(3.238.240.197) 您好!臺灣時間:2021/04/12 02:45
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:洪國勛
研究生(外文):Guo-Xin Hung
論文名稱:可抵抗阻斷式攻擊的非合作式對稱跳頻演算法
論文名稱(外文):A Jamming-Resilient Asynchronous Symmetric Uncoordinated Frequency Hopping Scheme
指導教授:張貴雲張貴雲引用關係
指導教授(外文):Guey-Yun Cheng
學位類別:碩士
校院名稱:國立中央大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2013
畢業學年度:101
語文別:英文
論文頁數:53
中文關鍵詞:無線跳頻技術干擾攻擊媒體存取控制層quorum systems
外文關鍵詞:frequency hoppingjamming attacksMACquorum systems
相關次數:
  • 被引用被引用:0
  • 點閱點閱:174
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:9
  • 收藏至我的研究室書目清單書目收藏:0
在無線網路中,干擾攻擊在近期被探討為一種會中斷RF間通訊的安全威脅,過去展頻技術 (例如. 跳頻展頻 (FHSS)以及直接序列展頻(DHSS)),常被廣泛的用來對抗干擾者無線通訊。這些對抗干擾者的技術必須依賴在通訊之前,事先在干擾者不知情的情況下共享密鑰。然而,這引發出在有干擾攻擊前安全交換初始密鑰的困難議題。
  為了解決這個問題,有幾種方式是在有干擾者的狀況下,依據不合作式跳頻(Uncoordinated Frequency Hopping)方法來建立鑰匙。在不合作式跳頻方法中,兩個節點可以在有干擾者的情況下,不需事先交換共享密鑰 (pre-shared key) 或展頻碼 (spread code) 即可彼此通訊。然而,現存的不合作式跳頻方法不是抵禦干擾者的能力較低,就是無法保證在對稱式或是在時間不同步的環境底下能夠相遇。
本篇論文,我們提出兩個新穎可抵抗干擾者攻擊的非合作式對稱跳頻方法, JRAS-1 以及 JRAS-2,相較於過去所提出的方法,我們的方法在有干擾者攻擊下,在平均相遇時間以及封包傳送成功率皆有較好的性能。

In wireless networks, jamming attacks have been recently studied as wireless security threats disrupting reliable RF communication. Traditionally, spread spectrum techniques (e.g., Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS)) have been widely used for anti-jamming wireless communications. These anti-jamming techniques are inevitable reliance on the pre-shared secret key which is unknown to the jammer between the communicating node pairs prior to the communication. However, it raises the non-trivial issue of secure exchange of initial key before the jamming attack.
To address this problem, several schemes relying on Uncoordinated Frequency Hopping (UFH) schemes have been studied to achieve resilient key establishment in presence of a jammer. In UFH, two nodes can communicate with each other in the presence of the jammers without sharing any pre-shared key or spread code. However, existing UFH schemes either suffer from low resilience ability or unguaranteed rendezvous in symmetric environments and time asynchronous environments.
In this paper, we introduce two novel Jamming-Resilient Asynchronous-Symmetric UFH schemes, JRAS-1 and JRAS-2. Compared with existing FQR schemes, our schemes can outperform in terms of the two metrics: average time to rendezvous and packet delivery ratio under the jamming attacks

Contents iv
Chapter 1 Introduction 1
Chapter 2 Related work and Preliminary 4
2.1 Related Work 4
2.2 Preliminary 7
Chapter 3 The proposed scheme 9
3.1 JRAS-1 9
3.2 JRAS-2 12
Chapter 4 14
Performance Analysis 14
4.1 Entropy 14
4.2 MTTR 16
Chapter 5 Performance Evaluation 21
5.1 Average Time to Rendezvous 22
5.2 Packet Delivery Ratio 31
Chapter 6 Conclusion 39
References 40

[1] E.-K. Lee, S. Y. Oh, and M. Gerla, “Frequency quorum rendezvous for fast and resilient key establishment under jamming attack,” ACM SIGMOBILE Mobile Computing Communications Review, vol. 14, no. 4, 2010.
[2] E.-K. Lee, S. Y. Oh, and M. Gerla, “Timely and robust key establishment under jamming attack in critical wireless networks,” in IEEE Military Communications Conference (MILCOM), 2011.
[3] Y.-H. Oh and D. J. Thuente, “Limitations of quorum-based rendezvous and key establishment schemes against sophisticated jamming attacks,” in IEEE Military Communications Conference (MILCOM), 2012.
[4] K. Bian, J.-M. Park, and R. Chen, “Control channel establishment in cognitive radio networks using channel hopping,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 4, 2011.
[5] K. Bian, and J.-M. Park, “Asynchronous channel hopping for establishing rendezvous in cognitive radio networks,” in IEEE Conference on Computer Communications (INFOCOM), 2011.
[6] Y. W. Law, P. Hartel, J. den Hartog, and P. Havinga, “Linklayer jamming attacks on s-mac, ” In European Workshop on Wireless Sensor Networks (EWSN), 2005.
[7] K. Bian, J.-M. Park, and R. Chen, “A quorum-based framework for establishing control channels in dynamic spectrum access networks,” in ACM the International Conference on Mobile Computing and Networking (MobiCOM), 2009.
[8] K. Bian, and J.-M. Park, “Maximizing rendezvous diversity in rendezvous protocols for decentralized cognitive radio networks”, IEEE Transactions on Mobile Computing, vol. 12, no. 7, 2012.
[9] L. A. DaSilva and I. Guerreiro, “Sequence-based rendezvous for dynamic spectrum access,” in IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), 2008.
[10] Z. Lin, H. Liu, X. Chu, and Y.-W. Leung, “Jump-stay based channel-hopping algorithm with guaranteed rendezvous for cognitive radio networks,” in IEEE Conference on Computer Communications (INFOCOM), 2011.
[11] H. Liu, Z. Lin, X. Chu, and Y.-W. Leung, “Jump-stay rendezvous algorithm for cognitive radio networks,” IEEE Transactions on Parallel and Distributed System, vol. 23, no. 10, 2012.
[12] C.-F. Shih, T. Y. Wu, and W. J. Liao, “DH-MAC: a dynamic channel hopping mac protocol for cognitive radio networks,” in IEEE International Conference on Communications (ICC), 2010.
[13] R. Srinivasa, “The lost notebook and other unpublished papers,” Springer Berlin, pp. 339, ISBN 3-540-18726-XY, 1988.
[14] Zhang, Q. Li, G. Yu, and B. Wang, “ETCH: efficient channel hopping for communication rendezvous in dynamic spectrum access networks,” in IEEE Conference on Computer Communications (INFOCOM), 2011.
[15] J.-R. Jiang, Y.-C. Tseng, C.-S. Hsu, and T.-H. Lai, “Quorum-based asynchronous power-saving protocols for IEEE 802.11 ad hoc networks,” Springer Journal Mobile Network and Applications, vol. 10, no. 1-2, 2005.
[16] W.-S. Luk and T.-T. Wong, “Two new quorum based algorithms for distributed mutual exclusion,” in IEEE International Conference on Distributed Computing Systems (ICDCS), 1997.
[17] M. Maekawa, “A n algorithm for mutual exclusion in decentralized systems,” ACM Transactions on Computer Systems, vol. 3, no. 2, 1985.
[18] M. Strasser, C. P¨opper, and S. Capkun, “Efficient uncoordinated fhss anti-jamming communication,” in ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2009.
[19] M. Strasser, C. Popper, S. Capkun, and M. Cagalj, “Jamming resistant key establishment using uncoordinated frequency hopping,” in IEEE Symposium on Security and Privacy (S&P), 2008.
[20] P. Xu, K. Ren, and X.-Y. Li, “Towards optimal adaptive ufh-based anti-jamming wireless communication” IEEE Journal on Selected Areas in Communications, vol. 30, no. 1, 2012.
[21] S. Liu, L. Lazos, and M. Krunz, “Thwarting control-channel jamming attacks from inside jammers,” IEEE Transactions on Mobile Computing, vol. 11, no. 9, 2012.
[22] K. Xu, Q. Wang, and K. Ren, “Joint ufh and power control for effective wireless anti-jamming communication,” in IEEE Conference on Computer Communications (INFOCOM), 2012.
[23] Q. Wang, P. Xu, K. Ren, and X.-Y. Li, “Delay-bounded adaptive UFH-based anti-jamming wireless communication,” in IEEE Conference on Computer Communications (INFOCOM), 2011.
[24] C. Popper, M. Strasser, and S. Capkun, “Anti-jamming broadcast communication using uncoordinated spread spectrum techniques” IEEE Journal on Selected Areas in Communications, vol. 28, no. 5, 2010.
[25] S. Lai, Î. Zhang, Î. Ravindran and H. Cho, “CQS-Pair: Cyclic Quorum System Pair for Wakeup Scheduling in Wireless Sensor Networks,” in Proc. Principles of Distributed Systems (OPODIS), pp.295 -310, 2008
[26] J.-R. Jiang, Y.-C. Tseng, C.-S. Hsu and T. Lai, “Quorum-based asynchronous power-saving protocols for IEEE 802.11 ad hoc networks,” ACM Journal on Mobile Networks and Applications, Vol. 10, Issue 1-2, pp. 169–181, Feb. 2005.

連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