透過您的圖書館登入
IP:3.137.164.241
  • 學位論文

在網路通訊安全應用中的身份認證與多媒體技術之研究

Authentication and Multimedia Technologies for Security and Applications on Network Communications

指導教授 : 石維寬
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


隨著網路與電腦科技普及使用,以網路進行資料的傳輸易遭任意複製、竄改及偽造等等,因此,如何確保傳輸中的訊息完整性及身份認證,已成為設計安全網路系統所面臨的主要挑戰。很明顯地,已有許多重要的安全議題在網路系統設計時被正視,如認證系統,數位簽章,電子付款及資訊隱藏等。 在本論文中,我們會針對以下的主題進行研究:無線感測網路與會議初始協定的認證,以及數位多媒體之資訊隱藏技術。首先,我們基於橢圓曲線之無線感測系統及會議初始協定的機制,提出對使用者的身份認證。具體來說,當使用者利用網路進行主機存取時,進行身份認證是必要的,因處在不安全的通訊中,能夠對遠端使用者進行正確的身分識別是越來越重要的。我們所提出的機制是繼承基於橢圓曲線的優劣,比其他方法更具有高度的安全性,在使用者認證下所提出機制的安全是提高的。 近年來,在我們生活中有許多的資訊應用,如數位多媒體、電子商務、資料庫等,具體而言,在各種類的資訊應用中,數位多媒體是普及的,因此,我們針對數位多媒體設計出兩種的資訊隱藏技術。因資訊隱藏技術的提出可增進使用者保護,內容認證及機密分享,藏入的機密萃取可確認所有權或是內容的完整性或是安全傳輸,此技術就是在不引起懷疑的情形下安全的將重要機密資料傳送出去。

並列摘要


With regard to the widely used network and computer technology, the data transmission over the Internet suffers from the eavesdropping, illegal duplication, malicious forgery, etc. Thus, how to prove the integrity and confirm the authentication of the transmitted messages becomes the main challenge of a network system design. Obviously, more critical security criteria have to be adopted to construct a network system, for instance, authentication scheme, digital signature, electronic payment and data hiding, etc. In this study, we focus on the following subjects: authentication for wireless sensor networks (WSNs) and Session Initiation Protocol (SIP) and data hiding technologies for digital multimedia. First, we propose a secure Elliptic Curve Cryptography (ECC)-based authentication mechanism for wireless sensor networks and and Session Initiation Protocol. Specifically, authentication is becoming increasingly crucial because it accesses the server when a user asks to use the networks. Proper user identification for remote user authentication over insecure communication channels is increasingly essential. To sum up, our proposed protocol inherits the merits of ECC-based mechanism, and enhances authentication with higher security than the referenced scheme. The security of the proposed protocol in the authentication scheme is strengthened. Then, we propose two types of data hiding technologies for digital multimedia. Recently, there are many information applications in our daily lives, such as digital multimedia, electronic commerce, database, and so on. Specifically, digital multimedia has gained popularity for various types of information applications. To enhance the ownership protection, content authentication and secret sharing, the data hiding technique is proposed to solve this problem. The secret message can be extracted to prove the ownership or to verify the content integrity or to secretly transmit the message. By using this technique, the secret can be transmitted safely with incurring the suspicious by the unauthorized users.

參考文獻


[35]C.C. Lee, “On security of an efficient nonce-based authentication scheme for session initiation protocol,” International Journal of Network Security, vol. 9, pp. 201–203, 2009.
[74]D. Y. Fang, and L. W. Chang, “Data hiding for digital video with phase of motion vector,” Proc. IEEE Int. Conf. Symposium on Circuits and Systems, pp. 1422-1425, 2006.
[26]J. Ring, K. K. Raymond Choo, E. Foo, and M. Looi, “A new authentication mechanism and key agreement protocol for SIP using identity based cryptography,” Proceedings of AusCERT R&D Stream, pp. 61–72, 2006.
[2]J.Yick, B.Mukherjee, and D.Ghosal, “Wireless sensor network survey,” Computer Network, vol. 52, pp. 2292–2330, 2008.
[3]B. Sundararaman, U. Buy, A.D. Kshemkalyani, “Clock synchronization for wireless sensor network: a survey,” Ad-Hoc Networks, vol. 3, pp. 281–323, 2005

延伸閱讀