研究生: |
胡貴蓉 Hu, Kuei-Jung |
---|---|
論文名稱: |
雲端運算環境下適用於橢圓密碼學的隨意式無線網路安全演算機制 Ad Hoc Wireless Networks Security Algorithm Scheme Using ECC on Cloud Computing |
指導教授: |
石維寬
Shih, Wei-Kuan |
口試委員: |
石維寬
Shih, Wei-Kuan 徐讚昇 Hsu, Tsan-sheng 呂政修 Leu, Jenq-Shiou 衛信文 Wei, Hsin-Wen |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2012 |
畢業學年度: | 100 |
語文別: | 中文 |
論文頁數: | 31 |
中文關鍵詞: | 橢圓曲線密碼學 、生物識別 、遠端驗證 、隨意式無線區域網路 、雲端運算 |
外文關鍵詞: | ECC, Biometric, Remote Authentication, Ad Hoc Wireless Networks, Cloud Computing |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
雲端服務是種承襲與整合許多分散式、網格運算與網路的概念,也正因近年雲端服務的推動運用,使得各類資通訊產品及服務朝向多元化發展趨勢。其中虛擬化雲端安全除了面臨承繼以往的傳統安全性問題外,在虛擬環境上更面臨新興安全問題,所以在降低雲端服務威脅及強化安全措施是愈顯重要的。隨意式無線區域網路是屬於多重跳躍架構的無線網路,它無須類似存取點或基地台的基礎建設。就因網路定義為一群節點或路由器的設備,進而能直接在無線網路之間做溝通。
因為在無線網路下使用無線電波傳送資訊,是更容易遭受到竊聽與攻擊,而隨意式無線網路架構大多應用於個人網路或家用網路系統整合、區域或小型會議通訊、軍事應用,如筆電、無線耳機、無線滑鼠與無線鍵盤等。其資料機密更是具備重要性且不容許遭到竊聽,於是在資訊安全強度上的議題是不容忽視。為了能對於節點不被竊聽且進行保護,如何在使用者之間建立高安全性的認證機制是重要的議題,其中結合生物識別的認證可以有效提升安全性的方式,因此本論文提出一個基於橢圓曲線密碼學遠端三因子認證機制,此機制不需要身分表來驗證使用者的身分,而且能夠有效地避免攻擊者通過驗證。
此外並提出一個基於最小擴張樹的隨意式無線區域網路繞徑演算法,來有效且快速地建立出各路由器之間傳輸資料的最短路徑以及搜尋方法,使得在未來各種資訊與網路環境中的數位資訊傳遞安全及效率性的實現可行性探討。也就是能讓雲端運算環境之網路拓樸上所有正常的節點,能快速且穩定達成網路服務應用需求。
Cloud computing is a concept of inheritance and integration with distributed computing, grid computing, and networking computing. Because cloud computing services are pursued and applied recent years, it has a trend to develop diversification of all kinds of information and communication products and services. Secure virtualization for cloud computing inherits traditional security issues from the past, and even faces emerging security problems in virtual environments. Therefore, it’s very important to decrease the threats of cloud computing services and strengthen security measures. A wireless ad-hoc network is a multi-hop wireless network that doesn't need access points or base stations, and it is defined as the devices of a number of nodes or routers which are able to communicate with each other directly on the wireless network.
It’s very easy to suffer from eavesdropping and attacks if you use radio waves to send data in wireless network environment. Ad hoc network architecture is applied to individual network, home internet connection, conferences on local communication or military applications, such as laptops, wireless headphones, wireless mouse, wireless keyboards, etc. however, because the confidentiality of information has more importance and doesn’t be allowed to suffer from eavesdropping, the issues of Information security are noticeable. In order to protect nodes from eavesdropping, it’s an important issue how to establish a highly secure authentication scheme between users, especially an authentication scheme which is combined with the biometric data is able to effectively enhance security. Therefore, the paper proposes an ECC based remote three-factor authentication scheme, which does not requires ID tables to verify its users, is more efficient to prevent adversaries from passing the authentication.
Furthermore, the paper proposes a minimum spanning tree based ad hoc wireless networks routing algorithm scheme to effectively and quickly build the shortest path and search for transmitting data between routers. It’s able to achieve a secure and effective way that transmits digital data in different types of information and network environments. In other words, It’s able to make every executable node in network topology achieve the request of network services and applications on cloud computing.
【1】 H. Takabi & J. Joshi & G. Ahn, “Security And Privacy Challenges in Cloud Computing Environments,” IEEE Security & Privacy, vol. 8, No. 6, pp. 24–31, November 2010.
【2】 R. Chow et al., “Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control,” in ACM workshop on Cloud computing security, 2009.
【3】 P. Macker & M.S. Corson, “Mobile Ad Hoc Networking and the IETF”, ACM Mobile Computing and Communication Review, vol. 2, No. 2, 1998.
【4】 S. Sumathy & B. Kumar, “Secure Key Exchange and Encryption Mechanism for Group Communication Wireless AD Hoc Networks”, International Journal on Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks (Graph-Hoc), Vol. 2, No. 1, March 2001.
【5】 C.H. Lin and Y.Y. Lai, “A flexible biometrics remote user authentication scheme, ” Computer Standards & Interfaces vol. 27, no. 1, 2004, pp.19-23.
【6】 C.I. Fan and Y.H. Lin, “Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics, ” IEEE Transactions on information forensics and security, vol. 4, no. 4, 2009, pp. 933-945.
【7】 J.K. Lee, S.R. Ryu and K.Y. Yoo, “Fingerprint-based remote user authentication scheme using smart cards, ” Electronics Letters, vol. 38, no.12, 2002, pp. 554-555.
【8】 M.K. Khan and J.S. Zhang, “Improving the security of 'a flexible biometrics remote user authentication scheme, ” Computer Standards & Interfaces, vol. 29,no. 1, 2007, pp. 82-85.
【9】 Y. Lee and T. Kwon, “An improved fingerprint-based remote user authentication scheme using smart cards,” in Proc. ICCSA 2006, 2006, vol. 3981, pp. 915–922, Lecture Notes in Computer Science.
【10】 Rhee, H. S., Kwon, J. O. and Lee, D. H., “A remote user authentication scheme without using smart cards,” Computer Standards & Interfaces, vol. 31, 2008, pp. 6-13.
【11】 N. Koblitz, “Elliptic Curve Cryptosystems,” Math Computer, Vol. 48, pp. 203-209, 1987.
【12】 V. Miller, “Uses of Elliptic Curves in Cryptography”, Advances in Cryptology—Crypto85, Ser. Lecture Notes in Computer Science, No. 218, pp.417–426, 1985.
【13】 Perkins, C. E., and Bhagwat, P., “Highly dynamic destination sequenced distance vector, ” 1994
【14】 S. Murthy J.J. Garcia-Luna-Aceves, “A routing protocol for packet radio networks,” in Proceedings of the First Annual ACM International Conference on Mobile Computing and Networking, Berkeley, CA, pp. 86–95, 1995.
【15】 C. E. Perkins and E. M. Royer, “Ad Hoc On-demand Distance Vector Routing,” Proc. 2nd IEEE Wksp. Mobile Comp. Sys. And Apps., pp.90-100, Feb., 1999.
【16】 D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” T. Imielinski and H. Korth, Eds. Mobile Computing, Ch. 5, Kluwer, 1996.
【17】 H.L. Yeh, T.H. Chen, Pin-Chuan Liu, Tai-Hoo Kim and Hsin-Wen Wei, “A secured authentication protocol for wireless sensor networks using elliptic curves cryptography, ” Sensors 11, no. 5, 2011, pp. 4767-4779.
【18】 T.H. Chen, Y.C. Chen and W.K. Shih, “An efficient anonymous authentication protocol for mobile pay-TV,” journal of network and computer applications, vol. 34, 2011, pp. 1131-1137.
【19】 T.H. Chen, Y.C. Chen and W.K. Shih, “An efficient anonymous authentication protocol for mobile pay-TV,” journal of network and computer applications, vol. 34, 2011, pp. 1131-1137.