Basic Search / Detailed Display

Author: 黃信翔
Hsin-Hsiang Huang
Thesis Title: 適用於MANET之具安全性與匿名性的分散式位置服務
Secure and Anonymous Distributed Location Service for Mobile Ad Hoc Networks
Advisor: 羅乃維
Nai-Wei Lo
Committee: 賴源正
Yuan-Cheng Lai
林伯慎
Bor-Shen Lin
Degree: 碩士
Master
Department: 管理學院 - 資訊管理系
Department of Information Management
Thesis Publication Year: 2011
Graduation Academic Year: 99
Language: 英文
Pages: 63
Keywords (in Chinese): 無線行動隨意網路位置服務匿名性安全性
Keywords (in other languages): Mobile ad hoc network, Location service, Anonymity, Security
Reference times: Clicks: 325Downloads: 4
Share:
School Collection Retrieve National Library Collection Retrieve Error Report
  • 在大型而且密集的無線行動隨意網路 (MANET),位置基礎的路由協定能夠提供良好的路由效能,它需要目的地的座標位置作為必要的路由資訊。位置資訊的使用能夠提升路由效能,然而它也是一個具有高度隱私的資料。因為無線網路訊號開放的特性,使得訊息內容非常容易被竊聽。為了保護私密資料,常見的方法是使用加密操作。資料加密會造成控制封包容量的增加以及處理時間的延遲,衝擊到路由效能。此外位置基礎的路由協定必須有一套完善的位置管理機制,它提供位置更新以及位置查詢的基本功能。為了在各個階段都能夠保持移動節點的匿名性以及保護它的位置隱私,我們提出一個具備安全性以及匿名性的位置服務機制,它的英文簡稱為SADLS。我們盡量減少加密操作的使用,而是透過使用假名的方式來隱匿隨意節點的真實識別名稱以及位置資訊這些私密資料。分析與模擬的結果顯示SADLS能夠得到比DISPOSER更好的安全性、匿名性以及效能。平均延遲時間在位置查詢時減少百分之五十八,在位置更新時減少百分之九十。


    In large and dense mobile ad hoc network, location-based routing protocols which use location information of destination to make route decision can offer signif-icant route performance. It can promote route performance by using location infor-mation. However, it is also a high private data for person. Due to the characteristic of signal open in wireless network, it is very easy to eavesdrop the message contexts. To protect private data, encryption operation is a common method. Data encryption causes control packet size increase and operation latency, it impacts the network per-formance. Furthermore, location-based routing protocols must have a complete loca-tion service; it can offer the basic functions of location management, such as location update and location query. To maintain both anonymity of mobile node and protection of its location privacy at all stages, we propose a secure and anonymous distributed location service named SADLS. We reduce to use data encryption as much as possible. Thus, we hide the private data such as the real identity of mobile node and its location information through using pseudonym as identifier of node. Both analysis and simula-tion results show that SADLS can offer better security, anonymity and performance than DISPOSER. The average end-to-end delay for location query reduces 58%. However, it reduces 90% in location update.

    中文摘要 i ABSTRACT ii 誌謝 iii CONTENTS iv List of Figures and Tables vi Chapter 1 Introduction 1 Chapter 2 Related Works 3 Chapter 3 Secure and Anonymous Distributed Location Service (SADLS) 8 3.1 Security Goal and Assumption 8 3.2 Common Symbol 9 3.3 SADLS Overview 9 Chapter 4 Pseudonym Update Strategy 18 4.1 Conditions of Pseudonym Update Success 18 4.2 Pseudonym Update Strategy in SADLS 21 4.3 Identity Swap (IS) 27 Chapter 5 Proposed Location Service Protocol 32 5.1 Protect Privacy Information in Location Management Packets 32 5.2 Mechanism of Prevent Location Misuse 35 Chapter 6 Anonymity and Security Analysis 36 6.1 Anonymity Analysis 36 6.2 Security Analysis 38 Chapter 7 Performance Evaluation 39 7.1 Parameter Configuration and Simulation Environment 39 7.2 Simulation Study 42 Conclusion 52 References 53 Appendix A Packet Format of both VHR [3] and DISPOSER [11] 56 Appendix B Simulation Results of SADLS 58 Appendix C Simulation Results of DISPOSER 61

    [1] M. Mauve, J. Widmer and H. Hartenstein, A Survey on Position Based Routing in Mobile Ad-hoc Networks, IEEE Network Magazine, 15(6): pp. 30–39, No-vember 2001.
    [2] B. Karp, H.T. Kung, GPSR: greedy perimeter stateless routing for wireless net-works, in Mobile Computing and Networking, pp. 243–254, 2000.
    [3] L. Blazevic, L. Buttyan, S. Giordano, J.-P. Hubaux, and J.-Y. Le Boudec, Self-Organization in Mobile Ad hoc networks: The Approach of Terminodes, IEEE Personal Communications, pp. 166–174, June, 2000.
    [4] S. Basagni and et. al. A Distance Routing Effect Algorithm for Mobility (DREAM). In ACM/IEEE MobiCom '98, October, 1998
    [5] H. Cheng, J. Cao, H.-H. Chen and H. Zhang. “GrLS: Group-based location ser-vice in mobile ad hoc networks,” IEEE Transactions on Vehicular Technology, 57(6): pp. 3693-3707, November, 2008.
    [6] Y. Xue, B. Li, and K. Nahrstedt, “A scalable location management scheme in mobile ad-hoc networks,” Proc. 26th Ann. IEEE Conf. Local Computer Networks, 2001.
    [7] W. Kiess, H. Fssler, J. Widmer, M. Mauve, “Hierarchical Location Service for Mobile Ad-Hoc Networks”, ACM MC2R, vol. 8, no. 4, Oct. 2004.
    [8] I. Stojmenovic, “A routing strategy and quorum based location update scheme for ad hoc wireless networks,” SITE, Univ. Ottawa, Ottawa, ON, Canada, Tech. Rep. TR-99-09, 1999.
    [9] X. Wu, “VDPS: Virtual home region based distributed position service in mobile ad hoc networks,” in Proc. ICDCS, pp. 113–122, June, 2005.
    [10] P. Hsiao, “Geographical region summary service for geographical routing,” ACM MC2R, vol. 5, no. 4, pp. 25–39, January, 2002.
    [11] X. Wu, “DISPOSER: distributed secure position service in mobile ad hoc net-works: Research Articles,” Wirel. Commun. Mob. Comput., vol. 6, no. 3, pp. 357–373, 2006.
    [12] Z. Zhi and Y. K. Choong. Anonymizing Geographic Ad Hoc Routing for Pre-serving Location Privacy. In IEEE ICDCSW’05, pp. 646–651, 2005.
    [13] J. Zhou, Z. Lu. A Secure Distributed Location Service Scheme for Mobile Ad Hoc Networks. In IEEE CNMT, pp. 1-4, 2009.
    [14] Isakow, A. and Shi, H. “Design and Development of ‘GlobeTrotter’ –An Innova-tive Location Based System using J2ME”, International Journal of Computer Science and Network Security, Vol 8 No. 3, pp. 201-207, March, 2008.
    [15] Sheng-Cheng Yeh, Wu-Hsiao Hsu, Ming-Yang Su, Ching-Hui Chen, and Ko-Hung Liu, “A Study on Outdoor Positioning Technology Using GPS and WiFi Networks”, In IEEE ICNSC, pp.597-601, March, 2009.
    [16] A. Beresford and F. Stajano. Mix zones: User privacy in location-aware services. In IEEE PerSec, 2004.
    [17] J. Liao and J. Li. Effectively Changing Pseudonyms for Privacy Protection in VANETs. In IEEE ISPAN, pp. 648-652, 2009.
    [18] J. Freudiger*, M. H. Manshaei*, J.-Y. Le Boudec, and J.-P. Hubaux. On the Age of Pseudonyms in Mobile Ad Hoc Networks. In IEEE Infocom, 2010.
    [19] P. J. Chuang, J. S. Deng and C. S. Lin. Location Privacy Protection Using Inde-pendent ID Update for WLANs. In Journal of Information Science and Engi-neering 27, pp. 403-418, March, 2011.
    [20] M. Li, K. Sampigethaya, L. Huang, and R. Poovendran, “Swing & Swap: Us-er-Centric Approaches Towards Maximizing Location Privacy,” ACM WPES, pp. 19-28, October, 2006.
    [21] J. F. Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor, Designing Privacy Enhancing Technologies: Workshop on Design Issue in Anonymity and Unobservability, pages 10–29. Springer-Verlag, LNCS 2009, July 2000.
    [22] V. Gupta, S. Gupta, S. Chang, and D. Stebila. Performance Analysis of Elliptic Curve Cryptography for (SSL). In Proc. ACM Workshop on Wireless Security, September, 2002.
    [23] Xiaoxin Wu and Bharat Bhargava,“AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol.” IEEE Transactions on Mobile Computing, vol. 4, no. 4, pp. 335-348, July, 2005.
    [24] Qualnet, Scalable Network Technologies (SNT), http://www.qualnet.com/, 2011.
    [25] D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Net-works,” in Mobile Computing (Kluwer Academic) chapter 5, pp. 153-181, 1996.

    QR CODE