帳號:guest(3.147.55.42)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目
作者(中文):鍾□正
作者(外文):Chung, Heng-Jeng
論文名稱(中文):一個應用匿名於移動式隨意網路之抵擋主動攻擊的安全路由協定
論文名稱(外文):Applying Anonymity for Secure Routing Protocol against Active Attacks in Mobile Ad Hoc Networks
指導教授(中文):孫宏民
指導教授(外文):Sun, Hung-Min
學位類別:碩士
校院名稱:國立清華大學
系所名稱:資訊工程學系
學號:9662549
出版年(民國):98
畢業學年度:97
語文別:英文
論文頁數:54
中文關鍵詞:匿名移動式隨意網路主動攻擊路由協定
外文關鍵詞:AnonymityMobile Ad Hoc NetworkActive AttackRouting Protocol
相關次數:
  • 推薦推薦:0
  • 點閱點閱:104
  • 評分評分:*****
  • 下載下載:0
  • 收藏收藏:0
在移動式隨意網路中設計匿名通訊協定,節點的隱私性是極為重要的課題。許多已發表的匿名通訊協定仍會因為網路流量分析攻擊而洩露節點與路由路徑相關之訊息。這些匿名通訊協定也因為缺少封包認證而容易遭受如路徑需求封包之氾濫攻擊一類的主動式攻擊。因此,這篇論文提供一個匿名且安全的路由協定ASRP,防止因為網路流量分析攻擊而造成的節點與路由路徑隱私資料曝露。在ASRP中,節點的身分及位置也是受到保護的。不僅如此,ASRP也利用對稱式及非對稱式密碼系統抵擋被動式攻擊,並利用一個節點範圍的群組金鑰認證封包達到抵擋主動式攻擊的目的。網路模擬實驗及安全性分析均驗證了此篇論文所提出的ASRP的有效性。
Node privacy in mobile ad hoc networks (MANET) is an important research topic in designing anonymous routing protocols. Many previously published protocols for providing node privacy still leak information about the communication entities and the route by traffic analysis attack. These protocols are also vulnerable to active attacks such as RREQ flooding attacks due to the lack of packet authentication. Therefore, an anonymous secure routing protocol (ASRP) is designed in this work to prevent from traffic analysis attacks. Node identities and locations are also protected in ASRP. Furthermore, symmetric/asymmetric cryptography is adopted to resist passive attacks and a one-hop group key mechanism is adopted to achieve packet authentication for resisting active attacks. The security analysis and simulation study in this work verify the effectiveness of ASRP.
Table of Contents ..................................... I
List of Figures...................................... III
List of Tables ........................................ V
Chapter 1 Introduction ................................ 1
1.1 Node Privacy....................................... 1
1.2 Security Threats................................... 2
1.3 Contribution....................................... 4
Chapter 2 Related Work ................................ 7
2.1 The Classi‾cations of Routing Protocols............ 8
2.2 Non-location Based Single Path On-demand Anonymous
Routing Protocols ..................................... 9
2.3 Privacy Homomorphic Cryptosystem.................. 11
Chapter 3 ASRP System Design ......................... 13
3.1 Assumptions....................................... 13
3.2 Anonymous Group Key and Pairwise Key Generation
Phase................................................. 15
3.3 Route Request Phase .............................. 17
3.4 Route Reply Phase................................. 20
3.5 Anonymous Data Transmission....................... 23
Chapter 4 Anonymity and Security Analysis ............ 26
4.1 Classi‾cation of Adversaries and Attacks.......... 26
4.2 Anonymity Analysis ............................... 27
4.2.1 Identity Privacy ............................... 27
4.2.2 Route Anonymity................................. 30
4.2.3 Location Privacy................................ 32
4.3 Security Analysis................................. 32
4.3.1 Tra±c Analysis Attacks ......................... 32
4.3.2 Active Attacks and Wiretap ..................... 33
Chapter 5 Computation Complexity Analysis............. 36
Chapter 6 Simulation ................................. 40
6.1 Impact of Mobility ............................... 41
6.2 Impact of Tra±c Load.............................. 41
6.3 Impact of Flooding Attacks........................ 42
Chapter 7 Conclusion.................................. 48
Bibliography ......................................... 54
[1] Cmumonarchgroup,cmumonarchextensions to the ns-2 simulator 1998. available from http://monarch.cs.cmu.edu/cmu-ns.html/.
[2] Ieee standard 802.11-2007: Ieee standard for information technology, telecommunications and information exchange between systems, local and metropolitan area networks, specific requirements, part 11: Wireless lan medium access(mac) and physical layer(phy) specifications, june 2007.
[3] K. fall, and k. varadhan, editors. the ns manual (formerly called "ns notes and documentation"). the vint project, uc berkeley, lbl, usc/isi, and xerox parc, june 2007. available from http://www.isi.edu/nsnam/ns/.
[4] Onion routing. available from http://www.onion-router.net/.
[5] B. Adam, M. Ulf, and S. Anton. Analysis attacks and trade-offs in anonymity providing systems. In Proceedings of the 5th International workshop on Information hiding (IH), 2001.
[6] S.R. Afzal, S. Biswas, K. Jong-bin, T. Raza, L. Gunhee, and K. Dong-kyoo. Rsrp: A robust secure routing protocol for mobile ad hoc networks. In Proceedings of the IEEE International Conference on Wireless Communications and Networking (WCNC), March 2008.
[7] O. Berthold, H. Federrath, and S. Kopsell. Web mixes: A system for anonymous and unobservable internet access. In Proceedings of the Workshop Design Issues in Anonymity and Unobservability (DIAU ), 2000.
[8] D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In Proceedings of the Advance in Cryptology|Crypto, 2004.
[9] A. Boukerche, K. El-Khatib, L. Xu, and L. Korba. A novel solution for achieving anonymity in wireless ad hoc networks. In Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, 2004.
[10] A. Boukerche, K. El-Khatib, L. Xu, and L. Korba. Sdar: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks. In Proceedings of the 29th IEEE International Conference on Local Computer Networks (LCN), 2004.
[11] H. Chen, H. Benxiong, M. Yijun, and M. Jianhua. A secure routing protocol based on token escrow set for ad hoc networks. In Proceedings of the 22th IEEE International Conference on Advanced Information Networking and Applications (AINA), March 2008.
[12] C. Díaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. Proc. Privacy Enhancing Technologies Workshop (PET02), R. Dingledine and P. Syverson, Eds. Springer-Verlag, LNCS 2482, Apr 2002.
[13] K. El-Khatib, L. Korba, R. Song, and G. Yee. Secure dynamic distributed routing algorithm for ad hoc wireless networks. In Proceedings of the IEEE International Conference on Parallel Processing Workshops (ICPPW), Oct 2003.
[14] R. L. Gilaberte and L. P. Herrero. A secure routing protocol for ad hoc networks based on trust. In Proceedings of the 3th IEEE International Conference on Networking and Services (ICNS), June 2007.
[15] S. Han, J. Wang, and W. Liu. An e±cient identity-based group signature scheme over elliptic curves. In Proceedings of the 3rd European conference on universal multiservice networks (ECUMN), Oct 2004.
[16] L. Huaizhi and M. Singhal. A secure routing protocol for wireless ad hoc networks. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS), Jan 2006.
[17] D. Kesdogan, J. Egner, and R. Buschkes. Stop-and-go mixes providing probabilistic security in an open system. In Proceedings of the Second International Workshop on Information Hiding (IH), 1998.
[18] J. Kong and X. Hong. Anodr: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. In Proceedings of the 4th ACM international symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2003.
[19] J. Kong, X. Hong, and M. Gerla. An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 6(8):888--902, Aug 2007.
[20] Y. Lee, H. Kim, B. Chung, J. Lee, and H. Yoon. On-demand secure routing protocol for ad hoc network using id based cryptosystem. In Proceedings of the 4th IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), Aug 2003.
[21] Colin J. Lemmon and Phillip Musumeci. Boundary mapping and boundary state routing (bsr) in ad hoc networks. IEEE Transactions on Mobile Computing, 7(1):127--139, Jan 2008.
[22] Y. Ming, Z. Mengchu, and S. Wei. A secure routing protocol against byzantine attacks for manets in adversarial environments. IEEE Transactions on Vehicular Technology, 58(1):449--460, Jan 2009.
[23] A. Miyaji and K. Umeda. A fully-functional group signature scheme over only known-order group. In Proceedings of the applied cryptography and network security (ACNS), June 2004.
[24] P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of Advances in Cryptology - EUROCRYPT, pages 223--238, 1999.
[25] Charles E. Perkins and Pravin Bhagwat. Highly dynamic destination-sequenced distance-vector routing(dsdv) for mobile computers. SIGCOMM Comput. Commun. Rev., 24(4):234{244, 1994.
[26] A. Pfitzmann and M. KÄohntopp. Anonymity, unobservability, and pseudonymity: A proposal for terminology. Proc. Workshop on Design Issues in Anonymity and Unobservability, pages 1--9, 2000.
[27] A. Pfitzmann, B. Pfitzmann, and M. Waidner. Isdnmixes: Untraceable communication with very small bandwidth overhead. In Proceedings of the GI/ITG Conference Communication Distributed Systems, 1991.
[28] Sk. Md. Mizanur Rahman, Masahiro MAMBO, Atsuo INOMATA, and Eiji OKAMOTO. An anonymous on-demand position-based routing in mobile ad hoc networks. In Proceedings of the Symposium on Applications and the Internet, 2005.
[29] J. F. Raymond. Tra±c analysis: Protocols, attacks, design issues, and open problems. In Proceedings of the International workshop on Designing privacy enhancing technologies Systems, 2001.
[30] A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. Proc. Privacy Enhancing Technologies Workshop (PET02), R. Dingledine and P. Syverson, Eds. Springer-Verlag, LNCS 2482, Apr 2002.
[31] S. Seys and B. Preneel. Arm: anonymous routing protocol for mobile ad hoc networks. In Proceedings of the 20th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2006.
[32] Binod Vaidya, JaeYoung Pyun, JongAn Park, and SeungJo Han. Secure multipath routing scheme for mibile ad hoc network. IEEE International Symposiumon Dependable, Autonomic and Secure Computing, 2007.
[33] G. Wang. Security analysis of several group signature schemes. In Proceedings of 4th International Conference on Cryptology in India (INDOCRYPT), Dec 2003.
[34] Xiaoxin Wu, Jun Liu, Xiaoyan Hong, and Elisa Bertino. Anonymous geo-forwarding in manets through location cloacking. IEEE Transactions on Parallel and Distributed Systems, 19(10):1297{1309, Oct 2008.
[35] R. J. Yang, Q. Xia, Q. H. Pan, W. N. Wang, and M. L. Li. New enhancement scheme for secure routing protocol in mobile ad hoc networks. In Proceedings of the 5th International Conference on Computer and Information Technology(CIT), Sept 2005.
[36] Y. Zafoune and A. Mokhtari. Reactive vs proactive protocol: a comparative study between two localization approaches of mobile codes in ad hoc mobile networks. Computer Networks, 2006 International Symposium, 2006.
[37] J. Zhang, Q. Wu, and Y. Wang. A novel efficient group signature with forward security. In Proceedings of the 5th International Conference on Information Communication Security, Oct 2003.
[38] Y. Zhang, W. Liu, and W. Lou. Anonymous communications in mobile ad hoc networks. In Proceedings of the 24th IEEE International Conference on INFOCOM, 2005.
[39] Yao Zhao, Yan Chen, Bo Li, and Qian Zhang. Hop id: A virtual coordinate-based routing for sparse mobile ad hoc networks. IEEE Transactions on Mobile Computing, 6(9):1075--1089, Jan 2007.
[40] L. Zhitang and S. Shudong. A secure routing protocol for mobile ad hoc networks. In Proceedings of the IEEE International Conference on Computer and Information Science (ICIS), July 2007.
[41] B. Zhu, Z.Wan, M. Kankanhalli, F. Bao, and R. Deng. Anonymous secure routing in mobile ad-hoc networks. In Proceedings of the 29th IEEE International Conference on Local Computer Networks (LCN), 2004.
(此全文未開放授權)
電子全文
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *