研究生: |
廖俊凱 Chun-Kai Liao |
---|---|
論文名稱: |
Vehicle IPv6的安全性機制 Mechanisms of Security for Vehicle IPv6 |
指導教授: |
林華君
Hwa-Chun Lin |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2005 |
畢業學年度: | 93 |
語文別: | 中文 |
論文頁數: | 43 |
中文關鍵詞: | 安全機制 、網路移動 、IPv6的安全機制 、Vehicle IPv6的安全機制 |
外文關鍵詞: | security, network mobility, security for IPv6, security for Vehicle IPv6 |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
由於現在的網路科技的技術日益增進,研究者除了提出更有效率、更高效能的新機制外,還要更能確保整個系統的穩定性,也就是說,要能確定在一般的運作狀況下是穩定的,更要確定不會受到攻擊者的攻擊,導致整個系統的不正常運作,更而侵犯到合法使用者的利益和權力,在這篇論文中,因為在Network Mobility 的protocol裡面的安全機制無法完全應用在Vehicle IPv6上,尤其是在Vehicle IPv6的Domain裡面的機制,在一般狀況下是非常脆弱的,所以我們提出在Vehicle IPv6上的安全機制,提供mobile nodes或mobile networks在使用Vehicle IPv6時,能夠更穩定、更安全的去完成每一件所要完成的事情,其中包含了Vehicle IPv6的protocol下的mobile nodes或mobile networks對其Home Agent做Binding Update和mobile nodes或mobile networks對其Correspond node做Binding Update之外,更對domain內的機制提出完整的安全機制,例如:註冊(registration)、註冊更新(registration refresh)、轉送的請求(forwarding request)。
[1] IETF NEMO working group, http://www.ietf.org/html.charters/nemo-charter.html
[2] Devarapalli, V., "Network Mobility (NEMO) Basic Support Protocol", RFC3969
[3] IETF MIP6 working group, http://www.ietf.org/html.charters/mip6-charter.html
[4] D. Johnson, C. Perkins and J. Arkko, "Mobility Support in IPv6", RFC3775
[5]Jung S., Zhao F., Wu F., Kim H., Sohn S., “Threat Analysis for NEMO Basic Operations”, (draft-jung-nemo-threat-analysis-02.txt), Internet Draft, IETF, Feb. 2004, Work in Progress.
[6] Petrescu A., Olivereau A., Janneteau C., Lach H-Y., “Threats for Basic Netowrk Mobiltiy Support (NEMO threats)”, (draft-petrescu-nemo- threats-01.txt), IETF, Internet Draft, January 2004, Work in Progress.
[7] Aura T., Arrko J. “MIPv6 BU Attacks and Defenses”`,
(draft-aura-mipv6-bu-attacks-00.txt) IETF Draft. Feb 2002.
[8] Kent, S. and R. Atkinson, "IP Encapsulating Security Payload (ESP)", RFC 2406,
November 1998
[9] Kent, S. and R. Atkinson, "IP Authentication Header", RFC 2402, November 1998.
[10] Arkko, J., Devarapalli, V., and F. Dupont, "Using IPsec to Protect Mobile IPv6 Signaling between Mobile Nodes and Home Agents", RFC 3776, June 2004.
[11] P. Savola, “Security of IPv6 Routing Header and Home Address Options,”
draft-savola-ipv6-rh-ha-security-02.txt, March 2002
[12] Mankin, A., et al., “Threat models Introduces by Mobile IPv6 and
Requirements for Security in Mobile IPv6,”
draft-ietf-mobileip-mipv6-scrty-reqts-02, work in process, May 2001
[13] ITU-T recommendation, X.509, “Public Key and attribute certificate
frameworks,”March 2000.
[14] Harkins, D. and D. Carrel, “The Internet Key Exchange (IKE),”RFC 2409,
November 1998.
[15] M. Mambo, K. Usuda, E. Okamoto, Proxy signatures for delegating signing
operation, in: Proc. 3rd ACM Conference on Computer and Communications
Security, New Dehli, India, ACM Press, New York, 1996, pp. 48–57.
[16] M. Mambo, K. Usuda, E. Okamoto, Proxy signatures: Delegation of the power to
sign messages, IEICE Trans. Fundam. E79-A (9) (1996) 1338–1354.
[17] T. ElGamal, A public key cryptosystem and a signature scheme based on discrete
logarithms, IEEE Trans. IT-31 (1985) 469–472.