研究生: |
陳烱勳 Chen, Chiung-Hsun |
---|---|
論文名稱: |
在無線隨意網路上安全通訊之研究 A Study of Secure Communications on Mobile Ad Hoc Networks |
指導教授: | 孫宏民 |
口試委員: |
曾文貴
謝續平 黃育綸 賴尚宏 楊舜仁 黃慶育 孫宏民 |
學位類別: |
博士 Doctor |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2012 |
畢業學年度: | 100 |
語文別: | 英文 |
論文頁數: | 101 |
中文關鍵詞: | 無線隨意網路 、竊聽攻擊 、偽裝攻擊 、丟棄攻擊 、共謀攻擊 、節點隱私 |
外文關鍵詞: | MANETs, eavesdropping attacks, forged attacks, dropping attacks, collusion attacks, node privacy |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
由於無線隨意網路沒有固定的基礎建設,例如網路路由器與中央控管中心…等,且使用開放式的傳輸媒介,攻擊者可以很容易的達成竊聽攻擊、偽裝攻擊、丟棄攻擊以及共謀攻擊。透過這些攻擊,攻擊者可中斷傳輸、傳送錯誤訊息誤導接收者以及透過分析監聽封包得之節點隱私(位址,身分,路由資訊)。因此我們預期的研究目標是針對竊聽攻擊、偽裝攻擊、丟棄攻擊以及共謀攻擊,提出相對應的通訊協定,包含抵擋攻擊及保護節點隱私。基於我們所提出的機制,攻擊者不再能夠透過分析竊聽封包,去得知傳送者以及接收者的相關資料,包含位置與身分。
此外,當攻擊者發動封包丟棄攻擊時,即便攻擊者同部發動共謀攻擊,攻擊者也無法避免被偵測並排除於路由路徑之外,提供高可靠度的傳輸。
Because Mobile ad hoc networks (MANETs) lack the stationary infrastructures, such as network routers and adopt open wireless medium for communications, attackers can launch eavesdropping attacks, forged attacks, dropping attacks, and collusion attacks. To utilize these attacks, attackers can interrupt communications, send error message to receiver, and analyze the eavesdropping messages to destroy node privacy of sender and receiver. Node privacy contains identity privacy, location privacy, and route anonymity. Therefore, our expected research topic focuses on these attacks to propose the corresponding protocols. In our protocols, attackers cannot obtain any information about sender and receiver from analyzing the eavesdropping messages.
Moreover, our protocols can resist dropping attacks and collusion attacks, and the attackers will not participate in route discovery.
[1] Y. Lee, H. Kim, B. Chung, J. Lee, and H. Yoon, “On-demand secure routing protocol for ad hoc network using id based cryptosystem,” in Proceedings of the 4th IEEE International Conference on Parallel and Distributed Computing,Applications and Technologies (PDCAT), 2003.
[2] R. J. Yang, Q. Xia, Q. H. Pan, W. N. Wang, and M. L. Li, “New enhancement scheme for secure routing protocol in mobile ad hoc networks,” in Proceedings of the 5th International Conference on Computer and Information Technology (CIT), 2005.
[3] K. Sanzgiri, D. LaFlamme, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, “Authenticated routing for ad hoc networks,” IEEE Journal on Selected Areas in Communications, vol. 23, pp. 598 – 610, 2005.
[4] M. Goodrich, “Leap-frog packet linking and diverse key distributions for improved integrity in network broadcasts,” in Proceedings of the IEEE Symposium on Security and Privacy, 2005.
[5] H. Li, “A secure routing protocol for wireless ad hoc networks,” in Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS),
2006.
[6] Z. Li and S. Shi, “A secure routing protocol for mobile ad hoc networks,” in Proceedings of the IEEE International Conference on Computer and Information
Science (ICIS), 2007.
[7] R. L. Gilaberte and L. P. Herrero, “A secure routing protocol for ad hoc networks based on trust,” in Proceedings of the 3th IEEE International Conference on Networking and Services (ICNS), 2007.
[8] S. R. Afzal, S. K. Biswas, J. B. Koh, T. Raza, G. Lee, and D. K. Kim, “Rsrp: A robust secure routing protocol for mobile ad hoc networks,” in Proceedings of the IEEE International Conference on Wireless Communications and Networking (WCNC), 2008.
[9] C. Huang, B. Huang, Y. Mo, and J. Ma, “Srptes: A secure routing protocol based on token escrow set for ad hoc networks,” in Proceedings of the 22th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2008.
[10] M. Yu, M. Zhou, and W. Su, “A secure routing protocol against byzantine attacks for manets in adversarial environments,” IEEE Transactions on Vehicular Technology, vol. 58(1), pp. 449–460, 2009.
[11] M. Refaei, L. DaSilva, M. Eltoweissy, and T. Nadeem, “Adaptation of reputation management systems to dynamic network conditions in ad hoc networks,”IEEE Transactions on Computers, vol. 59(5), pp. 707–719, 2010.
[12] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proceedings of the 6th annual international
conference on Mobile computing and networking. ACM New York, NY, USA, 2000, pp. 255–265.
[13] N. Nasser and Y. Chen, “Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks,” in IEEE International Conference on Communications, 2007. ICC’07, 2007, pp. 1154–1159.
[14] S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour, and Y. Nemoto, “Detecting blackhole attack on aodv-based mobile ad hoc networks by dynamic learning method,” International Journal of Network Security, vol. 5, no. 3, pp.338–346, 2007.
[15] J. Manickam and S. Shanmugavel, “Providing Routing Security Using ROS Protocol in MANET and Performance Comparison with AODV,” Information Technology Journal, vol. 6, no. 5, pp. 656–663, 2007.
[16] C. Crepeau, C. Davis, and M. Maheswaran, “A secure MANET routing protocol with resilience against byzantine behaviours of malicious or selfish nodes,” in Advanced Information Networking and Applications Workshops, 2007, AINAW’07. 21st International Conference on, vol. 2, 2007.
[17] E. Gerhards-Padilla, N. Aschenbruck, P. Martini, M. Jahnke, and J. Tolle, “Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs,” in 32nd IEEE Conference on Local Computer Networks, 2007. LCN 2007, 2007,
pp. 1043–1052.
[18] B. Zhu, Z. Wan, M. Kankanhalli, F. Bao, and R. Deng, “Anonymous secure routing in mobile ad-hoc networks,” in Proceedings of the 29th IEEE International
Conference on Local Computer Networks (LCN), 2004.
[19] J. F. Raymond, “Traffic analysis: Protocols, attacks, design issues, and open problems,” in Proceedings of the International workshop on Designing privacy enhancing technologies Systems, 2001.
[20] A. Back, U. Moller, and A. Stiqlic, “Traffic analysis attacks and trade-offs in anonymity providing systems,” in Proceedings of the 5th International workshop on Information hiding (IH), 2001.
[21] K. El-Khatib, L. Korba, R. Song, and G. Yee, “Secure dynamic distributed routing algorithm for ad hoc wireless networks,” in Proceedings of the IEEE International Conference on Parallel Processing Workshops (ICPPW), 2003.
[22] J. Kong and X. Hong, “Anodr: anonymous on demand routing with untraceable routes for mobile ad-hoc networks,” in Proceedings of the 4th ACM international
symposium on Mobile Ad Hoc Networking and Computing MobiHoc), 2003.
[23] J. Kong, X. Hong, and M. Gerla, “An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 6(8), pp. 888–902, 2007.
[24] A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, “A novel solution for achieving anonymity in wireless ad hoc networks,” in Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, 2004.
[25] A. Boukerche, K. El-Khatib, L. Xu, and L. Korba,“SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks,” in Proceedings of the 29th IEEE International Conference
on Local Computer Networks (LCN), 2004.
[26] S. Seys and B. Preneel, “Arm: anonymous routing protocol for mobile ad hoc networks,” in Proceedings of the 20th IEEE International Conference on Advanced
Information Networking and Applications (AINA), 2006.
[27] Y. Zhang, W. Liu, and W. Lou, “Anonymous communications in mobile ad hoc networks,” in Proceedings of the 24th IEEE International Conference on INFOCOM, 2005.
[28] Y. Zhang, W. Liu, W. Lou, and Y. Fang, “Mask: anonymous on-demand routing in mobile ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 5(9), pp. 2376–2385, 2006.
[29] O. Berthold, H. Federrath, and S. Kopsell, “Web mixes: A system for anonymous and unobservable internet access,” in Proceedings of the Workshop Design Issues in Anonymity and Unobservability (DIAU ), 2000.
[30] D. Kesdogan, J. Egner, and R. Buschkes, “Buschkes. stop-and-go mixes providing probabilistic security in an open system,” in Proceedings of the Second International Workshop on Information Hiding (IH), 1998.
[31] A. Pfitzmann, B. Pfitzmann, and M. Waidner, “Isdnmixes: Untraceable communication with very small bandwidth overhead,” in Proceedings of the GI/
ITG Conference Communication Distributed Systems, 1991.
[32] W. Yu, Y. Sun, and K. Liu, “HADOF: Defense against routing disruptions in mobile ad hoc networks,” in Proceedings IEEE INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2,
2005.
[33] J. Eriksson, M. Faloutsos, S. Krishnamurthy, and C. MIT, “Routing amid colluding attackers,” in IEEE International Conference on Network Protocols, 2007. ICNP 2007, 2007, pp. 184–193.
[34] L. Tamilselvan and V. Sankaranarayanan, “Prevention of Co-operative Black Hole Attack in MANET,” JOURNAL OF NETWORKS, vol. 3, no. 5, p. 13, 2008.
[35] W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22(6), pp. 644–654, 1976.
[36] G. Wang, “Security analysis of several group signature schemes,” in Proceedings of 4th International Conference on Cryptology in India (INDOCRYPT), 2003.
[37] S. Han, J. Wang, and W. Liu, “An efficient identity-based group signature scheme over elliptic curves,” in Proceedings of the 3rd European conference on universal multiservice networks (ECUMN), 2004.
[38] A. Miyaji and K. Umeda, “A fully-functional group signature scheme over only known-order group,” in Proceedings of the applied cryptography and network
security (ACNS), 2004.
[39] J. Zhang, Q. Wu, and Y. Wang, “A novel efficient group signature with forward security,” in Proceedings of the 5th International Conference on Information Communication Security, 2003.
[40] D. Boneh, X. Boyen, and H. Shacham, “Short group signatures,” in Proceedings of the Advance in Cryptology—Crypto, 2004.
[41] Y. Hu, A. Perrig, and D. Johnson, “Ariadne: A secure on-demand routing protocol for ad hoc networks,” Wireless Networks, vol. 11, no. 1, pp. 21–38, 2005.
[42] ——, “Rushing attacks and defense in wireless ad hoc network routing protocols,” in Proceedings of the 2nd ACM workshop on Wireless security. ACM New York, NY, USA, 2003, pp. 30–40.
[43] Y. Zhang, W. Liu, W. Lou, and Y. Fang, “Securing mobile ad hoc networks with certificateless public keys,” IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, pp. 386–399, 2006.
[44] K. Fall and K. Varadhan, “The ns Manual (formerly ns Notes and Documentation),” The VINT project, vol. 16, 2006.
[45] “Cmumonarchgroup,cmumonarchextensions to the ns-2 simulator 1998. available from http://monarch.cs.cmu.edu/cmu-ns.html/.”
[46] A. Pfitzmann and M. Köhntopp, “Anonymity, unobservability, and pseudonymity: A proposal for terminology,” in Workshop on Design Issues in Anonymity and Unobservability, 2000.
[47] C. D´laz, S. Seys, J. Claessens, and B. Preneel, “Towards measuring anonymity,”in Proceedings of Privacy Enhancing Technologies Workshop (PET02), 2002.
[48] A. Serjantov and G. Danezis, “Towards an information theoretic metric for anonymity,” in Proceedings of Privacy Enhancing Technologies Workshop (PET02), 2002.