 宋維煌(1993b):公立體育場的經營管理。國民體育季刊,22(1),65-75。
5. 官文炎(1992):論體育場的組織、功能與運作。國民體育季刊,21(1),53-62。
6. 林國棟(1996):學校體育之運動設施事業。大專體育,28,29 -45。
7. 陳美莉(2001):國立台灣大學體育教學因素與教學滿意度─ 落差理論之驗證。中華民國體育學會體育學報,30,21-31。
8. 曾國雄(1993):體育場的經營管理,國民體育季刊,22(1)。
9. 黃金柱(1992):從「P」組合論運動場地設施規劃興建與營運管理(一)。體育與運動,82,14-19 。
10. 張宗昌、莊清泉(1995):國立台中商專學生喜歡與不喜歡體育課因素調查。大專體育, 22,32-38。
11. 張家銘、孫美蓮、江長慈(2000):我國大學院校學生對體育課程的態度與滿意度之調查研究。中華體育,13(4),29-35。
12. 葉公鼎(1990):公立體育場的經營管理。國民體育季刊,19(1),78-85 。
13. 葉公鼎(1993):大型體育館營運方向的探討。國民體育季刊,22(1),90-96 。
14. 葉公鼎(2001b):掌握時勢發展學校體育運動設施經營的新契機,學校體育雙月刊,11(4),13-21。
15. 葉憲清(1999):臺灣公立體育場之體育館之經營研究,體育學報,27,1-10。
 
系統版面圖檔 系統版面圖檔