透過您的圖書館登入
IP:13.59.187.18
  • 學位論文

植基於智慧卡設計一種關於車載網路的多媒體隨選付費系統

Based on Smart Card to Design An MoD Payment System for VANET

指導教授 : 陳金鈴
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


隨著網路技術的迅速發展,許多研究解決了車載網路上的安全與隱私的問題,其中大多數集中在行車安全的應用上。然而,發展一個透過車載網路的加值服務是另一個值得研究的問題。因此,如何提供給搭乘大眾運輸系統的乘客各種服務,同時能保護乘客的匿名性,已成為一個更重要的議題。在本論文中,我們提出了一個在大眾運輸系統上植基於智慧卡的多媒體隨選付費系統,不僅能夠保護乘客的匿名性,並且使用了個人信任的裝置來保護乘客的私密資訊,使乘客在長時間的車程中能夠享受多媒體服務。在未來,我們的協定可以應用在日常生活上,從而提高大眾運輸系統的競爭力。

關鍵字

車載網路 多媒體隨選 付費 驗證 智慧卡

並列摘要


With the rapid advance of network technologies, several studies have addressed security and privacy issues in vehicular ad hoc networks (VANET). Most of them focused on safety applications. In fact, developing a value-added service via VANET is another issue worth researching. Thus, determining how to provide a public transport passenger with various services while protecting the passenger’s anonymity has become a more important issue. In this thesis, we propose a smart card-based multimedia on demand (MoD) payment system in public transportation that not only protects the passenger’s anonymity but also uses a personal trusted device to protect the passenger’s sensitive information so that the passenger can enjoy the multimedia data during the long hours of travel. In the future, our scheme can be applied to actual practice, thereby enhancing the competitiveness of public transport companies.

並列關鍵字

Payment Authentication Smart card VANET MoD

參考文獻


[48] C.L. Chen, C.Y. Hsu and C.C. Lee, “Using a PTD to Strengthen Remote Authentication from an Untrusted Computer,” Journal of Internet Technology, 2011.
[1] T.H. Chen, Y.C. Chen and W.K. Shih, “An Efficient Anonymous Authentication Protocol for Mobile Pay-TV,” Journal of Network and Computer Applications, 2011, Vol. 34, pp. 1131-1137.
[2] T.Y. Wu and Y.M. Tseng. “An Efficient User Authentication and Key Exchange Protocol for Mobile Client-Server Environment,” Computer Networks, 2010, Vol. 54, pp. 1520-1530.
[3] L. Lamport, “Password Suthentication with Insecure Communication,” ACM Communications, 1981, Vol. 24, No. 11, pp. 770-772.
[4] P.G. Argyroudis, R. Verma, H. Tewari and D. O’Mahony, “Performance Analysis of Cryptographic Protocols on Handheld Devices,” Proceedings of the 3rd International Symposium on Network Computing and Applications, 2004, pp. 169 - 174.

延伸閱讀