Basic Search / Detailed Display

Author: 黃正勵
Jeng-Li Huang
Thesis Title: 適用於車輛隨意網路之合作式散播與偵試系統
Cooperative Dissemination and Detection System for a Vehicular Ad-Hoc Network
Advisor: 馮輝文
Huei-Wen Ferng
Committee: 黎碧煌
none
吳中實
none
黃依賢
none
Degree: 碩士
Master
Department: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
Thesis Publication Year: 2010
Graduation Academic Year: 98
Language: 英文
Pages: 19
Keywords (in Chinese): 車輛隨意網路智慧型傳輸系統專用短距離傳輸入侵偵測系統車輛間通訊邊邊車輛間通訊
Keywords (in other languages): Vehicular Ad-Hoc Network, Intelligent Transportation System, Dedicated Short Range Communication, Intrusion Detection System, Inter-Vehicle Communication, Roadside to Vehicle Communication.
Reference times: Clicks: 233Downloads: 0
Share:
School Collection Retrieve National Library Collection Retrieve Error Report
  • 近幾年,MANET的通訊已變成是一種廣泛的趨勢,VANET是其中的一種特例。VANET 是由車輛以及路邊裝置所組成,各裝置會不定時以廣播方式告知已發生及將要發生的事件,並幫忙轉傳別人的訊息。其中異常訊息有分惡意與非惡意的,IDS 糸統可阻絕惡意的破壞,但對於系統本身的錯誤有時無法預防。由於大部份的訊息傳播是採廣播方式,為了減少無謂訊息以增加散播效能,我們提出了VANET中的合作式散播與偵試系統,主要關鍵的預測因素減少了初始時的異常訊息並提昇了整體散播的效能。


    In these years, applications for MANET communication become the extensive trends. Vehicular Ad-Hoc Network (VANET) is one special case of it. In VANET, it consists of on-board unit (OBU) and road-side unit (RSU). Each unit sends events to notify other units occurred and on-going events related to it and forward packets from other units. The anomaly events may be malicious or rational. Sometimes, rational events are caused by hardware issues that can’t generate proper events to others. IDS technology detects the malicious event but can’t figure out rational events sometimes. Most VANET events are sent by broadcast packets, it will take much resources of network transmission. To improve the data dissemination performance, we propose cooperative detection system to for a VANET. The major forecast factor reduces the anomaly packets in initial. The anomaly packets were eliminated that reduce the broadcast packets will improve the dissemination performance.

    Introduction The Proposed Schemes Numerical Results and Discussions Conclusions

    F. Dotzer, L. Fischer, and P. Magiera, “VARS: A Vehicle Ad-hoc network reputation system,“ in Proc. IEEE WoWMoM’05, 2005, pp. 1-5
    N. W. Lo and H. C. Tsai, “Illusion attack on VANET applications - a message plausibility problem,“ in Proc. IEEEGlobecom Workshops’07, 2007, pp. 1-8.
    H. W. Ferng and C. L. Liu “Joint defense system for mobile ad Hoc networks,“ in Proc. IEEE VTC ’06, 2006, pp. 742-746.
    X. T. Sun, X. D. Lin, and P. H. Ho, “Secure vehicular communications based on group signature and ID-based signature scheme,“ in Proc. IEEE ICC ’07, 2007, pp. 1539-1545.
    J. Guo, J. P. Baugh, and S. Q. Wang, “A group signature based secure and privacy-Preserving vehicular communication framework,“ in Proc. IEEE MNVE ’07, 2007, pp. 103-108.
    K. Sampigethaya, M. Y. Li, L. Huang, and R. Poovendran, “AMOEBA: Robust location privacy scheme for VANET,“ in IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 8, Oct. 2007, pp. 1569-1589
    C. Harsch, A. Festag, and P. Papadimitratos, “Secure position-based routing for VANETs,“ in Vehicular Technology Conference, 2007. VTC-2007 Fall. 2007 IEEE 66th, pp26-30
    M. Raya, P. Papadimitratos, and J. P. Hubaux, “Securing vehicular communications,“ Wireless Communications, IEEE, pp.8-15
    K. F. Yeh and N. W. Lo, “A security-oriented and privacy-aware architecture on vehicular ad hoc networks,“ NTUST.
    C. N. Tu and Y. W. Chen, “An efficient data dissemination model for VANETs,“ NCU
    P. Papadimitratos, L. Buttyan, J-P. Hubaux, F. Kargl, A. Kung, and M. Raya, “Architecture for secure and private vehicular communications,“ Computer Communications Workshops, 2008. INFOCOM. IEEE Conference on Volume , Issue , 13-18 April 2008, pp. 1-6
    B. D. Ostermaier, F. Dotzer, and M. Strassberger, “Enhancing the security of local DangerWarnings in VANETs - a simulative analysis of voting schemes, availability, reliability and security,“ The Second International Conference, pp.422-431.
    A. Aijaz, B. Bochow, F. Dotzer, A. Festag, M. M. Gerlach, R. Kroh, and T. Leinmuller, “attacks on inter vehicle communication systems - an analysis,“ 3rd Inter-national Workshop on Intelligent Transportation (WIT 2006), 2006.
    F. Dotzer, F. Kohlmayer, T. Kosch, and M. Strassberger, “Secure communication for in-tersection sssistance,“ in Proc. 2nd International Workshop on In-telligent Transportation, Hamburg, Germany ’05, 2005.
    J. P. Hubaux, S. Capkun, and J. Luo, “The security and privacy of smart vehicles,“ Security & Privacy Magazine, IEEE, vol. 02, pp. 49-55, 2004.
    K. Plosl, T. Nowey, C. T. Mletzko, “Towards a security architecture for vehicular ad hoc networks,“ In Proc. First International Conference on Availability, Reliability and Security (ARES’06), 2006.
    M. Raya and J. P. Hubaux, “The security of vehicular ad hoc networks,“ in Proc. 3rd ACM workshop on Security of ad hoc and sensor networks, Alexandria, VA, USA, ’05.
    M. Nekovee and B.B. Bogason“Reliable and efficient information dissemination in intermittently connected vehicular adhoc networks 2007,“ in Proc. IEEE VTC, pp. 2486-2490.
    M. Bechler, L. Wolf, L. Storz, O. Storz, and W.J. Franz, “Efficient discovery of Internet gateways in future vehicular communication systems,“ in Proc. Of IEEE VTC2003, Jul. 2003.
    A. Nandan , S. S. Das , G. Pau , M. Gerla , and M. Y. Sanadidi, “Co-operative downloading in vehicular ad-hoc wireless networks,“ in Proc. Second Annual Conference on Wireless On-demand Network Systems and Services (WONS’05), p.32-41, Jan. 19-21, 2005
    R. Sherwood, R. Braud and B. Bhattacharjee, “Slurpie:a co-operative bulk data transfer protocol,“ in Proc.of IEEE INFOCOM ’04.
    S. S. Das, A. Nandan, G. V. Pau, M.Y. Sanadidi, and M. Gerla, “SPAWN: a swarming protocol for vehicular ad-hoc wireless networks,“ First ACM Workshop on Vehicular Ad Hoc Networks (VANET 2004).
    M. Fiore, C. Casetti, and C. F. Chiasserini, “On-demand content delivery in vehicular wireless networks,“ in Proc. 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems (MSWiM 2005).
    C. T. Lochert, H. Hartenstein, J. Tian, D. Herrmann, H. Fu, and M. Mauve, “Routing strategy for vehicular ad hoc networks in city environments,“ in Proc. of IEEE Intelligent Vehicles Symposium (IV2003).
    A. H. Ho, Y. H. Ho, and K. A. Hua, “A connectionless approach to mobile ad hoc networks in street environments,“ in Proc. of IEEE Intelligent Vehicles Symposium (IV 2005), Nevada, USA. Jun. 2005, pp. 575-582 Y. C. Tseng, S. Y. Ni, Y. S. Chen, and J. P. Sheu, “The broadcast storm problem in a mobile ad hoc network,“ Wireless Networks ’02, vol. 8, pp. 153-167, Mar-May 2002.
    G. Korkmaz, E. Ekici, F. Ozguner, and U. Ozguner, “U.brban multi-hop broadcast protocol for inter-vehicle communication systems.“ in Proc. of ACM VANET ’04.
    H. Wu, R. Fujimoto, R. Guensler and M. Hunter , “MDDV: a mobility-centric data dissemination algorithm for vehicular networks ,“ in Proc. of ACM VANET ’04.
    R. Mangharam, J. J. Meyers, R. Rajkumar, D. D. Stancil, J. S. Parikh, H. H. Krishnan, C. O. Kellum, “A multi-hop mobile networking test-bed for telematics“, 2004 SAE International.
    J. J. Blum, A. Eskandarian, and Lance J. Hoffman, “Challenges of intervehicle ad hoc networks,“ IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS ’04, Vol. 5, No. 4, Dec. 2004.

    無法下載圖示 Full text public date 2015/08/02 (Intranet public)
    Full text public date This full text is not authorized to be published. (Internet public)
    Full text public date This full text is not authorized to be published. (National library)
    QR CODE