簡易檢索 / 詳目顯示

研究生: 趙永軒
Yung-Hsuan Chao
論文名稱: 於行動隨意網路上安全匿名路由協定之研究
The Study of Anonymous Secure Routing Protocol for Mobile Ad Hoc Networks
指導教授: 孫宏民
Hung-Min Sun
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2008
畢業學年度: 96
語文別: 英文
論文頁數: 64
中文關鍵詞: 匿名匿名性路徑需求封包氾濫攻擊路徑回覆封包氾濫攻擊流量分析攻擊
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在行動隨意網路上無線節點彼此間的相互溝通是藉由公開的媒介來達成。由於缺乏固定的網路基礎建設或任何集中式管理機制以及每個節點的無線訊號傳輸範圍是有限的,任兩個節點之間的溝通常常必須通過其他的節點來達成。換句話說,每個節點必須執行繞徑以達成資料傳遞,並且必須為其他節點轉送控制與資料封包。
    不幸的是,於行動隨意網路上的任何節點都有可能是惡意的節點,他們會藉著攻擊此網路進而得到某些效果。首先像是惡意的節點會經由流量分析的攻擊而得到網路上通訊方的資訊。此外惡意的節點還會發動主動式攻擊,例如路徑需求封包氾濫攻擊和路徑回覆封包氾濫攻擊去消耗網路上的頻寬和每個節點的資源。由此可知,如何於行動隨意網路上抵擋主動式與被動式攻擊是非常重要的。
    因此,我們提出一個安全匿名路由協定,來提供身分的私密性性、位置的私密性和路徑的匿名性在行動隨意網路上。除此之外,我們的方法還能夠抵擋路徑需求封包氾濫攻擊、路徑回覆封包氾濫攻擊和流量分析攻擊。我們還會藉著匿名性和安全性的分析來說明我們的方法能夠提供上述兩種性質在行動隨意網路上。
    我們使用NS-2網路模擬軟體來模擬實作我們的方法,並且藉著實驗結果證明我們的方法能夠有效的達成我們的目標。


    Chapter 1 Introduction - 1 - 1.1 Introduction to Mobile Ad Hoc Networks - 1 - 1.2 Introduction to Routing Protocol in MANETs - 2 - 1.2.1 AODV Routing Protocol - 2 - 1.3 Introduction to Some Common Attacks in MANETs - 3 - 1.3.1 DoS Attack or DDoS Attack - 3 - 1.3.2 Traffic Analysis Attack - 3 - 1.3.3 Reply Attack - 4 - 1.4 Motivation and Purpose - 4 - 1.5 Organization of This Thesis - 5 - Chapter 2 Related Work - 6 - 2.1 SDDR Protocol - 6 - 2.1.1 Path Discovery Phase - 7 - 2.1.2 Path Reverse Phase - 9 - 2.1.3 Data Transfer Phase - 9 - 2.2 SDAR Protocol - 10 - 2.2.1 Trust Management System - 11 - 2.2.2 Path Discovery Phase - 13 - 2.2.3 Path Reverse Phase - 15 - 2.2.4 Data Transfer Phase - 15 - 2.3 ASR Protocol - 16 - 2.3.1 Route Request Phase - 17 - 2.3.2 Route Response Phase - 19 - 2.3.3 Anonymous Data Transmission - 20 - 2.4 MASK Protocol - 21 - 2.4.1 Anonymous Neighborhood Authentication - 22 - 2.4.2 Anonymous Route Discovery Phase - 23 - 2.4.2.1 Anonymous Route Requests Phase - 23 - 2.4.2.2 Anonymous Route Replies Phase - 24 - 2.4.3 Anonymous Data Forwarding - 25 - 2.5 ARM Protocol - 26 - 2.5.1 Route Discovery Phase - 26 - 2.5.2 Route Reply Phase - 28 - 2.5.3 Data Forwarding - 29 - 2.6 ANODR Protocol - 29 - 2.6.1 Anonymous Route Discovery Phase - 31 - 2.6.1.1 RREQ Phase - 31 - 2.6.1.2 RREP Phase - 33 - 2.6.2 Anonymous Data Forwarding - 33 - 2.7 Comparison - 34 - Chapter 3 NASR System Design - 36 - 3.1 Assumptions - 36 - 3.2 Anonymous Group Key Generation - 36 - 3.3 Routing Request Phase - 39 - 3.4 Route Reply Phase - 43 - 3.5 Anonymous Data Transmission - 45 - 3.6 Route Maintenance - 46 - Chapter 4 Anonymity and Security Analysis - 47 - 4.1 Anonymity Analysis - 48 - 4.1.1 Identity Privacy - 48 - 4.1.2 Distance Privacy - 48 - 4.1.3 Route Anonymity - 48 - 4.2 Security Analysis - 50 - 4.2.1 DoS and DDoS Attack - 50 - 4.2.2 RREQ Flooding Attack - 50 - 4.2.3 RREP Flooding Attack - 50 - 4.2.4 Replay Attack - 51 - Chapter 5 Simulation - 52 - 5.1 Impact of Mobility - 53 - 5.2 Impact of Traffic Load - 55 - 5.3 Impact of Flooding Attacks - 57 - Chapter 6 Conclusion and Future work - 61 - 6.1 Main Contribution - 61 - 6.2 Further Research Topics and Directions - 61 - Bibliography - 62 -

    [1] C. E. Perkins and E. M. Royer. "Ad-hoc on-demand distance vector routing." In Proceedings of the IEEE workshop on Mobile Computing Systems and Applications (WMCSA '99), Feb. 1999, pp. 90-100.
    [2] T. Jiang, and Q. Li. “A secure routing protocol for mobile ad-hoc networks.” In Proc. 2004 IEEE Int. Conf. on Machine Learning and Cybernetics, pp. 2825-2829.
    [3] Y. Lee, H. Kim, B. Chung, J. Lee, and H. Yoon. “On-demand secure routing protocol for ad hoc network using ID based cryptosystem.” In Proc. 4th Annu. IEEE Int. Conf. on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2003), pp. 211-215.
    [4] H. Li, and M. Singhal. “A Secure Routing Protocol for Wireless Ad Hoc Networks,” In Proc. 39th Annu. IEEE Int. Conf. on System Sciences, Hawaii, 2006, pp. 225a-225a.
    [5] R. J. Yang, Q. Xia, Q. H. Pan, W. N. Wang, and M. L. Li. “New enhancement scheme for secure routing protocol in mobile ad hoc networks.” In 2005 IEEE Int. Conf. on Computer and Information Technology, pp. 685–689.
    [6] K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, and E.M. Belding-Royer. “A secure routing protocol for ad hoc networks.” In Proc. 10th Annu. IEEE Int. Conf. on Network Protocols, 2002, pp. 78–87.
    [7] K. El-Khatib, L. Korba, R. Song, and G. Yee. “Secure dynamic distributed routing algorithm for ad hoc wireless networks.” In 2003 IEEE Int. Conf. Parallel Processing Workshops (ICPPW’03), pp. 359–366.
    [8] A. Boukerche, K. El-Khatib, L. Xu, and L. Korba. “A novel solution for achieving anonymity in wireless ad hoc networks.” In Proc. 1st Annu. ACM Int. workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, 2004, pp. 30–38.
    [9] A. Boukerche, K. El-Khatib, L. Xu, and L. Korba. “SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks.” In Proc. 29th Annual IEEE International Conference on Local Computer Networks, 2004, pp. 618–624
    [10] B. Zhu, Z. Wan, M. Kankanhalli, F. Bao, and R. Deng. ”Anonymous secure routing in mobile ad-hoc networks.” In Proc. 29th Annu. IEEE Int. Conf. on Local Computer Networks (LCN 2004), pp. 102–108.
    [11] Y. Zhang, W. Liu, and W. Lou. “Anonymous communications in mobile ad hoc networks.” In Proc. 24th Annu. IEEE Int. Conf. the IEEE Computer and Communications Societies (INFOCOM 2005), 2005, pp. 1940–1951.
