透過您的圖書館登入
IP:18.223.119.17
  • 學位論文

VANETs 的弱點分析及攻擊實作–以 AODV 協定為例

Vulnerability Analysis And Attack Implementation In Vehicular Ad Hoc Networks With The Protocol AODV

指導教授 : 莊東穎 曾俊元
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


車載隨意網路(VANETs)是基於無線網路技術進步所發展的特殊網路,車輛本身具備無線網路設備,因此車輛在行駛時,可以動態地與鄰車建立連線,無須透過無線基地台;此種特性與無線隨意網路(MANETs)相符,因此車載隨意網路路由方式可以與無線隨意網路相互結合發展。車載隨意網路目前應用範疇其中一項為行車安全服務,例如行車安全偵測,前方交通事故通知、災難正確位置取得等,這些應用內容凸顯出安全性的重要。   目前車載隨意網路的通訊協定尚未完全發展成熟,因此本論文以無線隨意網路路由通訊協定AODV運用於車載隨意網路當中,並針對此通訊協定進行探討與分析,希望藉由深入分析以了解AODV的弱點;本論文亦利用分析後的弱點,進行黑洞攻擊及自私節點攻擊之實現,藉由此實驗證實並取得上述攻擊對於AODV的實際傷害嚴重程度,希望藉此了解並提升安全性議題的重要性,以期日後發展出更為嚴密的通訊協定,建立更完善的防禦機制,提升安全性的可靠度。

關鍵字

車載 攻擊

並列摘要


VANETs is a special network that derives from the improvement of wireless networking. The vehicle itself includes wireless equipment and, therefore, is able to connect with its neighboring vehicles while moving, without a wireless access point. Such attribute corresponds with MANETs. Thus, VANETs routing protocol can ally and develop with MANETs. One of VANETs’ many applications is vehicle safety service, such as notification of traffic accidents ahead and obtaining accurate position of calamity. These applications mark the importance of safety. Nonetheless, currently the protocol of VANETs has not fully matured. This paper contributes by applying MANETs routing protocol, AODV, on VANETs, and finding out its disadvantages through in-depth discussion and analysis. Moreover, this paper also demonstrates the actual severe damages of AODV by attacking black hole and selfish node. With deeper understanding and wider recognition of the significance of safety issue, we can develop a tighter protocol, and build a better defense system that heaves safety reliability in the future.

並列關鍵字

AODV VANETs Attack

參考文獻


[2] Charles E. Perkins and Elizabeth M. Royer, “Ad hoc on-demand distance vector routing,” in Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '99), pp. 90–100, New Orleans, La, USA, February 1999.
[3] David B. Jhonson and David A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” In Mobile Computing, Kluwere Academic Publishers, 1996, pp.153-181.
[9] Peng Ning and Kun Sun, “How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad hoc Routing Protocols,” In Proceedings of the 4th Annual IEEE Information Assurance Workshop, pages 60-67, West Point, June 2003002E
[10] Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Elizabeth Belding-Royer, Clay Shields, “A Secure Routing Protocol for Adhoc Networks,” In Proceedings of the 10 Conference on Network Protocols (ICNP), November 2002.
[11] Manel Guerrero Zapata, “Secure Ad hoc On-Demand Distance Vector Routing”, Proceedings of Mobile Computing and Communications Review, Volume 6, Number 3, July 2002.

延伸閱讀