跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.85) 您好!臺灣時間:2025/01/21 17:44
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:李泊縉
研究生(外文):Po-Chin Lee
論文名稱:以漫遊概念為基礎之多網域架構車載網路匿名認證協定
論文名稱(外文):A Roaming-based Anonymous Authentication Scheme in Multi-domains Vehicular Networks
指導教授:王智弘王智弘引用關係
指導教授(外文):Chih-Hung Wang
學位類別:碩士
校院名稱:國立嘉義大學
系所名稱:資訊工程學系研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2010
畢業學年度:98
語文別:中文
論文頁數:50
中文關鍵詞:車載網路資訊安全隱私保護認證協定匿名
外文關鍵詞:Vehicular NetworksSecurityPrivacyAuthenticationPseudonym
相關次數:
  • 被引用被引用:0
  • 點閱點閱:300
  • 評分評分:
  • 下載下載:48
  • 收藏至我的研究室書目清單書目收藏:0
在車載網路中,車載網路的使用者可以與其他車載網路的使用者進行通訊或是連結到網際網路。一個車載網路的使用者可以移動在多個不同網域之間包含本地端網域(Home Network)或是外地端網域(Foreign Network)。在某些情況下,惡意的攻擊者可能企圖去暴露或追蹤車輛在車載網路中所使用的真實身份(Real Identity)或是車輛位置隱私(Location Privacy)。這將會對車載網路的隱私上造成一種挑戰(Challenges)。另一方面,當車載網路的使用者進入外地端網域時,因為車載網路的使用者並不屬於外地端網域的成員,因此外地端伺服器並無法直接認證車載網路使用者的身份。而漫遊的概念可被用來解決這樣的情形。本論文提出在多網域(Multi-domains)車載網路中具有隱私保護能力的認證協定。當車載網路的使用者與本地端網域或外地端網域進行通訊時,本論文考慮三種不同的情況,並藉由利用基於多項式池之金鑰分配方法(Polynomial-pool Based Key Distribution Scheme)以及漫遊概念(Roaming Technology)分別針對這些情況設計車載網路匿名認證協定。而這些認證協定設計來保護車載網路的使用者真實身份的隱私以及防止車輛位置隱私被暴露。在安全分析上也與現有之文獻提出的方法進行討論與比較。
In vehicular networks, a vehicular user can communicate with peer vehicles or connect to Internet. A vehicular user could move across multiple access points belonging to either their home network domain or foreign network domains. In some cases, the real identity or location privacy may be disclosed or traced by malicious attackers. This poses challenges on privacy to the current vehicular networks. On the other hand, when a vehicular user drives to the foreign network, the foreign server has no idea to authenticate the vehicular user who is not the member of foreign server. A roaming concept can be used to solve this problem. In this thesis, we propose a privacy preserving authentication scheme in multi-domains vehicular networks. Our scheme considers three kinds of situations when the vehicular users communicate with the home network or foreign networks, and gives some approaches for them by combining polynomial-pool based key distribution scheme and roaming technology. The proposed authentication protocols are designed for preserving vehicular user’s real identity and location privacy. The security analysis and comparisons with the previous works are also discussed.
中文摘要 i
ABSTRACT ii
誌謝 iv
目錄 v
圖目錄 viii
表目錄 ix
第一章、緒論 1
1.1 車載網路之應用 1
1.2 研究目的 2
1.3 主要貢獻 5
1.4 論文架構 6
第二章、研究背景 7
2.1 網路模型 7
2.2 攻擊種類 8
2.3 安全需求 9
第三章、相關研究 11
3.1 Xi等學者的匿名認證協定 11
3.2 Zhang等學者的車輛位置隱私保護認證協定 13
3.3 Kim等學者的隱私保護認證協定 14
3.4 Chuang等學者的方法 15
3.5 Hubaux 等學者使用假名的方法 17
3.6 Fonseca等學者使用假名的方法 18
第四章、以漫遊概念為基礎之多網域架構車載網路匿名認證協定 20
4.1 基於多項式池之金鑰分配 20
4.2 協定描述 21
4.2.1 車載網路使用者於本地端網域內之匿名認證協定 22
4.2.2 車載網路使用者短期處於外地端網域的匿名認證協定 28
4.2.3 車載網路使用者長期處於外地端網域的轉變網域協定 31
第五章、分析與討論 34
5.1. 安全分析 34
5.1.1 認證 34
5.1.2 機密性與完整性 35
5.1.3 隱私性 37
5.1.4 不可追蹤性 38
5.1.5 效率性 39
5.2. 實用性 40
5.3. 比較 42
第六章、結論 45
參考文獻 48

[1] A. Aijaz, B. Bochow, F. Dotzer and A. Festag, “Attacks on Inter Vehicle Communication Systems - an Analysis,” The 3rd International Workshop on Intelligent Transportation (WIT 2006), 2006.

[2] F. Armknecht, A. Festag, D. Westhoff and K. Zeng, “Cross-Layer Privacy Enhancement and Non-Repudiation in Vehicular Communication,” The 4th Workshop on Mobile Ad-Hoc Networks (WMAN), Bern Switzerland, March 2007.

[3] J. Y. Choi, M. Jakobsson and S. Wetzel, “Balancing Auditability and Privacy in Vehicular Networks,” The 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, pp. 79-87, 2005.

[4] M. C. Chuang and J. F. Lee, “LMAM: A Lightweight Mutual Authentication Mechanism for Network Mobility in Vehicular Networks,” 2008 IEEE Asia-Pacific Services Computing Conference (APSCC 2008), pp. 1611-1616, 2008.

[5] C. C. Chang, C. Y. Lee and Y. C. Chiu, “Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks,” Computer Communications, Volume 32, no. 4, pp. 611-618, 2009.

[6] H. Chen, A. Perrig and D. Song, “Random Key Predistribution Scheme for Sensor Networks,” IEEE Symp. Security and Privacy (S&P’ 03), pp. 197-213, 2003.

[7] G. Calandriello, P. Papadimitratos, J. P. Hubaux and A. Lioy, “Efficient and Robust Pseudonymous Authentication in VANET,” The fourth ACM International Workshop on Vehicular Ad hoc Networks, pp. 19-28, 2007.

[8] S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh and J. M. Tang, “Framework for Security and Privacy in Automotive Telemetries,” The 2nd ACM International Workshop on Mobile Commerce, pp. 25-32, 2002.

[9] M. Elzarki, S. Mehrotra, G. Tsudik and N. Venkatasubramanian, “Security Issues in A Future Vehicular Network,” The European Wireless Conference (EuroWireless '02), 2002.

[10] E. Fonseca, A. Festag, R. Baldessari and R. L. Aguiar, “Support of Anonymity in VANETs – Putting Pseudonymity into Practice,” IEEE Wireless Communications and Networking Conference, pp. 11-15, 2007.

[11] M. Gerlach, A. Festag, T. Leinmller, G. Goldacker and C. Harsch, “Security Architecture for Vehicular Communication,” In WIT 2005.

[12] M. Gerlach and F. Guttler, “Privacy in VANETs using Changing Pseudonyms - Ideal and Real,” The 65th Vehicular Technology Conference (VTC2007), pp. 2521-2525, 2007.
[13] J. P. Hubaux, S. Capkun and J. Luo, “The Security and Privacy of Smart Vehicles,” IEEE Security and Privacy Magazine, Volume 2, Issue 3, pp. 49-55, 2005.

[14] Y. X. Jiang, C. Lin, X. M. Shen and M. G. Shi, “Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks,” IEEE Transactions on Wireless Communications, Volume 5, Issue 9, pp. 2569-2577, 2006.

[15] S. H. Kim, B. H. Kim, Y. K. Kim and D. H. Lee, “Auditable and Privacy-Preserving Authentication in Vehicular Networks,” The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM'08), pp. 19-24, 2008.

[16] J. Luo and J. P. Hubaux, “A Survey of Inter-Vehicle Communication,” EPFL Technical Report IC, 2004.

[17] N. W. Lo and H. C. Tsai, “Illusion Attack on VANET Applications – A Message Plausibility Problem,” Dept. of Information Management, NTUST, Technical Report, 2007.

[18] D. Liu and P. Neng, “Establishing Pair-wise Keys in Distributed Sensor Networks,” The 10th ACM Conference on Computer and Communications Security (CCS), pp. 52-61, 2003.

[19] P. Papadimitratos, L. Buttyan, J. P. Hubaux, F. Kargl, A. Kung and M. Raya, “Architecture for Secure and Private Vehicular Communications,” The 7th International Conference on ITS Telecommunications, pp. 1-6, 2007

[20] P. Papadimitratos, A. King, J. P. Hubaux and F. Kargl, “Privacy and Identity Management for Vehicular Communication Systems: a Position Paper,” Workshop on Standards for Privacy in User-Centric Identity Management, 2006.

[21] K. Plobl, T. Nowey and C. Mletzko, “Towards a Security Architecture for Vehicular Ad Hoc Networks,” The First International Conference on Availability, Reliability and Security (ARES' 06), 2006.

[22] B. Parno and A. Perrig, “Challenges in Securing Vehicular Networks,” Workshop on Hot Topics in Networks (HotNets-IV), 2005.

[23] M. Raya and J. P. Hubaux, “The Security of Vehicular Ad hoc Networks,” The 3rd ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 11-21, 2005.

[24] M. Raya and J. P. Hubaux, “Securing Vehicular Ad hoc Networks,” Journal of Computer Security, Volume 15, Issue 1, pp. 39-68, 2007.

[25] M. Raya and J. P. Hubaux, “Efficient Secure Aggregation in VANETs,” The 3rd International Workshop on Vehicular Ad hoc Networks, pp. 67-75, 2006.

[26] X. T. Sun, X-D. Lin and P. H. Ho, “Secure Vehicular Communications Based on Group Signature and Id-based Signature Scheme,” IEEE International Conference on Communications (ICC '07), pp. 1539-1545, 2007.
[27] Z. Wan, K. Ren and B. Preneel, “A Secure Privacy-preserving Roaming Protocol Based on Hierarchical Identity-based Encryption for Mobile Networks,” The first ACM Conference on Wireless Network Security, pp. 62-67, 2008.

[28] Q. Xu, T. Mak, J. Ko and R. Sengupta, “Vehicle-to-Vehicle Safety Messaging in DSRC,” The first ACM Workshop on Vehicular Ad hoc Networks, pp. 19-28, 2004.

[29] Y. Xi, K. Sha, W. Shi, L. Schwiebert and T. Zhang, “Enforcing Privacy using Symmetric Random Key-set in Vehicular Networks,” International Symposium on Autonomous Decentralized Systems (ISADS '07), pp. 344-351, 2007.

[30] B. Xiao, B. Yu, and C. Gao, “Detection and Localization of Sybil Nodes in VANETs,” The 2006 Workshop on Dependability Issues in Wireless Ad hoc Networks and Sensor Networks, pp. 1-8, 2006.

[31] G. M. Yang, S. Wong and X. T. Deng , “Anonymous and Authenticated Key Exchange for Roaming Networks,” IEEE Transactions on Wireless Communications, Volume 6, no. 9, pp. 3461-3472, 2007

[32] C. Zhang, R. X. Liu, P. H. Ho, and A. Chen, “A Location Privacy Preserving Authentication Scheme in Vehicular Networks,” IEEE Wireless Communications and Networking Conference, pp. 2543-2548, 2008.

[33] C. Zhang, R. Lu, X. D. Lin, P. H. Ho and X. M. Shen, “An Efficient Identity-based Batch Verification Scheme for Vehicular Sensor Networks,” The 27th IEEE Conference on Computer Communications, pp. 246-250, 2008.

[34] Now:Network on wheels, http://www.network-on-wheels.de/

連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top