研究生: |
葉力齊 Li-Chi Yeh |
---|---|
論文名稱: |
車輛隨意網路模糊傳輸機制加密之研究 A Study of The Cryptosystem on Oblivious Transfer of Vehicle Ad Hoc Networks |
指導教授: |
莊謙本
Chuang, Chien-Pen |
學位類別: |
碩士 Master |
系所名稱: |
工業教育學系 Department of Industrial Education |
論文出版年: | 2009 |
畢業學年度: | 97 |
語文別: | 中文 |
論文頁數: | 67 |
中文關鍵詞: | 加密 、解密 、安全 |
英文關鍵詞: | encryption, decryption, security, VANET |
論文種類: | 學術論文 |
相關次數: | 點閱:179 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
VANET本身為變化快速的網路架構,必須考量到駕駛者、車速與交通狀況,其中資訊與資訊間傳輸的保密性、完整性、合法性與效率性是相當重要之議題。由於VANET在空氣中傳輸訊息,無防火牆之遮蔽,故資料容易被駭客入侵,竊取與更改,因此在傳輸介面需要有優異的加密機制,以確保資料的安全性及正確性。但現有加解密機制應用於VANET仍未能解決安全性的問題。其中非對稱性金鑰加密系統,安全性較佳,但加解密時間過長,在車輛高速行駛間的傳輸,容易造成傳輸失敗,影響通訊品質;而對稱性加解密機制,加解密時間較短,資料傳輸快,但保密性較差,容易受駭客入侵,竄改資料。
因此,本論文提出一個改良方法,結合RSA加密系統與Oblivious Transfer (ROT),建構n選t模糊傳輸架構進行模擬實驗,結果顯示ROT加密系統可提升加解密運算速度,且在安全性方面,對於攻擊的偵測率較RSA與DES方式高,在資料傳送時,更能抵擋異常行為攻擊、偽造訊息攻擊和中間人攻擊,因此達到較高的安全性與傳輸效率。
VANET, a rapid networking system, includes the elements of driver, speed, and traffic. When using VANET for information transmission, important issues such as privacy, integrality, legitimacy, and efficiency must be considered. Because VANET transmits information wirelessly, without the protection of a firewall, it is easy for the system to be attacked by hackers who may steal or change information. Consequently the transmitting interfaces need an excellent mechanism of encryption, which can guarantee security of the materials and exactness. At the present time VANET utilizes the asymmetrical golden key encrypt system. The security of this system is relatively good, but the decipher time is too great. Because transmissions occur in a high-speed interface, lengthy decipher times might negatively influence the quality of the transmission and sometimes lead to system failure. Another system, the symmetrical golden key encrypt system, has a short decipher time and rapid transmission speed, but privacy is relatively poor, and the system is easily invaded by hackers.
Due to the disadvantages in both the asymmetrical golden key encrypt system and the symmetrical golden key encrypt system , the present study proposed a method to improve the security and efficiency of the encryption used with VANET. In this study , a method combining the RSA encryption system and Oblivious Transfer ( ROT ) was used to construct an n to t oblivious transfer structure to simulate and analyze security and efficiency. Results revealed that the ROT encryption system can increase the pace of decipher operations, and promote network efficiency. In regards to security , the detection rate was increased and unusual-behavior-attacks , forge -message-attacks, and man-in-middle-attacks were reduced leading to increased system security.
[1] B. Parno and A. Perrig. "Challenges in securing
vehicular networks", In Proceedings of HotNets-IV,2005.
[2] C. K. Chu and W. G. Tzeng, "Efficient k-out-of-n
oblivious transfer schemes with adaptive and non-
adaptive queries", Proceedings of the Public Key
Cryptography(PKC '05),volume 3386 of LNCS, pp.200-212,
Springer-Verlag, 2005.
[3] M. Raya and J.-P. "Hubaux The security of vehicular ad
hoc networks", In Proceedings of SASN’05, 2005.
[4] IEEE P1609.2 Version 1 - Standard for Wireless Access
in Vehicular Environments - Security Services for
Applications and Management Messages.
[5] H. Huang and C. Chang, "A New Design for Efficient t-
out-n Oblivious Transfer Scheme", InProc. of the 19th
International Conference on Advanced Information
Networking and Applications (AINA'05),Vol. 2,
pp. 499-502,2005.
[6] M. Raya, P. Papadimitratos, and J.-P. Hubaux, "Securing
vehicular communications", IEEE Wireless Communications
Magazine, Special Issue on Inter-Vehicular
Communications, October 2006.
[7] O. Wakaha and S. Ryota, "k out of n oblivious transfer
without random oracle", IEICE Transactions on
Fundamentals of Electronics,Communications and Computer
Sciences, vol. E87-A, no. 1, pp. 147-151,January 2004.
[8] IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 2,
APRIL 2009 Oblivious Routing of Highly Variable Traffic
in Service Overlays and IP Backbones
[9] RSA Data Security Inc., "RSA Labs FAQ 3.0 on
Cryptography",http://www.rsa.com, 2005.
[10]M. Raya and J. P. Hubaux, Security aspects of inter-
vehicle communications, In Proceed-ings of 5th Swiss
Transport Research Conference (STRC), Ascona,
Switzerland, March 2005
[11]NS-Network Simulator,http://www.isi.edu/nsnam/ns/
[12]Leinmuller, T.; Schmidt, R.K.; Schoch, E.; Held, A.;
Schafer, G.; "Modeling Roadside Attacker Behavior in
VANETs" GLOBECOM Workshops, 2008 IEEE Nov. 30 2008-Dec.
4 2008 Page(s):1 - 10
[13]D. Jungels et al., "Certificate Revocation in Vehicular
Ad Hoc Networks",Technical report of LCA, 2006.
[14]M. Raya and J. P. Hubaux, "Security aspects of inter-
vehicle communications",Proceedings of 5th Swiss
Transport Research Conference (STRC), March 2005.
[15]F. Dotzer, F. Kohlmayer, T. Kosch, and M.
Strassberger, "Secure Communication for In-tersection
Assistance", presented at Proceedings of the 2nd
International Workshop on In-telligent Transportation,
Hamburg,Germany (2005), 2005.
[16]VANET’2008,Z” Security Certificate Revocation List
Distribution for VANET” September 15, 2008, San
Francisco, California, USA.ACM 978-1-60558-191-0/08/09.
[17]Dedicated Short-Range Communications (DSRC).
Homehttp://www.leear mstrong.com/DSRC/DSRCHomeset.htm
[18]D. Jungels et al., "Certificate Revocation in Vehicular
Ad Hoc Networks",Technical r port of LCA, 2006.
[19]T. Taleb, M. Ochi, A. Jamalipour, K. Nei and Y.
Nemoto,"An efficient vehicle-heading based routing
protocol for VANET networks", in Proceedings of IEEE
Wireless Communications and Networking Conference (WCNC
2006), Las Vegas, USA, April 2006.
[20]VANET’2007, "Providing VANET Security Through Active
Position Detection"September 10, 2007, Montréal,
Québec,Canada.ACM 978-1-59593-739-1/07/0009.
[21]M. Raya and J. P. Hubaux, "Securing vehicular ad hoc
networks",Journal of Computer Security, Vol. 15, No. 1,
pp.39-68, 2007
[22]From Wikipedia, the free encyclopedia
http://en.wikipedia.org/wiki/IEEE_802.11p
[23]Chih-Heng Ke,"NS2 教學手冊",
http://hpds.ee.ncku.edu.tw/~smallko/ns2/ns2.htm
[24]柯志亨,"計算機網路實驗–NS2模擬工具"學貫行銷股份有限公司出版,
2005年12月