跳到主要內容

臺灣博碩士論文加值系統

(44.211.117.197) 您好!臺灣時間:2024/05/23 11:13
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:林裕翔
研究生(外文):Yu-Hsiang Lin
論文名稱:一種利用AODV協定在移動隨意網路安全繞線的方法
論文名稱(外文):A Secure Routing Method in Mobile ad hoc Network by Using AODV Protocol
指導教授:黃德成黃德成引用關係
口試委員:鄧德雋謝韶徽蕭敏學
口試日期:2011-07-29
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊科學與工程學系所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:中文
論文頁數:51
中文關鍵詞:隨意網路確認性完整性保護雜湊函數公鑰密碼系統
外文關鍵詞:ad hoc networksauthenticityintegrity protectionhash functionPKC
相關次數:
  • 被引用被引用:0
  • 點閱點閱:169
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
近年來,無線隨意網路廣受歡迎,由於它的移動性、有彈性和易於佈署的特色,使它不會發生在有線網路的獨特問題。依靠高動態節點來傳送網路封包到目的點,無線隨意網路特別地容易受到氾濫(flooding)、攔截、竄改(tempering )和偽造(forging)封包的攻擊。

無線隨意網路因沒有一個中央管理機制,所以它要面對巨大的安全挑戰,因此,可靠的通訊要依賴一個機制去驗證網路流量的確認性(authenticity)和通訊用戶的身份。

在本文中,我們提出一個適應性和輕量級(lightweight)逐跳路徑(hop by hop)的零知識確認鏈ZKAC (Zero Knowledge Authentication Chain)。它是基於計算低廉雜湊函數(hash function)和不需信任第三方(TTP)的公鑰密碼系統(PKC)。ZKAC針對繞線和資訊傳輸,能使逐跳路徑以及端點到端點(end to end)有完整性保護(integrity protection)。


Wireless ad hoc networks are gaining popularity in recent years. Due to their mobility, flexibility and ease of deployment features, they introduce unique problems that do not appear in the wired network. Relying on highly dynamic nodes to forward the network packets to the destinations, wireless ad hoc networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets.

Without a central administration, ad hoc networks face huge security challenge. Thus, reliable communication in such networks essentially depends on mechanisms to verify the authenticity of network traffic and the identity of communicating peers.

In this paper we introduce an adaptive and lightweight hop to hop zero knowledge authentication chain (ZKAC). Based on computational cheap hash function and public-key scheme without trust third party(TTP). ZKAC enable hop to hop as well as end to end integrity protection for routing and information transformation.


中文摘要 I
ABSTRACT II
目錄 III
圖表目錄 V
一、介紹 1
1.1 研究動機 1
1.2 研究方法 3
1.3 論文架構 3
二、相關背景知識 4
2.1 AODV介紹 4
2.1.1 路徑搜尋 4
2.1.2 路徑維護 7
2.1.3 封包傳送格式 7
2.2 公鑰密碼系統 8
2.3 單向雜湊函數 9
2.3.1 單向雜湊函數鏈 10
2.4 訊息確認碼 11
2.5 數位簽章 12
三、相關研究 14
3.1 身份識別的加密 14
3.2 Hash-chain-based Signatures 14
3.2.1 Time-based Signatures 15
3.2.2 Interactive Hash Chain-based Signatures 16
3.3 Packet Level Hop-by-Hop Authentication Chain 17
3.4 ZCK協定介紹 18
四、ZKAC協定技術 21
4.1 ZKAC協定介紹 21
4.1.1 ZCKE協定的基本觀念 21
4.1.2 ZCKE協定 22
4.1.3 ZKAC協定 25
4.2 ZKAC協定細節描述 28
4.2.1 路徑請求 28
4.2.2 路徑查詢/轉傳 28
4.2.3 路徑回覆 29
4.2.4 路徑回覆驗證 30
4.2.5 中繼節點回覆 31
4.2.6 路徑維護 31
五、實驗與討論 33
5.1 Scenario 34
六、結論與未來研究方向 49
參考文獻 50


