透過您的圖書館登入
IP:18.217.84.171
  • 期刊

應用於5G環境中之快速代理認證與可信賴資料加密協定

Fast Proxy Authentication and Trusted Data Encryption Protocol Applied in 5G Environments

摘要


由於資訊科技的蓬勃發展,社會大眾對上網服務的需求亦逐漸增加,且伴隨著行動電信產業的進步,人們對於上網速率及效能的提升都有相對高的期待,因此語音傳輸的技術同時必須跟著演進,從原本提供數據服務業務且只能滿足簡單的通訊、簡訊、上網單一功能的2G,到有較多媒體形式可處理的3G網路,此外,為滿足用戶們對於無線服務及更高速語音通話的需求,行動寬頻網路4G LTE也因應而生,並進一步研究出擁有更大頻寬、更高效能的5G網路。然而近期物聯網的興盛,同時提升人們對資訊傳輸的高依賴性,進而給5G環境帶來較大的負擔。針對此憂慮,本論文採用多個裝置在物聯網的環境中會互相通訊之特性,並結合類細菌網路的環境架構,於5G網路中建構一套能夠快速代理認證,同時包含可信賴之檔案加密協定的環境,使得資訊傳輸不再僅限於必須透過基地台,使用者亦可自行選擇所要傳輸的路徑,不過也因為在5G環境中每一位用戶都必須與基地台進行合法的認證,且難以去預防傳輸中的惡意節點或者特定人士的惡意行為,有使用上的資安問題及效能的擔憂。因應此問題,本論文於先前研究上結合委外運算的概念以及盲化資料的處理,設計出一套兼具輕量化和盲化特性之委外認證機制,使得各個裝置能透過安全的擴散式傳輸管道相互傳送資訊,同時確保傳送節點及數據來源是否合法。而沿襲先前之成果,此次計畫使用密文切割、重組以及整合的技術,同時包含門檻式機制(Threshold)容錯的特性,有效降低基地台運算及傳輸資訊之負擔,預計可以達到增加資訊傳輸效能之目的,並且提升網絡環境的整體服務品質。

並列摘要


Due to the rapid development of information technology, the demand for Internet services has gradually increased. With the advancement of the mobile telecommunications industry, people have relatively high expectations for the improvement of Internet speed and performance. Therefore, voice transmission technology must keep up with the speed of evolution. This evolution process is from 2G network that originally provided the data service business and can only satisfy the simple communication, SMS, and single function of the Internet, to the 3G network that can be processed in the multimedia form. In addition, to meet users' demand for wireless services and higher-speed voice calls, the mobile broadband network of 4G LTE has also evolved, and telecommunications providers further research into 5G networks with greater bandwidth and higher performance. However, the recent booming in IoT (Internet of Things) has also raised people's high dependence on information transmission, which has placed a heavy burden on the 5G network environment. For this concern, this paper combines the concept of Bacteria-inspired network with the feature that multiple devices can communicate with each other in the IoT environment, so that we can construct an environment with fast proxy authentications and a trustworthy file encryption protocol. The data transmission is no longer limited to having to pass through the base station, instead, the user can select the path for transmitting to be transmitted. However, each user must be legally authenticated with the base station in the 5G network environment, and it is difficult to prevent the malicious nodes in the transmission or the malicious behavior of specific people, so there are some worries about the security problems and performance. In response to this problem, this paper combined the concept of outsourcing computing with blind processing in the above project and built a set of outsourcing authentication mechanisms with both lightweight and blind data features, so that each device can transmit information to each other through a secure diffusion transmission pipeline, and we can ensure that the transmission node and data source are legitimate at the same time. Following the above results, our project can effectively reduce the burden on the base station to calculate and transmit information by ciphertext cutting, recombination and integration technologies with threshold fault tolerance. It is expected that the purpose of transmitting the information efficiently can be achieved and the overall service quality of the network environment will be improved.

參考文獻


R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka and J. Molina, “Controlling data inthe cloud: outsourcing computation without outsourcing control,” in Proc. of the 2009 ACM workshopon Cloud computing security. ACM, pp. 85-90, November 13, 2009
A. Yao, "Protocols for secure computations." In Proceedings of the IEEE Symposium on Foundationsof Computer Science, pp. 160-164, 1982.
A. Yao, "How to generate and exchange secrets." In Proceedings of the IEEE Symposium onFoundations of Computer Science, pp. 162-167, 1986.
Chow, and Richard, “Controlling data in the cloud: outsourcing computation without outsourcingcontrol.” Proceedings of the 2009 ACM workshop on Cloud computing security. ACM, 2009.
Shamir, Adi. "How to share a secret." Communications of the ACM 22.11 (1979): 612-613.

延伸閱讀