簡易檢索 / 詳目顯示

研究生: 許仡聖
Shiu, Yi-Sheng
論文名稱: Secure Data Transmission Schemes for Wireless Networks
無線傳輸安全機制
指導教授: 張適宇
Chang, Shih-Yu
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 通訊工程研究所
Communications Engineering
論文出版年: 2009
畢業學年度: 97
語文別: 英文
論文頁數: 48
中文關鍵詞: 無線網路安全
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近來由於隨著無線傳輸技術之發展,無線網路在日常生活上的應用範圍越來越廣,隨著許多應用的環境開發,許多機密的資料也藉由無線網路的媒介傳輸,資料中包含的個人身分資料,如銀行帳號、信用卡密碼、個人住家地址與通訊方式等等,在無線網路環境中由於無線傳輸的特性,難以控制存取的對象,所以需要有安全的機制,讓機密性的資料無法被非法使用者獲得。另外,無線應用在於軍事用途中是相當重要的一部分,由於在嚴苛的戰場環境中非常容易受到敵方的干擾以及竊聽機密資訊,因此能夠在戰場中安全及有效的傳遞訊息是主要的安全需求。為了更清楚安全機制的需求,首先我們介紹在於無線傳輸網路的各類型攻擊模式,以及會造成的安全危害。接著依據安全機制的需求,介紹各種安全機制所要滿足的條件。本篇論文研究方向在於,無線通訊網路中建立於實體層(physical layer)的安全機制。由於無線網路中的各種資源的有限性,例如,電力、頻寬以及無線裝置的計算能力等等。因此,在設計安全機制時必須考慮到這些限制,依照安全等級的需求以及使用環境來設計所需的安全機制。我們將存在的安全機制分類為,頻道方法、編碼方法以及傳輸能量控制方法,三種方法。依序介紹在各分類方法中所使用的安全機制,以及能夠預防的攻擊方式;每種方法利用了不同在於實體層的特性或是編碼技術,用以實現在實體層上的安全機制。隨著在無線網路上的應用發展,因此安全機制也日益重要,陸續的有許多在實體層的安全機制被提出,也仍有許多安全技術問題上的需求,值得深入地研究,根據不同的安全環境及安全需求以及各種方法滿足的安全需求。


    Abstract i List of Figures v 1 Introduction 1 2 Background 5 2.1 POSSIBLE WIRELESS NETWORK ATTACKS . . . . . . . . . . . . . . . 5 2.1.1 DoS attacks and Resource Consumption . . . . . . . . . . . . . . . 6 2.1.2 Masquerade and Replay . . . . . . . . . . . . . . . . . . . . . . . . 7 2.1.3 Information Disclosure and Message Modification . . . . . . . . . . 8 2.1.4 Eavesdropping Intruders and Traffic Analysis . . . . . . . . . . . . 8 2.2 NETWORK SECURITY REQUIREMENTS . . . . . . . . . . . . . . . . . 9 2.2.1 Authentication and Non-repudiation . . . . . . . . . . . . . . . . . 9 2.2.2 Confidentiality and Access Control . . . . . . . . . . . . . . . . . . 9 2.2.3 Integrity and Availability . . . . . . . . . . . . . . . . . . . . . . . . 10 2.2.4 Resistance to jamming . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.2.5 Resistance to eavesdropping . . . . . . . . . . . . . . . . . . . . . . 12 3 EXISTING PHYSICAL LAYER SECURITY APPROACHES 16 3.1 CHANNEL APPROACHES . . . . . . . . . . . . . . . . . . . . . . . . . . 16 3.1.1 RF fingerprinting . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 3.1.2 ACDM Precoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3.1.3 Channel Keying Approach . . . . . . . . . . . . . . . . . . . . . . . 23 3.2 CODE APPROACHES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 3.2.1 Secure Error Correcting Codes . . . . . . . . . . . . . . . . . . . . . 24 3.2.2 Spread spectrum . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 3.2.3 CDMA Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 3.3 POWER APPROACHES . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 3.3.1 Directional Antennas . . . . . . . . . . . . . . . . . . . . . . . . . . 30 3.3.2 Artificial Noise Approach . . . . . . . . . . . . . . . . . . . . . . . . 31 3.3.3 Spatial Multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . 32 4 NUMERICAL RESULTS 36 4.1 Secret Channel Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 4.2 Computational Complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 5 CONCLUSION 43

    [1] C. S. R. Murthy and B. S. Manoj, Ad Hoc Wireless Networks: Architectures and
    Protocols. Prentice Hall PTR, 2004.
    [2] G. Noubir and G. Lin, “Low-power dos attacks in data wireless lans and countermea-
    sures,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 7,
    2003.
    [3] A. Ahmad, A. Biri, and H. Afifi, “Study of a new physical layer encryption concept,”
    in 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008.
    MASS 2008., 2008, pp. 860 – 865.
    [4] A. Spyropoulos and C. S. Raghavendra, “Energy efficient communications in ad hoc
    networks using directional antennas,” in IEEE INFOCOM 2002. Twenty-First An-
    nual Joint Conference of the IEEE Computer and Communications Societies. Pro-
    ceedings. Volume 1, 2002, pp. 220 – 228.
    [5] R. Ramanathan, “On the performance of ad hoc networks with beamforming anten-
    nas,” MobiHoc ’01: Proceedings of the 2nd ACM international symposium on Mobile
    ad hoc networking and computing, pp. 855–884, 2001.
    [6] Y. Hwang and H. Papadopoulos, “Physical-layer secrecy in awgn via a class of chaotic
    ds/ss systems: analysis and design,” IEEE Transactions on Signal Processing,, pp.
    2637 – 2649, 2004.
    [7] T. Li, J. Ren, Q. Ling, and A. Jain, “Physical layer built-in security analysis and en-
    hancement of cdma systems,” in IEEE Military Communications Conference, 2005.
    MILCOM 2005., 2005, pp. 956 – 962.
    [8] H. Koorapaty, A. Hassan, and S. Chennakeshu, “Secure information transmission for
    mobile radio,” IEEE Communications Letters,, pp. 52 – 55, 2000.
    [9] I. Hero, A.O., “Secure space-time communication,” IEEE Transactions on Informa-
    tion Theory,, pp. 3235 – 3249, 2003.
    [10] A. D. Wyner, The Wire-Tap Channel. Bell Sys. Tech. J., 1975.
    [11] W. Stallings, Cryptography and Network Security Principles and Practices. Prentice
    Hall PTR, 2006.
    [12] L. M. S. C., Wireless LAN medium access control (MAC) and physical layer (PHY)
    specifications., IEEE Computer Society, 1999.
    [13] B. E. White, “Layered communications architecture for the global grid,” in IEEE
    Military Communications Conference, 2001. MILCOM 2001. Communications for
    Network-Centric Operations: Creating the Information Force., 2001, pp. 506 – 511.
    [14] Y. Z. T. W. Wenyuan Xu, Wade Trappe, “The feasibility of launching and detecting
    jamming attacks in wireless networks,” MobiHoc ’05: Proceedings of the 6th ACM
    international symposium on Mobile ad hoc networking and computing, pp. 46 – 57,
    2005.
    [15] J. Bellardo and S. Savage, “802.11 denial-of-service attacks: Real vulnerabilities and
    practical solutions,” Proceedings of the USENIX Security Symposium, pp. 15–28.,
    2003.
    [16] W. Xu, “Channel surfing: Defending wireless sensor networks from interference,”
    in International Symposium on Information Processing in Sensor Networks, 2007.
    IPSN 2007. 6th, 2007, pp. 499 – 508.
    [17] K. Ma, Y. Zhang, and W. Trappe, “Mobile network management and robust spatial
    retreats via network dynamics,” in IEEE International Conference on Mobile Adhoc
    and Sensor Systems Conference, 2005., 2005.
    [18] C. Shannon, “A mathematical theory of communication,” Bell Syst.Tech., pp. 379 –
    423, 1948.
    [19] C. Landwehr and D. Goldschlag, “Security issues in networks with internet access,”
    Proceedings of the IEEE, pp. 2034 – 2051, 1997.
    [20] F. Petitcolas, R. Anderson, and M. Kuhn, “Information hiding-a survey,” Proceedings
    of the IEEE, pp. 1062 – 1078, 1999.
    [21] A. A. Tomko, C. J. Rieser, and L. H. Buell;, “Physical-layer intrusion detection in
    wireless networks,” in Military Communications Conference, 2006. MILCOM 2006,
    2006, pp. 1–7.
    [22] Z. Li, W. Xu, R. Miller, and W. Trappe, “Securing wireless systems via lower layer
    enforcements,” in WiSe ’06: Proceedings of the 5th ACM workshop on Wireless se-
    curity, 2006.
    [23] L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, “Fingerprints in the ether:
    Using the physical layer for wireless authentication,” in IEEE International Confer-
    ence on Communications, 2007. ICC ’07., vol. 24.
    [24] C. Sperandio and P. Flikkema, “Wireless physical-layer security via transmit precod-
    ing over dispersive channels: optimum linear eavesdropping,” in Proceedings MIL-
    COM 2002., 2002, pp. 1113 – 1117.
    [25] X. Li and E. Ratazzi, “Mimo transmissions with information-theoretic secrecy for
    secret-key agreement in wireless networks,” in IEEE Military Communications Con-
    ference, 2005. MILCOM 2005., 2005, pp. 1353 – 1359.
    [26] J. Hershey, A. Hassan, and R. Yarlagadda, “Unconventional cryptographic keying
    variable management,” IEEE Transactions on Communications,, pp. 3 – 6, 1995.
    [27] D. Abbasi-Moghadam, V. T. Vakili, and A. Falahati, “Combination of turbo coding
    and cryptography in nongeo satellite communication systems,” International Sym-
    posium on Telecommunications, 2008. IST 2008., pp. 27–28, 2008.
    [28] R. Pickholtz, D. Schilling, and L. Milstein, “Theory of spread-spectrum
    communications–a tutorial,” IEEE Transactions on Communications,, vol. 30, no. 5,
    pp. 855 – 884, 1982.
    [29] A. J. Viterbi, CDMA: Principles of Spread Spectrum Communication. Prentice Hall
    PTR, 1995.
    [30] M. Zhang, C. Carroll, and A. H. Chan., “Analysis of is-95 cdma voice privacy.”
    Selected Areas in Cryptography, pp. 1 – 13, 2000.
    [31] G. Noubir, “On connectivity in ad hoc network under jamming using directional
    antennas and mobility,” Second International Conference on Wired and Wireless
    Internet Communications (WWIC’04), pp. 54–62, 2004.
    [32] I. Csiszar and J. Korner, “Broadcast channels with confidential messages,” IEEE
    Transactions on Information Theory,, pp. 339 – 348, 1978.
    [33] S. W. Kim, “Cooperative spatial multiplexing in mobile ad hoc networks,” in IEEE
    International Conference on Mobile Ad hoc and Sensor Systems Conference, 2005.,
    2005.
    [34] J. Tugnait, L. Tong, and Z. Ding, “Single-user channel estimation and equalization,”
    IEEE Signal Processing Magazine,, pp. 16 – 28, 2000.
    [35] R. Negi and S. Goel, “Secret communication using artificial noise,” in IEEE Vehicular
    Technology Conference, VTC-2005-Fall. 2005 62nd, 2005, pp. 25 – 28.
    [36] S. Goel and R. Negi, “Secret communication in presence of colluding eavesdroppers,”
    in IEEE Military Communications Conference, 2005. MILCOM 2005., 2005, pp. 1501
    – 1506.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE