透過您的圖書館登入
IP:3.23.101.60
  • 學位論文

在車用無線網路中有效偵測封包來源位置的認證機制

A Novel Location Authentication Mechanism in Vehicular Ad-Hoc Networks

指導教授 : 孫宏民
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


Vehicular Ad hoc Networks have become more important topic in recent years. The development of Vehicle to Vehicle communication (V2V) and Vehicle to Infrastructure communication (V2I) provide many applications and services. Location verification is one of the crucial issues for VANETs, since forged position information has severe impact regarding both security and safety. In order to resist this problem, we propose a detection mechanism that is capable of recognizing nodes cheating about their position. The main idea of our proposed scheme is that with the help of reliable neighbors, each vehicle can deduce where a vehicle is currently driving. The analysis and evaluation of our protocol justify that our protocol has better performance on enhancing VANET security.

並列摘要


近年來隨著車用電子網路的發展與應用越來越蓬勃,無論是車體對車體之間的無線傳輸;亦或,車體和路面基礎建設的通訊,皆使得智慧運輸系統上的安全模式、交通便利性和商業應用上有廣泛的效益。然而,網路所帶來的便利性卻蘊含著潛在的危機,網路上的惡意攻擊層出不窮,使用這些應用服務的前提之下,必須滿足安全性的需求。如何增進行車時的道路交通安全並避免任何可能發生的交通事故更成為未來首要達成的目標。 此篇論文的研究主要是在車用無線隨意網路中發展一個可以認證節點相對位置並有效偵測出惡意節點於封包中偽造位置的機制,利用預測區域的概念,使得驗證車輛能夠根據來源封包內所紀錄的時間進而計算得到來源車輛的相對位置,並藉由鄰近車輛所計算出之結果做重疊比對以提升駕駛人的行車經驗及降低事故發生率。

並列關鍵字

無資料

參考文獻


[3] IEEE. 1609.2: Trial-use standard for wireless access in vehicular environments-security services for applications and management messages. IEEE standards,2006.
[4] F. Bai, T. Elbatt, G. Hollan, H. Krishnan, and V. Sadekar. Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective. In Proceedings of IEEE Workshop on Automotive Networking and Applications (AutoNet), 2006.
[5] AR Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46-55, 2003.
[6] S. Brands and D. Chaum. Distance-bounding protocols. Lecture Notes in Computer Science, 765:344-359, 1994.
[10] JP Hubaux, S. Capkun, and J. Luo. The security and privacy of smart vehicles. IEEE Security & Privacy, 2(3):49-55, 2004.

延伸閱讀