透過您的圖書館登入
IP:216.73.216.100
  • 學位論文

分散式多重密鑰管理機制應用於群集隨意型網路

Distributed Multiple Secret Key Management for Cluster-based Ad Hoc Networks

指導教授 : 劉如生

摘要


Ad Hoc 無線網路是一種自主性的行動節點,藉由無線的聯繫連接起來,它本身沒有任何固定的基礎建設。要應付不斷增加的節點其中一種方法就是將整個網路分成群組並藉由每個群組中的代表產生一個虛擬的骨幹。 在本計劃中,我們將有效的解決在群組化的行動隨意網路中金鑰的管理方法。在隨意型的網路中,安全通訊是相當具有挑戰性的,這是因為網路的動態特性與缺乏集中管理的因素。因此金鑰的管理在如此的網路中實行是特別的困難。我們將提出一個完全分散式的ID-based multiple secret key management scheme (IMKM) ,它結合了 ID-based,multiple secret 和 threshold 的密碼系統方法。這種方法免除了以證書為基礎須經過認證的公鑰分布,並且提供了有效的密鑰更新和廢除機制,成就了在行動隨意網路中更經濟,適應性更強並且更容易擴充的金鑰管理方法。另外就目前為止,以往的研究方法皆由一個權責單位來產生master secret key,並將計算出來的share key傳送給網路上的所有節點.我們所提出的IMKM協定將是第一個把master secret key完全分散由所有節點共同產生之研究.這樣的獨立運作機制在無線網路的安全及效能上將會有更佳的表現.

並列摘要


An ad hoc wireless network is an autonomous system of mobile nodes connected through wireless links. It does not have any fixed infrastructure. A way to support the increasing number of nodes in MANETs is to subdivide the whole network into groups, and then create a virtual backbone between delegate nodes in each group. In this dissertation, we address key management in cluster-based mobile ad hoc networks (MANETs). Ensuring secure communication in an ad hoc network is extremely challenging because of the dynamic nature of the network and the lack of centralized management. For this reason, key management is particularly difficult to implement in such networks. We present a fully-distributed ID-based multiple secret key management scheme (IMKM). This scheme is implemented via a combination of ID-based multiple secret and threshold cryptography. It eliminates the need for certificate-based authenticated public-key distribution and provides an efficient mechanism for key update and key revocation schemes, which leads to more suitable, economic, adaptable, scalable, and autonomous key management for mobile ad hoc networks. Besides, as of now, the master secret key is created by a centralized authority and the share key is computed and sent to all members from the authority in all the previous works. Our proposed IMKM protocol is the first research that generates the master secret key by the cooperation of all the members in ad hoc networks. Such a distributed scheme leads to a more secure, reliable and efficient wireless network.

參考文獻


[15] K.K. Choo, “Revisit of McCullagh-Barreto two-party ID-based authenticated key agreement protocols,” International Journal of Network Security, Vol. 1, No. 3, pp. 154-160, 2005.
[3] Y.C. Hu, D.B. Johnson and A. Perrig, “SEAD: Secure efficient distance vector routing in mobile wireless ad-hoc networks,” Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA‘02), pp. 3-13, 2002.
[4] P. Papadimitratos and Z. Haas, “Secure routing for mobile ad hoc networks,” Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation (CNDS‘02), pp. 27-31, 2002.
[5] A. Shamir, “Identity-based cryptosystems and signature schemes,” IN Advances in Cryptology (Crypto‘84), LNCS 196, pp.47-53, Springer-Verlag, 1984.
[7] D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” In Advances in Cryptology (Crypto’01), LNCS 2139, pp. 213-229, 2001.

被引用紀錄


Po, R. W. (2014). 以系統動力學探索台灣論人計酬試辦計畫 [doctoral dissertation, National Tsing Hua University]. Airiti Library. https://doi.org/10.6843/NTHU.2014.00447
黃雅姿(2010)。實施TW-DRGS前影響醫院住院資源利用之因素及年度變化-以婦產科為例〔碩士論文,臺北醫學大學〕。華藝線上圖書館。https://doi.org/10.6831/TMU.2010.00147
鄭瑋婷(2014)。影響醫師工作績效因素之研究-以南部某市立醫院為例〔碩士論文,義守大學〕。華藝線上圖書館。https://doi.org/10.6343/ISU.2014.00266
林文華(2005)。分階段導入論病例計酬對醫院住院醫療費用之影響〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2005.00147
黃惠瑩(2006)。疼痛控制對腹部手術住院醫療利用之影響-以某醫學中心腹部全子宮切除術為例〔碩士論文,亞洲大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0118-0807200916274169

延伸閱讀