簡易檢索 / 詳目顯示

研究生: 葉力齊
Li-Chi Yeh
論文名稱: 車輛隨意網路模糊傳輸機制加密之研究
A Study of The Cryptosystem on Oblivious Transfer of Vehicle Ad Hoc Networks
指導教授: 莊謙本
Chuang, Chien-Pen
學位類別: 碩士
Master
系所名稱: 工業教育學系
Department of Industrial Education
論文出版年: 2009
畢業學年度: 97
語文別: 中文
論文頁數: 67
中文關鍵詞: 加密解密安全
英文關鍵詞: encryption, decryption, security, VANET
論文種類: 學術論文
相關次數: 點閱:179下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • VANET本身為變化快速的網路架構,必須考量到駕駛者、車速與交通狀況,其中資訊與資訊間傳輸的保密性、完整性、合法性與效率性是相當重要之議題。由於VANET在空氣中傳輸訊息,無防火牆之遮蔽,故資料容易被駭客入侵,竊取與更改,因此在傳輸介面需要有優異的加密機制,以確保資料的安全性及正確性。但現有加解密機制應用於VANET仍未能解決安全性的問題。其中非對稱性金鑰加密系統,安全性較佳,但加解密時間過長,在車輛高速行駛間的傳輸,容易造成傳輸失敗,影響通訊品質;而對稱性加解密機制,加解密時間較短,資料傳輸快,但保密性較差,容易受駭客入侵,竄改資料。

    因此,本論文提出一個改良方法,結合RSA加密系統與Oblivious Transfer (ROT),建構n選t模糊傳輸架構進行模擬實驗,結果顯示ROT加密系統可提升加解密運算速度,且在安全性方面,對於攻擊的偵測率較RSA與DES方式高,在資料傳送時,更能抵擋異常行為攻擊、偽造訊息攻擊和中間人攻擊,因此達到較高的安全性與傳輸效率。

    VANET, a rapid networking system, includes the elements of driver, speed, and traffic. When using VANET for information transmission, important issues such as privacy, integrality, legitimacy, and efficiency must be considered. Because VANET transmits information wirelessly, without the protection of a firewall, it is easy for the system to be attacked by hackers who may steal or change information. Consequently the transmitting interfaces need an excellent mechanism of encryption, which can guarantee security of the materials and exactness. At the present time VANET utilizes the asymmetrical golden key encrypt system. The security of this system is relatively good, but the decipher time is too great. Because transmissions occur in a high-speed interface, lengthy decipher times might negatively influence the quality of the transmission and sometimes lead to system failure. Another system, the symmetrical golden key encrypt system, has a short decipher time and rapid transmission speed, but privacy is relatively poor, and the system is easily invaded by hackers.

    Due to the disadvantages in both the asymmetrical golden key encrypt system and the symmetrical golden key encrypt system , the present study proposed a method to improve the security and efficiency of the encryption used with VANET. In this study , a method combining the RSA encryption system and Oblivious Transfer ( ROT ) was used to construct an n to t oblivious transfer structure to simulate and analyze security and efficiency. Results revealed that the ROT encryption system can increase the pace of decipher operations, and promote network efficiency. In regards to security , the detection rate was increased and unusual-behavior-attacks , forge -message-attacks, and man-in-middle-attacks were reduced leading to increased system security.

    摘 要.......................................I Abstract....................................II 目 錄......................................III 圖目錄.......................................V 表目錄......................................VII 第一章 緒論..................................1 第一節 研究背景............................1 第二節 研究動機與目的.......................2 第三節 論文結構............................3 第二章 文獻探討...............................4 第一節 車輛隨意網路介紹......................4 第二節 車輛通訊相關標準規格..................6 第三節 VANET的網路架構......................11 第四節 VANET網路特性........................16 第五節 VANET網路安全性探討...................17 第三章 現行通用密碼系統........................24 第一節 RSA密碼系統..........................24 第二節 DES密碼系統..........................27 第三節 Triple-DES密碼系統...................31 第四節 本章小結.............................32 第四章 ROT機制加密設計.........................34 第一節 n選t模糊傳輸協定......................34 第二節 非對稱型模糊傳輸ROT演算法..............37 第五章 模擬實驗...............................45 第一節 模擬環境.............................45 第二節 效能分析.............................47 第三節 安全性分析...........................56 第六章 結論與未來展望..........................63 第一節 結論.................................63 第二節 未來展望.............................64 參考文獻.......................................65

    [1] B. Parno and A. Perrig. "Challenges in securing
    vehicular networks", In Proceedings of HotNets-IV,2005.
    [2] C. K. Chu and W. G. Tzeng, "Efficient k-out-of-n
    oblivious transfer schemes with adaptive and non-
    adaptive queries", Proceedings of the Public Key
    Cryptography(PKC '05),volume 3386 of LNCS, pp.200-212,
    Springer-Verlag, 2005.
    [3] M. Raya and J.-P. "Hubaux The security of vehicular ad
    hoc networks", In Proceedings of SASN’05, 2005.
    [4] IEEE P1609.2 Version 1 - Standard for Wireless Access
    in Vehicular Environments - Security Services for
    Applications and Management Messages.
    [5] H. Huang and C. Chang, "A New Design for Efficient t-
    out-n Oblivious Transfer Scheme", InProc. of the 19th
    International Conference on Advanced Information
    Networking and Applications (AINA'05),Vol. 2,
    pp. 499-502,2005.
    [6] M. Raya, P. Papadimitratos, and J.-P. Hubaux, "Securing
    vehicular communications", IEEE Wireless Communications
    Magazine, Special Issue on Inter-Vehicular
    Communications, October 2006.
    [7] O. Wakaha and S. Ryota, "k out of n oblivious transfer
    without random oracle", IEICE Transactions on
    Fundamentals of Electronics,Communications and Computer
    Sciences, vol. E87-A, no. 1, pp. 147-151,January 2004.
    [8] IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 2,
    APRIL 2009 Oblivious Routing of Highly Variable Traffic
    in Service Overlays and IP Backbones
    [9] RSA Data Security Inc., "RSA Labs FAQ 3.0 on
    Cryptography",http://www.rsa.com, 2005.
    [10]M. Raya and J. P. Hubaux, Security aspects of inter-
    vehicle communications, In Proceed-ings of 5th Swiss
    Transport Research Conference (STRC), Ascona,
    Switzerland, March 2005
    [11]NS-Network Simulator,http://www.isi.edu/nsnam/ns/
    [12]Leinmuller, T.; Schmidt, R.K.; Schoch, E.; Held, A.;
    Schafer, G.; "Modeling Roadside Attacker Behavior in
    VANETs" GLOBECOM Workshops, 2008 IEEE Nov. 30 2008-Dec.
    4 2008 Page(s):1 - 10
    [13]D. Jungels et al., "Certificate Revocation in Vehicular
    Ad Hoc Networks",Technical report of LCA, 2006.
    [14]M. Raya and J. P. Hubaux, "Security aspects of inter-
    vehicle communications",Proceedings of 5th Swiss
    Transport Research Conference (STRC), March 2005.
    [15]F. Dotzer, F. Kohlmayer, T. Kosch, and M.
    Strassberger, "Secure Communication for In-tersection
    Assistance", presented at Proceedings of the 2nd
    International Workshop on In-telligent Transportation,
    Hamburg,Germany (2005), 2005.
    [16]VANET’2008,Z” Security Certificate Revocation List
    Distribution for VANET” September 15, 2008, San
    Francisco, California, USA.ACM 978-1-60558-191-0/08/09.
    [17]Dedicated Short-Range Communications (DSRC).
    Homehttp://www.leear mstrong.com/DSRC/DSRCHomeset.htm
    [18]D. Jungels et al., "Certificate Revocation in Vehicular
    Ad Hoc Networks",Technical r port of LCA, 2006.
    [19]T. Taleb, M. Ochi, A. Jamalipour, K. Nei and Y.
    Nemoto,"An efficient vehicle-heading based routing
    protocol for VANET networks", in Proceedings of IEEE
    Wireless Communications and Networking Conference (WCNC
    2006), Las Vegas, USA, April 2006.
    [20]VANET’2007, "Providing VANET Security Through Active
    Position Detection"September 10, 2007, Montréal,
    Québec,Canada.ACM 978-1-59593-739-1/07/0009.
    [21]M. Raya and J. P. Hubaux, "Securing vehicular ad hoc
    networks",Journal of Computer Security, Vol. 15, No. 1,
    pp.39-68, 2007
    [22]From Wikipedia, the free encyclopedia
    http://en.wikipedia.org/wiki/IEEE_802.11p
    [23]Chih-Heng Ke,"NS2 教學手冊",
    http://hpds.ee.ncku.edu.tw/~smallko/ns2/ns2.htm
    [24]柯志亨,"計算機網路實驗–NS2模擬工具"學貫行銷股份有限公司出版,
    2005年12月

    無法下載圖示 本全文未授權公開
    QR CODE