簡易檢索 / 詳目顯示

研究生: 李榮祥
Rong-siang Li
論文名稱: 用於車載網路之無第三方協助的安全機制設計與評估
Design and Evaluation of a Secure Mechanism without the Third Party for VANETs
指導教授: 馮輝文
Huei-Wen Ferng
口試委員: 林嘉慶
Jia-Chin Lin
鄭傑
Jay Cheng
吳中實
Jung-Shyr Wu
黎碧煌
Bih-Hwagn Lee
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2012
畢業學年度: 100
語文別: 中文
論文頁數: 48
中文關鍵詞: 車載隨意網路攻擊安全驗證
外文關鍵詞: VANETs, Attack, Security, Verification
相關次數: 點閱:197下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在隨意網路中,車載隨意網路是屬於行動隨意網路的延伸,沿襲下來有許多不同的攻擊,
    所以車載隨意網路的安全是非常重要的議題,
    以往的車載行動網路總是假設存在有路邊設施或第三方的協助下,用來保護傳輸環境的安全,
    但是這樣假設並非合理與妥善,因此,本論文提出不需要第三方協助的安全機制,
    透過建立車與車之間的信任模型與車與車之間的註冊機制,及改善驗證的方法,
    來提升車載網路的安全和減緩造成的延遲問題,並達到相對的安全性,最後,在安全分析與模擬方面,
    本論文的機制與比較對象TMSMBM相較,在安全性、效能及延遲方面,皆都有較好的表現。


    In ad hoc network, VANET is part of MANET, and inherit it many attacks.
    This make the securtiy issue, in particular, very important in VANET.
    In the past, secure mechanism for VANET always designed under the assumption that road side unit or
    a third party using to protect the transmission security. Since this assumption is not reasonable,
    a secure mechanism without the third party is the proposed in this thesis. Our proposed is composed of
    registered between car and car, building trusted model between car and car and improved verification delay
    problem. To increase VANET security and to reduce the delay time, then to reach the relative security.
    Finially, this papaer compared with TMSMBM. According the analysis and simulation results,
    a better performance on security, efficiency, and delay time.

    目錄 中文摘要 i 英文摘要 ii 目錄 iii 表格目錄 v 圖形目錄 vi 1 緒論 1 2 相關文獻回顧 4 2.1 VANET的路由搜尋方式 . . . . . . . . . . . . . . . . . . . . 4 2.2 VANET的攻擊特性與手法 . . . . . . . . . . . . . . . . . . 5 2.3 資料的安全需求 . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.3.1 機密性(Con dentiality) . . . . . . . . . . . . . . . . . . . . 6 2.3.2 可信性(Authenticity) . . . . . . . . . . . . . . . . . . . . . 6 2.3.3 完整性(Integrity) . . . . . . . . . . . . . . . . . . . . . . . 6 2.3.4 不可否認性(Non-repudiation) . . . . . . . . . . . . . . . . 6 2.4 具有RSU協助的安全機制. . . . . . . . . . . . . . . . . . 7 2.5 無第三方協助下的安全機制 . . . . . . . . . . . . . . . 8 2.6 相關研究問題討論. . . . . . . . . . . . . . . . . . . . . . . 9 3 系統架構與安全機制 11 3.1 系統環境與架構 . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.2 假設(Assumptions) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.3 車與車相互註冊機制 . . . . . . . . . . . . . . . . . . . . . 14 3.4 加入HMAC驗證機制 . . . . . . . . . . . . . . . . . . . . . . 15 3.5 重定信任層級重新計算的方式 . . . . . . . . . . . . . 18 4 安全效能分析與模擬結果討論 20 4.1 安全分析 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 4.2 效能分析 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 4.2.1 Computation Overhead . . . . . . . . . . . . . . . . . . . . . . 23 4.2.2 Transmission Overhead . . . . . . . . . . . . . . . . . . . . . . 24 4.2.3 Key Storage Overhead . . . . . . . . . . . . . . . . . . . . . . 24 4.2.4 模擬結果與討論 . . . . . . . . . . . . . . . . . . . . . . . 25 5 總結 32 參考文獻 33 致謝 38 表格目錄 3.1 Registered table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 4.1 Computation overhead . . . . . . . . . . . . . . . . . . . . . . . . . . 23 4.2 Transmission overhead . . . . . . . . . . . . . . . . . . . . . . . . . . 24 4.3 Key storage overhead . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 4.4 Simulation paremeters . . . . . . . . . . . . . . . . . . . . . . . . . . 25 圖形目錄 1.1 DSRC Spectrum band and Channels in the U.S. . . . . . . . . . . . . 1 3.1 Network model for VANET . . . . . . . . . . . . . . . . . . . . . . . 11 3.2 Trust Model Flowchart . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.3 Basic Use of Hash-based Message Authentication Code (HMAC) . . . 16 4.1 Probability of recalculation were a ected by compromised vehicles . . 22 4.2 Veri cation delay vs. the number of messages (50 and 150 vehciles in same scenario) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 4.3 Veri cation delay vs. the number of messages (50 vehicles in di erent scenario) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 4.4 Veri cation delay vs. the number of messages (150 vehicles in di erent scenario) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 4.5 Veri cation delay vs. the number of messages (50 and 150 vehicles in di erent scenario) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 4.6 Impact of vehicles density: Propose vs. TMSMBM in low speed scenario 28 4.7 Impact of vehicles density: Proposed vs. TMSMBM in high speed scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 4.8 Veri cation delay vs. the number of messages in low speed scenario . 30 4.9 Veri cation delay vs. the number of messages in high speed scenario . 30 4.10 Average delay time vs. the number of vehicles in low speed scenario . 31 4.11 Average delay time vs. the number of vehicles in high speed scenario 31

    [1] D. Jiang and L. Delgrossi, "IEEE 802.11p: Towards an International Standard
    for Wireless Access in Vehicular Environments," in Proc. IEEE VTC, May 2008,
    pp. 2036--2040.
    [2] P. B. Velloso, R. P. Laufer, O. C.M. B. Duarte, and G. Pujolle, "Trust Man-
    agement in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model,"
    in IEEE Trans. Netw. Service Manage, vol. 7, no. 3, pp. 172--185, Sep. 2010.
    [3] S. Youse , M.S. Mousavi, and M. Fathy, "Vehicular Ad Hoc Networks
    (VANETs): Challenges and Perspectives," in Proc. 6th IEEE Int. Conf. ITS
    Telecommun., Jun. 2006, pp. 761--766.
    [4] F. Lin, Y. Wang, "Routing in vehicular ad hoc networks: A survey," IEEE
    Vehicular Technology Magazine, vol. 2, no. 2, pp. 12--22, Jun. 2007.
    [5] A. Akram, F. Aadil, and S. Khayyam, "Modern routing protocol for VanNETs
    (MODNET)," in Computer Networks and Information Technology (ICCNIT),
    July 2011, pp. 71--74.
    [6] J.-J. Chang, Y.-H. Li, W. Liao, and I.-C. Chang, "Intersection-based routing
    for urban vehicular communications with tra c-light considerations," IEEE
    Wireless Communications., Feb. 2012, pp. 82--88.
    [7] W. Wang, F. Xie, and M. Chatterjee, "Small-Scale and Large-Scale Routing in
    Vehicular Ad Hoc Networks," IEEE Trans. Veh. Technol., vol. 58, no. 9, pp.
    5200--5213, Nov. 2009.
    [8] H. Saleet, R. Langar, S. Naik, R. Boutaba, A. Nayak, and N. Goel,
    "Intersection-Based Geographical Routing Protocol for VANETs: A Proposal and Analysis," IEEE Trans. Veh. Technol., vol. 60,

    no. 9,pp. 4560--4574, Nov.2011.
    [9] I.A. Sumra, I. Ahmad, H. Hasbullah, and J.-L. bin Ab Manan, "Classes of
    attacks in VANET," in Electronics, Communications and Photonics Conference
    (SIECPC), April 2011, pp. 1--5.
    [10] G. Samara, W.A.H. Al-Salihy, and R. Sures, "Security Issues and Challenges of
    Vehicular ad hoc networks (VANETs)," in New Trends in Information Science
    and Service Science (NISS), May 2010, pp. 393--398.
    [11] J.T. Isaac, S. Zeadally, and J.S. Camara, "Security attacks and solutions for
    vehicular ad hoc networks," IET Communications, April 2010 , pp. 894--903.
    [12] S.M. Sa , A. Movaghar, and M. Mohammadizadeh, "A Novel Approach for
    Avoiding Wormhole Attacks in VANET," in 2009. WCSE '09. Second Interna-
    tional Workshop on Computer Science and Engineering, Oct. 2009 , pp. 160--
    165.
    [13] J. Grover, M.S. Garur, and V. Laxmi, "Position Forging Attacks in Vehicular Ad
    Hoc Networks: Implementation, Impact and Detection," in Proceedings of the
    7th International Wireless Communications and Mobile Computing Conference
    (IWCMC 2011), July 2011 , pp. 701--706.
    [14] N. Alsharif, A. Wasef, and S. Xuemin, "Mitigating the E ects of Position-Based
    Routing Attacks in Vehicular Ad Hoc Networks," in 2011 IEEE International
    Conference on Communications (ICC), June 2011 , pp. 1--5.
    [15] J. M. D. Fuentes, A. I. Gonzalez-Tablas, and A. Ribagorda, "Overview of Secu-
    rity Issues in Vehicular Ad-hoc Networks," in Handbook of Research on Mobility
    and Computing: Evolving Technologies and Ubiquitous Impacts., IGI Global,
    2011, pp. 894--911
    [16] A. Wasef, R. Lu, X. Lin, and X. Shen, "Complementing public key infrastruc-
    ture to secure vehicular ad hoc networks," in IEEE Wireless Communications,
    vol.17, no. 5, Oct. 2010, pp. 127-139
    [17] C. Gosman, C. Dobre, and V. Cristea, "A Security Protocol for Vehicular
    Distributed," in Symbolic and Numeric Algorithms for Scienti c Computing
    (SYNASC), 2010 12th International Symposium on, Sept. 2010, pp. 321-327
    [18] Y. Qian and N. Moayeri, "Design of Secure and Application-Oriented
    VANETs," in Proc. of the IEEE 67th Vehicular Technology Conference(VTC
    2008), May 2008, pp. 2794--2799.
    [19] G. Samara, W.A.H. Al-Salihy, and R. Sures, "E cient certi cate management
    in VANET," in 2010 2nd International Conference on Future Computer and
    Communication (ICFCC), May 2010, pp. 750--754.
    [20] N. Ristanovic, P. Papadimitratos, G. Theodorakopoulos, J.P. Hubaux, and J.Y.
    Le Boudec, "Adaptive Message Authentication for multi-hop networks," in 2011
    IEEE/IFIP International Conference on Wireless On-Demand Network Sys-
    tems and Services (WONS), Jan. 2011 , pp. 96--103.
    [21] H.T. Wu, W.S. Li, T.S. Su, and W.S. Hsieh, "A Novel RSU-Based Message Au-
    thentication Scheme for VANET," in Systems and Networks Communications
    (ICSNC), 2010 Fifth International Conference on, Aug. 2010, pp. 111--116.
    [22] M. Dikmak, Z. Sabra, A. Kayssi, and A. Chehab, "Optimized conditional pri-
    vacy preservation in VANETs," in Telecommunications(ICT), 2012 19th Inter-
    national Conference on, April 2012, pp. 1--6.
    [23] Rongxing Lu, Xiaodong Lin, Xiaohui Liang, and Shen, "A Dynamic Privacy-
    Preserving Key Management Scheme for Location-Based Services in VANETs,"
    IEEE Transactions on Intelligent Transporttation System, vol. 13, no. 1,pp. 1--6,
    March 2012.
    [24] C. Zhang, X. Lin, R. Lu, P.-H. Ho and X. Shen, "An E cient Message Authen-
    tication Scheme for Vehicular Communications," IEEE Trans. Veh. Technol.,
    vol. 57, no. 6, pp. 3357--3368, 2008.
    [25] Y. Hao, Y. Cheng, C. Zhou, and W. Song, "A Distributed Key Management
    Framework with Cooperative Message Authentication in VANETs," in IEEE Journal on Selected Areas in Communications, vol. 29,

    no. 3, March 2011 , pp.616--629.
    [26] J. L. Huang, L. Y. Yeh, and H. Y. "ABAKA: An Anonymous Batch Authen-
    ticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad
    Hoc Networks," IEEE Transactions on Vehicular Technology, vol. 60, no. 1, pp.
    248--262, Jan. 2011.
    [27] J. Y. Sun, C. Zhang, Y. Zhang, and Y. Fang, "An Identity-Based security
    system for user privacy in vehicular ad hoc networks," IEEE Trans. Parallel
    and Distrib. Syst., vol. 21, no. 9, pp. 1227--1239, Sep. 2010.
    [28] L. Y. Yeh, Y. C. Chen, and J. L. Huang, "ABACS: An Attribute-Based Access
    Control System for Emergency Services over Vehicular Ad Hoc Networks," Se-
    lected Areas in Communications, IEEE Journal on, vol. 29, no. 3, pp. 630--643,
    March 2011.
    [29] P. B. Velloso, R. P. Laufer, O. C. M. B. Duarte, and G. Pujolle "A Trust Model
    Robust to Slander Attacks in Ad Hoc Networks," in IEEE International Conf.
    Comput. Commun. Netw. ANC workshop, Aug. 2008, pp. 1--6.
    [30] L. Chen, S.-L. Ng, and G. Wang, "Threshold Anonymous Announcement in
    VANETs," Selected Areas in Communications, IEEE Journal on, vol. 29, no.
    3, pp. 605--615, March 2011.

    QR CODE