帳號:guest(3.236.24.215)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者姓名(中文):黃信翔
作者姓名(英文):Hsin-Hsiang Huang
論文名稱(中文):適用於MANET之具安全性與匿名性的分散式位置服務
論文名稱(外文):Secure and Anonymous Distributed Location Service for Mobile Ad Hoc Networks
指導教授姓名(中文):羅乃維
指導教授姓名(英文):Nai-Wei Lo
口試委員姓名(中文):賴源正
林伯慎
口試委員姓名(英文):Yuan-Cheng Lai
Bor-Shen Lin
學位類別:碩士
校院名稱:國立臺灣科技大學
系所名稱:資訊管理系
學號:M9809315
出版年(民國):100
畢業學年度:99
學期:2
語文別:英文
論文頁數:63
中文關鍵詞:無線行動隨意網路位置服務匿名性安全性
外文關鍵詞:Mobile ad hoc networkLocation serviceAnonymitySecurity
相關次數:
  • 推薦推薦:0
  • 點閱點閱:53
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏收藏:0
在大型而且密集的無線行動隨意網路 (MANET),位置基礎的路由協定能夠提供良好的路由效能,它需要目的地的座標位置作為必要的路由資訊。位置資訊的使用能夠提升路由效能,然而它也是一個具有高度隱私的資料。因為無線網路訊號開放的特性,使得訊息內容非常容易被竊聽。為了保護私密資料,常見的方法是使用加密操作。資料加密會造成控制封包容量的增加以及處理時間的延遲,衝擊到路由效能。此外位置基礎的路由協定必須有一套完善的位置管理機制,它提供位置更新以及位置查詢的基本功能。為了在各個階段都能夠保持移動節點的匿名性以及保護它的位置隱私,我們提出一個具備安全性以及匿名性的位置服務機制,它的英文簡稱為SADLS。我們盡量減少加密操作的使用,而是透過使用假名的方式來隱匿隨意節點的真實識別名稱以及位置資訊這些私密資料。分析與模擬的結果顯示SADLS能夠得到比DISPOSER更好的安全性、匿名性以及效能。平均延遲時間在位置查詢時減少百分之五十八,在位置更新時減少百分之九十。
In large and dense mobile ad hoc network, location-based routing protocols which use location information of destination to make route decision can offer signif-icant route performance. It can promote route performance by using location infor-mation. However, it is also a high private data for person. Due to the characteristic of signal open in wireless network, it is very easy to eavesdrop the message contexts. To protect private data, encryption operation is a common method. Data encryption causes control packet size increase and operation latency, it impacts the network per-formance. Furthermore, location-based routing protocols must have a complete loca-tion service; it can offer the basic functions of location management, such as location update and location query. To maintain both anonymity of mobile node and protection of its location privacy at all stages, we propose a secure and anonymous distributed location service named SADLS. We reduce to use data encryption as much as possible. Thus, we hide the private data such as the real identity of mobile node and its location information through using pseudonym as identifier of node. Both analysis and simula-tion results show that SADLS can offer better security, anonymity and performance than DISPOSER. The average end-to-end delay for location query reduces 58%. However, it reduces 90% in location update.
中文摘要i
ABSTRACTii
誌謝iii
CONTENTSiv
List of Figures and Tablesvi
Chapter 1Introduction1
Chapter 2Related Works3
Chapter 3Secure and Anonymous Distributed Location Service (SADLS)8
3.1Security Goal and Assumption8
3.2Common Symbol9
3.3SADLS Overview9
Chapter 4Pseudonym Update Strategy18
4.1Conditions of Pseudonym Update Success18
4.2Pseudonym Update Strategy in SADLS21
4.3Identity Swap (IS)27
Chapter 5Proposed Location Service Protocol32
5.1Protect Privacy Information in Location Management Packets32
5.2Mechanism of Prevent Location Misuse35
Chapter 6Anonymity and Security Analysis36
6.1Anonymity Analysis36
6.2Security Analysis38
Chapter 7Performance Evaluation39
7.1Parameter Configuration and Simulation Environment39
7.2Simulation Study42
Conclusion52
References53
Appendix APacket Format of both VHR [3] and DISPOSER [11]56
Appendix B Simulation Results of SADLS58
Appendix C Simulation Results of DISPOSER61
[1]M. Mauve, J. Widmer and H. Hartenstein, A Survey on Position Based Routing in Mobile Ad-hoc Networks, IEEE Network Magazine, 15(6): pp. 30–39, No-vember 2001.
[2]B. Karp, H.T. Kung, GPSR: greedy perimeter stateless routing for wireless net-works, in Mobile Computing and Networking, pp. 243–254, 2000.
[3]L. Blazevic, L. Buttyan, S. Giordano, J.-P. Hubaux, and J.-Y. Le Boudec, Self-Organization in Mobile Ad hoc networks: The Approach of Terminodes, IEEE Personal Communications, pp. 166–174, June, 2000.
[4]S. Basagni and et. al. A Distance Routing Effect Algorithm for Mobility (DREAM). In ACM/IEEE MobiCom '98, October, 1998
[5]H. Cheng, J. Cao, H.-H. Chen and H. Zhang. “GrLS: Group-based location ser-vice in mobile ad hoc networks,” IEEE Transactions on Vehicular Technology, 57(6): pp. 3693-3707, November, 2008.
[6]Y. Xue, B. Li, and K. Nahrstedt, “A scalable location management scheme in mobile ad-hoc networks,” Proc. 26th Ann. IEEE Conf. Local Computer Networks, 2001.
[7]W. Kiess, H. Fssler, J. Widmer, M. Mauve, “Hierarchical Location Service for Mobile Ad-Hoc Networks”, ACM MC2R, vol. 8, no. 4, Oct. 2004.
[8]I. Stojmenovic, “A routing strategy and quorum based location update scheme for ad hoc wireless networks,” SITE, Univ. Ottawa, Ottawa, ON, Canada, Tech. Rep. TR-99-09, 1999.
[9]X. Wu, “VDPS: Virtual home region based distributed position service in mobile ad hoc networks,” in Proc. ICDCS, pp. 113–122, June, 2005.
[10]P. Hsiao, “Geographical region summary service for geographical routing,” ACM MC2R, vol. 5, no. 4, pp. 25–39, January, 2002.
[11]X. Wu, “DISPOSER: distributed secure position service in mobile ad hoc net-works: Research Articles,” Wirel. Commun. Mob. Comput., vol. 6, no. 3, pp. 357–373, 2006.
[12]Z. Zhi and Y. K. Choong. Anonymizing Geographic Ad Hoc Routing for Pre-serving Location Privacy. In IEEE ICDCSW’05, pp. 646–651, 2005.
[13]J. Zhou, Z. Lu. A Secure Distributed Location Service Scheme for Mobile Ad Hoc Networks. In IEEE CNMT, pp. 1-4, 2009.
[14]Isakow, A. and Shi, H. “Design and Development of ‘GlobeTrotter’ –An Innova-tive Location Based System using J2ME”, International Journal of Computer Science and Network Security, Vol 8 No. 3, pp. 201-207, March, 2008.
[15]Sheng-Cheng Yeh, Wu-Hsiao Hsu, Ming-Yang Su, Ching-Hui Chen, and Ko-Hung Liu, “A Study on Outdoor Positioning Technology Using GPS and WiFi Networks”, In IEEE ICNSC, pp.597-601, March, 2009.
[16]A. Beresford and F. Stajano. Mix zones: User privacy in location-aware services. In IEEE PerSec, 2004.
[17]J. Liao and J. Li. Effectively Changing Pseudonyms for Privacy Protection in VANETs. In IEEE ISPAN, pp. 648-652, 2009.
[18]J. Freudiger*, M. H. Manshaei*, J.-Y. Le Boudec, and J.-P. Hubaux. On the Age of Pseudonyms in Mobile Ad Hoc Networks. In IEEE Infocom, 2010.
[19]P. J. Chuang, J. S. Deng and C. S. Lin. Location Privacy Protection Using Inde-pendent ID Update for WLANs. In Journal of Information Science and Engi-neering 27, pp. 403-418, March, 2011.
[20]M. Li, K. Sampigethaya, L. Huang, and R. Poovendran, “Swing & Swap: Us-er-Centric Approaches Towards Maximizing Location Privacy,” ACM WPES, pp. 19-28, October, 2006.
[21]J. F. Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor, Designing Privacy Enhancing Technologies: Workshop on Design Issue in Anonymity and Unobservability, pages 10–29. Springer-Verlag, LNCS 2009, July 2000.
[22]V. Gupta, S. Gupta, S. Chang, and D. Stebila. Performance Analysis of Elliptic Curve Cryptography for (SSL). In Proc. ACM Workshop on Wireless Security, September, 2002.
[23]Xiaoxin Wu and Bharat Bhargava,“AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol.” IEEE Transactions on Mobile Computing, vol. 4, no. 4, pp. 335-348, July, 2005.
[24]Qualnet, Scalable Network Technologies (SNT), http://www.qualnet.com/, 2011.
[25]D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Net-works,” in Mobile Computing (Kluwer Academic) chapter 5, pp. 153-181, 1996.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *