帳號:guest(3.236.24.215)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者姓名(中文):蔡効謙
作者姓名(英文):Hsiao-Chien Tsai
論文名稱(中文):汽車隨意網路上偽造訊息的影響與防禦方法
論文名稱(外文):The Prevention of False Message Influence on Vehicular Ad Hoc Networks - An Event-based Reputation-centric Approach
指導教授姓名(中文):羅乃維
指導教授姓名(英文):Nai-Wei Lo
口試委員姓名(中文):吳宗成
賴源正
口試委員姓名(英文):Tzong-Chen Wu
Yuan-Cheng Lai
學位類別:碩士
校院名稱:國立臺灣科技大學
系所名稱:資訊管理系
學號:M9409114
出版年(民國):96
畢業學年度:95
學期:2
語文別:英文
論文頁數:57
中文關鍵詞:車輛隨意網路無線網路網路安全名譽系統
外文關鍵詞:VANETwireless networknetwork securityreputation system
相關次數:
  • 推薦推薦:0
  • 點閱點閱:14
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:1
  • 收藏收藏:0
為了減少交通事故、提供緊急交通資訊及增加開車的舒適度,車輛隨意網路(Vehicular ad hoc networks) 在近幾年吸引了許多學者的注意。車輛隨意網路與傳統無線網路最大的不同在於使用者的注意力不可被影響,否則可能會造成生命財產的損失。此篇論文中,我們展現了一種新的網路安全威脅,此安全威脅的原理為,利用偽造的交通安全訊息來誤導駕駛人,進而控制駕駛行為。惡意攻擊者可利用此安全弱點來造成交通事故,或減低車輛隨意網路的網路效能。我們提出了以交通事件為基礎的名譽系統,來防治此種攻擊。在此系統下,車輛彼此合作蒐集交通事件的證據,只有在證據足夠時,系統才會認為此交通事件是真正存在的。我們使用網路模擬來分析與評估所提出的名譽系統,結果顯示我們所提出的系統可在絕大部分的車輛隨意網路環境下運作,且可以有效解決各種偽造訊息所造成的影響。
Vehicular ad hoc networks (VANET) have drawn a lot of attention in resent years in terms of novel applications to reduce car accidents, provide emergency information, and create more comfortable driving experience on roadways. The main difference between vehicular ad hoc networks and other traditional wireless networks is the driver’s attention can not be distracted because driving safety in a matter of life and death. In this thesis, we show a new security threat that fraud messages could disturb the drivers’ attention. The attacker can use this weakness to control the drivers’ behavior that could cause traffic accidents, traffic jam or decreasing the VANET performance in terms of bandwidth utilization. To defend against this kind of attack, we proposed a event-based reputation system. In this system, vehicles collect the evidence of the traffic event cooperatively. The traffic event is trustworthy only if the reputation system collects enough reputation value and signatures about this event. The proposed solution is characterized and evaluated through extensive simulation. The result of simulation shows that our system is suitable in most VANET environments and can defend against all kinds of bogus messages.
Contents
中文摘要I
AbstractII
誌 謝III
ContentsIV
List of FiguresVI
List of TablesVII
Chapter 1.Introduction1
Chapter 2.Security of traffic safety application5
Chapter 3.Environment models and problem statement10
3.1Network model10
3.2Security model11
3.3Problem statement11
Chapter 4.Event-based reputation system on VANET13
4.1Traffic event generation15
4.2Collaboration observation mechanism17
4.3Message verification19
4.4Reputation value suppression20
4.5Adaptive reputation threshold and event signature threshold21
4.5.1Reputation threshold22
4.5.2Event signature threshold24
Chapter 5.Traffic event management on VANET27
5.1Event intensity27
5.2Event movement and erasion29
5.3Event information update30
Chapter 6.Simulation31
6.1Performance analysis32
6.2Security analysis42
Chapter 7.Discussion46
7.1Comparisons to similar work46
7.2Limitations48
Chapter 8.Related work50
Chapter 9.Conclusions54
Reference55
Reference
[1] W. H. Organization, "World report on road traffic injury prevention," 2004.
[2]L. J. Blincoe, "The Economic Impact of Motor Vehicle Crashes,2000," US Dept. of Transportation, National Highway Traffic Safety Administration, 2002.
[3]W. D. Jones, "Building SaferCars," IEEE Specturm, vol. 39, pp. 82-85, 2002.
[4]J. J. Blum, A. Eskandarian, and L. J. Hoffman, "Challenges of intervehicle ad hoc networks," IEEE Transactions on Intelligent Transportation System, vol. 5, pp. 347-351, 2004.
[5]J. Luo and J.-P. Hubaux, "A Survey of Inter-Vehicle Communication," EPFL Technical Report IC, 2004.
[6]T. Nadeem, S. Dashtinezhad, C. Liao, and L. Iftode, "TrafficView: traffic data dissemination using car-to-car communication," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 8, pp. 6-19, 2004.
[7]P. Shankar, M. T. Alam, S. Musharoff, N. Ravi, C. V. Prados, V. Gradinescu, R. Diaconescu, C. Gorgorin, and L. Iftode, "Outdoor Experience with the TrafficView Application," 2005.
[8]Q. Xu, T. Mak, J. Ko, and R. Sengupta, "Vehicle-to-vehicle safety messaging in DSRC," Proceedings of the first ACM workshop on Vehicular ad hoc networks, pp. 19-28, 2004.
[9]Y. Jijun, E. Tamer, Y. Gavin, R. Bo, H. Stephen, K. Hariharan, and T. Timothy, "Performance evaluation of safety applications over DSRC vehicular ad hoc networks," Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, 2004.
[10]W. Chen and S. Cai, "Ad hoc peer-to-peer network architecture for vehicle safety communications," IEEE Communications Magazine, vol. 43, pp. 100-107, 2005.
[11]F. Dötzer, M. Strassberger, and T. Kosch, "Classification for traffic related inter-vehicle messaging," Proceedings of the 5th IEEE International Conference on ITS Telecommunications, 2005.
[12]H. Yang, F. Ricciato, S. Lu, and L. Zhang, "Securing a wireless world," Proceedings of the IEEE, vol. 94, pp. 442-454, 2006.
[13]D. Djenouri, L. Khelladi, and A. N. Badache, "A survey of security issues in mobile ad hoc and sensor networks," IEEE Communications Surveys & Tutorials, vol. 7, pp. 2-28, 2005.
[14]A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach, R. Kroh, and T. Leinmüller, "Attacks on Inter-Vehicle Communication Systems - An Analysis," Proceedings of the 3rd International Workshop on Intelligent Transportation (WIT 2006), 2006.
[15]S. Eichler, F. Dotzer, C. Schwingenschlogl, F. J. F. Caro, and J. Eberspaher, "Secure routing in a vehicular ad hoc network," 2004.
[16]R. Maxim and H. Jean-Pierre, "The security of vehicular ad hoc networks," Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, 2005.
[17]K. Plobl, T. Nowey, and C. Mletzko, "Towards a Security Architecture for Vehicular Ad Hoc Networks," Proceedings of the First International Conference on Availability,Reliability and Security (ARES' 06), 2006.
[18]D. Jungels, M. Raya, I. Aad, and J. P. Hubaux, "Certificate Revocation in Vehicular Ad Hoc Networks," EPFL Technical Report, 2006.
[19]E. Fonseca and A. Festag, "A Survey of Existing Approaches for Secure Ad Hoc Routing and Their Applicability to VANETS," NOW Technical Report, 2006.
[20]J. Blum and E. Azim, "The threat of intelligent collisions," IT Professional, vol. 6, pp. 24-29, 2004.
[21]B. Parno and A. Perrig, "Challenges in securing vehicular networks," Workshop on Hot Topics in Networks (HotNets-IV), 2005.
[22]C. Perkins, E. M. Belding-Royer, and S. R. Das, "Ad hoc ondemand distance vector (AODV) routing," IETF RFC3561experimental Standard, July, 2003.
[23]D. B. Jonhson, D. A. Maltz, Y. C. Hu, and J. G. Jetcheva, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks," IETF MANET WG lnternet draft, 2000.
[24]Y. B. Ko and N. H. Vaidya, "Location-Aided Routing (LAR) in mobile ad hoc networks," Wireless Networks, vol. 6, pp. 307-321, 2000.
[25]F. Picconi, N. Ravi, M. Gruteser, and L. Iftode, "Probabilistic validation of aggregated data in vehicular ad-hoc networks," Proceedings of the 3rd international workshop on Vehicular ad hoc networks, pp. 76-85, 2006.
[26]G. F. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas, "Cooperation enforcement schemes for MANETs: a survey: Research Articles," Wireless Communications & Mobile Computing, vol. 6, pp. 319-332, 2006.
[27]Nai-Wei Lo and H.-C. Tsai, "Illusion Attack on VANET Applications – A Message Plausibility Problem," Dept. of Information Management, NTUST, Technical Report, 2007.
[28]K. Fall and K. Varadhan, "The ns Manual (formerly ns Notes and Documentation)," The VINT Project, vol. 1, 2002.
[29]A. Mahajan, N. Potnis, K. Gopalan, and A. I. A. Wang, "Evaluation of Mobility Models For Vehicular Ad-Hoc Network Simulations," IEEE International Workshop on Next Generation Wireless Networks (WoNGeN '06) 2006.
[30]G. Philippe, G. Dan, and S. Jessica, "Detecting and correcting malicious data in VANETs," Proceedings of the 1st international workshop on Vehicular ad hoc networks, Philadelphia, USA, 2004.
[31]M. Raya and J. P. Hubaux, "Efficient secure aggregation in VANETs," Proceedings of the 3rd international workshop on Vehicular ad hoc networks, pp. 67-75, 2006.
[32]U. S. C. Bureau, "TIGER, TIGER/Line and TIGER-Related Products," Available at http://www.census.gov/geo/www/tiger/.
[33]S. Amit Kumar and B. J. David, "Modeling mobility for vehicular ad-hoc networks," Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, Philadelphia, USA, 2004.
[34]B. Schneier, "Attack Trees," Dr. Dobb's Journal, vol. 24, pp. 21-29, 1999.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *