透過您的圖書館登入
IP:18.188.142.146
  • 學位論文

無線網路環境中協同式安全之 SCTP 通訊協定之設計

Design of a Collaborative Secure SCTP Protocol over Wireless Networks

指導教授 : 楊正仁
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


Stream Control Transmission Protocol 是由 IETF 在2000 年所提出之傳輸層通訊協定的標準。 SCTP 具備了許多新的特性, 如 multi-homing 與 multi-streaming。然而, 在 SCTP 的原始設計裡,並沒有考慮到無線網路環境的效能問題以及網路安全傳輸的問題。在過往的研究當中,若不是討論如何增進 SCTP 在無線網路環境中的效,就是只討論如何加強 SCTP 的安全性, 沒有研究同時考慮這兩個問題。 在本論文中, 我們同時考慮這兩個問題, 並提出新的 SCTP 通訊協定, 稱之為 Collaborative Secure SCTP (CS-SCTP)。在 CS-SCTP 中, 包含了三個重要的機制:部分認證機制(Partial Authentication),二階段加密機制(Two-level Key Encryption),以及組合式區塊加密機制(Assembled Chunk Encryption)。CS-SCTP 具備了 C-SCTP 在無線網路中高效能傳輸的優點, 以及 S-SCTP 的安全功能。 在 ns-2 的模擬中, 我們證明 CS-SCTP 提升在無線網路中資料傳輸的效能。在安全性的要求不是很嚴格的時候, CS-SCTP 在無線網路環境中的傳輸效能也有很好的表現, 相當於不具安全性之 C-SCTP 的效能表現。

並列摘要


The Stream Control Transmission Protocol (SCTP) is a transport layer protocol proposed by IETF in 2000. SCTP has many new features, such as multi-homing and multistreaming. However, its native design does not consider the wireless environments and the security demands. In the past, many studies were conducted either to improve the performance of SCTP in a wireless environment, or to enhance the security functionality. The consideration for both issues simultaneously is not found in past research. In this thesis, we propose a modified SCTP protocol called Collaborative Secure SCTP (CS-SCTP) with three enhancement methods, Partial Authentication, Two-level Key Encryption, and Assembly Chunk Encryption to improve the transmission performance of a secure SCTP connection in wireless networks based on the collaborative concept. CSSCTP preserves the performance advantages in Collaborative SCTP (C-SCTP) and the security functionality in Secure SCTP (S-SCTP). In the simulations, CS-SCTP outperforms S-SCTP in all different security requirements. If the security requirement is not rigid, the performance of CS-SCTP is comparable to that of C-SCTP.

參考文獻


[1] “Advanced Encryption Standard (AES),” FIPS PUB 197, Nov. 2001. [Online].
[2] “Recommendation for Block Cipher Modes of Operation,” SP 800-38A, Dec.
[3] “Secure Hash Standard,” FIPS PUB 180-2, Aug. 2002. [Online]. Available:
[4] “The Keyed-Hash Message Authentication Code (HMAC),” FIPS PUB 198,
[5] T. Aura, P. Nikander, and G. Camarillo, “Effects of Mobility and Multihoming on

延伸閱讀