[1]F. Bergadano, D. Cavagnino, and B. Crispo, “Chained stream authentication,” in Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000, Vol. 2012 of Lecture Notes in Computer Science, pp. 144-157, Aug. 2000.
[2]A. Perrig, R. Canetti, J.D. Tygar, and D. Song, “The TESLA Broadcast Authentication Protocol,” UC Berkeley and IBM Research, Vol. 5, No. 2, pp. 2-13, 2002.
[3]J. Ylitalo, V. Torvinen, and E. Nordmark, “Weak Identifier Multihoming Protocol (WIMP),” Internet Draft, IETF, <draft-ylitalomulti6- wimp-00.txt>, Jan. 2004.
[4]Anderson, R., Bergadano, F., Crispo, B.,Lee, J., Manifavas, C., and Needham, R., “A new family of authentication protocols,” Operating systems review Vol.32, Nr.4 , pp. 9-20, 1998.
[5]D. Liu and P. Ning, “Multilevel μTESLA: Broadcast authentication for distributed sensor networks,” ACM Trans. Embedded Computer System, Vol. 3, no. 4, pp. 800-836.
[6]Cheung, S, “An efficient message authentication scheme for link state routing,” 13th Annual Computer Security Applications Conference, pp. 90-98, 1997.
[7]Perrig, A., Canetti, R., Song, D., and Tygar, J., “Efficient and secure Source Authentication for Multicast.,” NDSS ’01 , 2001.
[8]Torvinen, V., and Ylitalo, J., “Weak Context Establishment Procedure for Mobility Management and Multi-Homing,” IFIP Conference on Communications and Multimedia Security, 2004.
[9]Weimerskirch, A., and Westhoff, D., “Zero Common-Knowledge Authentication for Pervasive Networks,” SAC ’03 , 2003.
[10]Yao, T., Fukunaga, S., and Nakai, T., “Reliable broadcast message authentication in wireless sensor networks,” In EUC Workshops, 2006.
[11]Zhu, S., Xu, S., Setia, S., and Jajodia, S., “LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks,” Distributed Computing Systems Workshops, 2003.
[12]Lu, B., and Pooch, U. W., “A Light-weight Hop-by-hop Authentication Protocol for Mobile Ad Hoc Networks,” International Journal of Information Technology, Vol.11, No.2, 2005.
[13]Akbani, R., Korkmaz, T., and Raju, G., “HEAP: Hop-by-hop Efficient Authentication Protocol For Mobile Ad-hoc Networks,” CNS 07, 2007.
[14]Zhu, S., Setia, S., Jajodi a, S., and Ning, P., “An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks ,”Security and Privacy , 2004.
[15]Ye, F., Luo, H., Lu, S., and Zhang, L., “Statistical En-Route Filtering of Injected False Data in Sensor Networks,” IEEE Journal on Selected Areas in Communications 23, 2005.
[16]Zhang, W., Subramanian, N., and Wang, G., “Lightweight and compromise -resilient message authentication in sensor networks,” INFOCOM 2008, 2008.
[17]Papadimitratos, P. and Z.J. Haas, “Secure Routing for Mobile Ad hoc Networks,” In Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation (CNDS‘02), pp. 27-31, 2002.
[18]P. Ning and K. Sun, “How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols,” In Proceedings of the 4th Annual IEEE Information Assurance Workshop, pp. 60-67, June 2003.
[19]C. Perkins, E. Belding-Royer, S. Das, “Ad hoc on-demand distance vector (AODV) routing,” IETF Internet Draft, draft-ietf-manet-aodv-13.txt, February 2003.
[20]Gentry, C. and Silverberg, A., “Hierarchical Id-based cryptography,” Advances in Cryptology , Springer-Verlag, pp. 548-566, 2002.
[21]Krawczyk, H., Bellare, M., and R. Canetti, “HMAC: Keyed-Hashing for Message Authentication,” RFC 2104, February 1997.
[22]A. Menezes, P.C. van Oorschot and S.A. Vanstone. Handbook of Applied Cryptography , CRC Press , 1997.
[23]粘添壽、吳順裕,資訊與網路安全技術,旗標出版股份有限公司,台北,2004,第1-4頁~1-13頁。


QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top