透過您的圖書館登入
IP:3.144.251.72
  • 學位論文

在無線隨意網路上安全通訊之研究

A Study of Secure Communications on Mobile Ad Hoc Networks

指導教授 : 孫宏民

摘要


由於無線隨意網路沒有固定的基礎建設,例如網路路由器與中央控管中心…等,且使用開放式的傳輸媒介,攻擊者可以很容易的達成竊聽攻擊、偽裝攻擊、丟棄攻擊以及共謀攻擊。透過這些攻擊,攻擊者可中斷傳輸、傳送錯誤訊息誤導接收者以及透過分析監聽封包得之節點隱私(位址,身分,路由資訊)。因此我們預期的研究目標是針對竊聽攻擊、偽裝攻擊、丟棄攻擊以及共謀攻擊,提出相對應的通訊協定,包含抵擋攻擊及保護節點隱私。基於我們所提出的機制,攻擊者不再能夠透過分析竊聽封包,去得知傳送者以及接收者的相關資料,包含位置與身分。 此外,當攻擊者發動封包丟棄攻擊時,即便攻擊者同部發動共謀攻擊,攻擊者也無法避免被偵測並排除於路由路徑之外,提供高可靠度的傳輸。

並列摘要


Because Mobile ad hoc networks (MANETs) lack the stationary infrastructures, such as network routers and adopt open wireless medium for communications, attackers can launch eavesdropping attacks, forged attacks, dropping attacks, and collusion attacks. To utilize these attacks, attackers can interrupt communications, send error message to receiver, and analyze the eavesdropping messages to destroy node privacy of sender and receiver. Node privacy contains identity privacy, location privacy, and route anonymity. Therefore, our expected research topic focuses on these attacks to propose the corresponding protocols. In our protocols, attackers cannot obtain any information about sender and receiver from analyzing the eavesdropping messages. Moreover, our protocols can resist dropping attacks and collusion attacks, and the attackers will not participate in route discovery.

參考文獻


[14] S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour, and Y. Nemoto, “Detecting blackhole attack on aodv-based mobile ad hoc networks by dynamic learning method,” International Journal of Network Security, vol. 5, no. 3, pp.338–346, 2007.
[1] Y. Lee, H. Kim, B. Chung, J. Lee, and H. Yoon, “On-demand secure routing protocol for ad hoc network using id based cryptosystem,” in Proceedings of the 4th IEEE International Conference on Parallel and Distributed Computing,Applications and Technologies (PDCAT), 2003.
[2] R. J. Yang, Q. Xia, Q. H. Pan, W. N. Wang, and M. L. Li, “New enhancement scheme for secure routing protocol in mobile ad hoc networks,” in Proceedings of the 5th International Conference on Computer and Information Technology (CIT), 2005.
[4] M. Goodrich, “Leap-frog packet linking and diverse key distributions for improved integrity in network broadcasts,” in Proceedings of the IEEE Symposium on Security and Privacy, 2005.
[6] Z. Li and S. Shi, “A secure routing protocol for mobile ad hoc networks,” in Proceedings of the IEEE International Conference on Computer and Information

延伸閱讀