    [12] S. Seys, and B. Preneel. “ARM: anonymous routing protocol for mobile ad hoc networks.” In Proc. 20th Annu. IEEE Int. Conf. on Advanced Information Networking and Applications (AINA 2006), pp. 133–137.
    [13] J. Kong and X. Hong. “ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks.” In Proc. 4th Annu. ACM Int. Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’03), 2003, pp. 291–302.
    [14] J. Kong, X. Hong, and M. Gerla. “An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks.” IEEE Transactions on Mobile Computing, 6(8):888–902, August 2007.
    [15] J.-F. Raymond. “Traffic analysis: Protocols, attacks, design issues, and open problems.” Lecture Notes in Computer Science, 2009: 10–29, 2000.
    [16] A.Back, U.Moller and A.Stiglic. “Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems.” Lecture Notes in Computer Science, 2137: 245–257, 2001.
    [76] O. Berthold, H. Federrath, and S. Kopsell. “Web MIXes: A System for Anonymous and Unobservable Internet Access.” In Proc. Workshop Design Issues in Anonymity and Unobservability (DIAU ’00), H. Federrath, ed., pp. 115–129, 2000.
    [18] D. Kesdogan, J. Egner, and R. Buschkes. “Stop-and-Go MIXes Providing Probabilistic Security in an Open System.” In Proc. Second Int’l Workshop Information Hiding (IH ’98), pp. 83-98, 1998.
    [19] A. Pfitzmann, B. Pfitzmann, and M. Waidner. “ISDNMixes: Untraceable Communication with Very Small Bandwidth Overhead.” In Proc. GI/ITG Conf.: Comm. Distributed Systems, pp. 451-463, 1991.
    [20] G. Wang. “Security Analysis of Several Group Signature Schemes.” INDOCRYPT 2003, LNCS 2904, pp. 252-265. Springer-Verlag, 2003.
    [10] S. Han, J. Wang, and W. Liu. “An efficient identity-based group signature scheme over elliptic curves.” In Proc. 3rd Eur. Conf. Univers. Multiservice Netw., Porto, Portugal, Oct. 2004, pp. 417–429.
    [22] A. Miyaji and K. Umeda. “A fully-functional group signature scheme over only known-order group.” In Proc. ACNS, Yellow Mountain, China, Jun. 2004, pp. 164–179.
    [23] J. Zhang, Q.Wu, and Y.Wang. “A novel efficient group signature with forward security.” in Proc. 5th Int. Conf. Inf. Commun. Security, Huhehaote, China, Oct. 2003, pp. 292–300.
    [24] D. Boneh, X. Boyen, and H. Shacham. “Short group signatures.” in Proc. Adv. Cryptology— Crypto, ser. LNCS, vol. 3152. New York: Springer-Verlag, 2004, pp. 41-45.
    [25] K. Fall, and K. Varadhan. “The Ns Manual (formerly called ns Notes and Documentation).” The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC, June 2007. Available from http://www.isi.edu/nsnam/ns/, July 1999.
    [26] CMU Monarch Group, CMU Monarch Extensions to the NS-2 Simulator 1998. Available from http://monarch.cs.cmu.edu/cmu-ns.html/.
    [27] B. Josh, A. M. David, B. J. David, H. Yih-Chun, and J. Jorjeta. “A performance comparison of multi-hop wireless ad hoc network routing protocols.” in Proc. 4th annual ACM/IEEE international conference on Mobile computing and networking, Dallas, Texas, United States: ACM Press, Oct.1998, pp. 85-97.
    [28] 柯志亨. "NS2教學手冊 ( NS2 Learning Guide)," Available from http://140.116.72.80/~smallko/ns2/ns2.htm.
    [29] doxygen. “ns2 Network Simulator 2.29 Documentation generated by doxygen.." Avaiable from http://www.auto-nomos.de/ns2doku/main.html.
    [30] Bo Wang. “Network Simulator (NS2).” Avaiable from http://www.cse.msu.edu/~wangbo1/ns2/.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE