帳號:guest(13.58.15.223)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目
作者(中文):劉滄平
作者(外文):Liu, Tsang-Ping
論文名稱(中文):一個在移動隨意網路中基於位置式匿名安全的路由協定
論文名稱(外文):Location-based Anonymous Secure Routing protocol in Mobile Ad Hoc Networks
指導教授(中文):孫宏民
指導教授(外文):Sun, Hung-Min
學位類別:碩士
校院名稱:國立清華大學
系所名稱:資訊系統與應用研究所
學號:9665530
出版年(民國):98
畢業學年度:97
語文別:英文
論文頁數:43
中文關鍵詞:移動式隨意網路泛濫式攻擊匿名性
外文關鍵詞:mobile ad hoc networksflooding attackanonymity
相關次數:
  • 推薦推薦:0
  • 點閱點閱:100
  • 評分評分:*****
  • 下載下載:0
  • 收藏收藏:0
Mobile node privacy becomes one of the important research topics. However, these protocols providing mobile node privacy not only still leaks information on communication entities and routes but also lacks efficiency. Moreover, these protocols are vulnerable to active attacks, such as flooding attacks, reply attacks, and computational DoS attacks. In this work, we propose a location-based anonymous routing protocol (LASR) to provide mobile node privacy and resist active attacks. Our protocol utilizes the location of destination to increase the efficiency of route discovery and data transmission, moreover the locations of communication entities are not revealed in any packets. Our protocol is the first anonymous routing protocol which can resist the active attacks. Security analysis and simulations verify the effectiveness and efficiency of our simulations.
移動式節點的隱私性已經變成一個重要的研究議題。而在目前發表提供移動節點隱私性的協定中不只洩漏了通訊實體的資訊和路徑資訊而且還缺乏效率。再者這些協定易於遭受主動式攻擊,像是 flooding attacks, reply attacks, 和 computational DoS attacks。所以我們提出一個基於位置式匿名安全的路由協定去提供移動節點隱私性和抵擋主動式攻擊。我們的協定利用終點的位置資訊去增加路徑搜尋和資料傳輸的效率,而且通訊實體的位置不會在任何封包中被洩漏。此外我們的協定是第一個能夠減緩主動式攻擊的匿名繞路協定。安全分析和模擬證實我們協定的效率和效果。
Table of Contents ........................................ I
List of Figures......................................... III
List of Tables ........................................... V
Chapter 1 Introduction ................................... 1
Chapter 2 Related Work ................................... 4
2.1 Non-location based secure routing protocols .......... 5
2.2 Location based secure routing protocols .............. 6
Chapter 3 System Design .................................. 8
3.1 Assumptions........................................... 8
3.2 Anonymous Group Key Generation ....................... 9
3.3 Route Request Phase ................................. 12
3.4 Route Reply Phase.................................... 17
3.5 Anonymous Data Transmission.......................... 19
Chapter 4 Anonymity and Security Analysis ............... 22
4.1 Types of Adversaries and Attack ..................... 22
4.2 Anonymity Analysis .................................. 23
4.3 Tra±c Analysis Attack................................ 27
4.4 Active Attacks....................................... 28
Chapter 5 Simulation .................................... 30
5.1 Impact of mobility................................... 31
5.2 Impact of tra±c load................................. 33
5.3 Impact of °ooding attack ............................ 35
Chapter 6 Conclusion..................................... 38
Bibliography ............................................ 43
Appendix ................................................ 43
[1] Cmumonarchgroup,cmumonarchextensions to the ns-2 simulator 1998. available from http://monarch.cs.cmu.edu/cmu-ns.html/.
[2] K. fall, and k. varadhan, editors. the ns manual (formerly called "ns notes and documentation"). the vint project, uc berkeley, lbl, usc/isi, and xerox parc, june 2007. available from http://www.isi.edu/nsnam/ns/.
[3] A. Back, U. Moller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. Lecture Notes in Computer Science, 2137(245-257):76, 2001.
[4] O. Berthold, H. Federrath, and S. Kopsell. Web mixes: A system for anonymous and unobservable internet access. Proceedings of the Workshop Design Issues in Anonymity and Unobservability (DIAU ), 2000.
[5] C. Bettstetter, H. Hartenstein, and X. P¶erez-Costa. Stochastic properties of the random waypoint mobility model. Wireless Networks, 10(5):555{567, 2004.
[6] C. Bettstetter and C. Wagner. The spatial node distribution of the random waypoint mobility model. In German Workshop on Mobile Ad Hoc Networks (WMAN), pages 41{58, 2002.
[7] D. Boneh, X. Boyen, and H. Shacham. Short group signatures. Proceedings of the Advance in Cryptology|Crypto, 2004.
[8] A. Boukerche, K. El-Khatib, L. Xu, and L. Korba. A novel solution for achieving anonymity in wireless ad hoc networks. Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and
ubiquitous networks, 2004.
[9] A. Boukerche, K. El-Khatib, L. Xu, and L. Korba. Sdar: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks. Proceedings of the 29th IEEE International Conference on Local Computer Networks (LCN), 2004.
[10] N. Cressie. Statistics for spatial data. Terra Nova, 4(5):613{617, 1992.
[11] K. El-Khatib, L. Korba, R. Song, and G. Yee. Secure dynamic distributed routing algorithm for ad hoc wireless networks. Proceedings of the IEEE International Conference on Parallel Processing Workshops (ICPPW), Oct 2003.
[12] R. L. Gilaberte and L. P. Herrero. A secure routing protocol for ad hoc networks based on trust. Proceedings of the 3th IEEE International Conference on Networking and Services (ICNS), June 2007.
[13] S. Han, J. Wang, and W. Liu. An e±cient identity-based group signature scheme over elliptic curves. Proceedings of the 3rd European conference on universal multiservice networks (ECUMN), Oct 2004.
[14] B. Karp and HT Kung. GPSR: greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on Mobile computing and networking, pages 243{254. ACM New York, NY, USA, 2000.
[15] D. Kesdogan, J. Egner, and R. Buschkes. Stop-and-go mixes providing probabilistic security in an open system. Proceedings of the Second International Workshop on Information Hiding (IH), 1998.
[16] J. Kong and X. Hong. Anodr: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. Proceedings of the 4th ACM international symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2003.
[17] J. Kong, X. Hong, and M. Gerla. An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 6(8):888{902, Aug 2007.
[18] Y. Lee, H. Kim, B. Chung, J. Lee, and H. Yoon. On-demand secure routing protocol for ad hoc network using id based cryptosystem. Proceedings of the 4th IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), Aug 2003.
[19] H. Li and M. Singhal. A secure routing protocol for wireless ad hoc networks.In HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, volume 39, page 225. IEEE, 2006.
[20] A. Miyaji and K. Umeda. A fully-functional group signature scheme over only known-order group. Proceedings of the applied cryptography and network security (ACNS), June 2004.
[21] A. P‾tzmann, B. P‾tzmann, and M. Waidner. Isdnmixes: Untraceable communication with very small bandwidth overhead. Proceedings of the GI/ITG Conference Communication Distributed Systems, 1991.
[22] J. F. Raymond. Tra±c analysis: Protocols, attacks, design issues, and open problems. Proceedings of the International workshop on Designing privacy enhancing technologies Systems, 2001.
[23] G. Resta and P. Santi. An analysis of the node spatial distribution of the random waypoint mobility model for ad hoc networks. In Proceedings of the second ACM international workshop on Principles of mobile computing, pages 44{50. ACM New York, NY, USA, 2002.
[24] S. Seys and B. Preneel. Arm: anonymous routing protocol for mobile ad hoc networks. Proceedings of the 20th IEEE International Conference on Advanced
Information Networking and Applications (AINA), 2006.
[25] G. Wang. Security analysis of several group signature schemes. Proceedings of 4th International Conference on Cryptology in India (INDOCRYPT), Dec 2003.
[26] X. Wu and E. Bertino. An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks. IEEE Transactions on Dependable and Secure Computing, 4(4):252{265, 2007.
[27] X. Wu, J. Liu, X. Hong, and E. Bertino. Anonymous Geo-Forwarding in MANETs through Location Cloaking. IEEE Transactions on Parallel and Distributed Systems, 19(10):1297{1309, 2008.
[28] R.J. Yang, Q. Xia, Q.H. Pan, W.N. Wang, and M.L. Li. New enhancement scheme for secure routing protocol in mobile ad hoc networks. In Proceedings of the The Fifth International Conference on Computer and Information Technology, pages 685{689. IEEE Computer Society Washington, DC, USA, 2005.
[29] J. Zhang, Q. Wu, and Y. Wang. A novel e±cient group signature with forward security. Proceedings of the 5th International Conference on Information Communication Security, Oct 2003.
[30] Y. Zhang, W. Liu, and W. Lou. Anonymous communications in mobile ad hoc networks. Proceedings of the 24th IEEE International Conference on INFOCOM, 2005.
[31] L. Zhitang and S. Shudong. A secure routing protocol for mobile ad hoc networks. Proceedings of the IEEE International Conference on Computer and Information Science (ICIS), July 2007.
[32] B. Zhu, Z. Wan, M. Kankanhalli, F. Bao, and R. Deng. Anonymous secure routing in mobile ad-hoc networks. Proceedings of the 29th IEEE International
Conference on Local Computer Networks (LCN), 2004.
(此全文未開放授權)
電子全文
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *