| 研究生: |
張瑜真 Chang, Yu-Chen |
|---|---|
| 論文名稱: |
普及運算隱密型服務探索協定之研究 Clandestine Service Discovery Protocols for Pervasive Computing |
| 指導教授: |
黃宗立
Hwang, Tzonelih |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 資訊工程學系 Department of Computer Science and Information Engineering |
| 論文出版年: | 2008 |
| 畢業學年度: | 96 |
| 語文別: | 中文 |
| 論文頁數: | 41 |
| 中文關鍵詞: | 資訊安全 、服務探索協定 、普及運算 |
| 外文關鍵詞: | Pervasive Computing, Service Discovery Protocol, Security |
| 相關次數: | 點閱:107 下載:1 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著資訊的進步,未來電腦的演進將會建構出一個無所不在的運算環境,稱之為普及運算(Pervasive Computing),我們生活上的每一個設備都將是一個計算裝置,讓我們可以在任何時間 (Anytime)、任何地點 (Anywhere) 以任何裝置 (Any Devices) 取得任何所需要的資訊與服務,當我們週遭充斥著數百甚至數千種服務者 (Service),為了尋找所需要的服務,服務探索協定 (Service Discovery Protocol) 在普及運算的環境裡被廣泛使用。
然而有些情況下,會希望可以秘密地暗中探索服務,本論文提出且稱這類服務探索協定為隱性型服務探索協定 (Clandestine Service Discovery Protocol),且本論文定義隱性型服務探索協定之安全需求,包含:交互認證 (Mutual Authentication)、實體匿名性 (Entity Anonymity)、訊息機密性 (Communication Confidentiality)、位置隱私 (Location Privacy),同時提出數個秘密服務探索協定。
Service discovery protocols, while currently under development in both industry and academia, have been widely adopted in pervasive computing environments. However, service discovery should in many cases be performed behind closed doors. Such protocols are called clandestine service discovery protocols. This study defines the requirements for clandestine service discovery, namely mutual authentication, entity anonymity, communication confidentiality and location privacy, and develops several clandestine service discovery protocols.
[1] E. Guttman, C. Perkins, J. Veizades, and M. Day, ”Service Location Protocol, Version
2”, http://www.ietf.org/rfc/rfc2608.txt, 1999.
[2] UPnP Forum, ”Universal Plug and Play Device Architecture 1.0”,
http://www.upnp.org/specs/arch/UPnP-DeviceArchitecture-v1.0-20060720.pdf, 2006.
[3] Sun Microsystems, ”Jini Architecture Specification”,
http://www.sun.com/software/jini/specs
[4] Sun Microsystems, ”Jini Technology Core Platform Specification”,
http://www.sun.com/software/jini/specs
[5] S. E. Czerwinski, B. Y. Zhao, T. D. Hodes, A. D. Joseph, and R. H. Katz, “An
Architecture for a Secure Service Discovery Service”, Proceedings of the fifth Annual
International Conference on Mobile Computing and Networks (MobiCom ’99), 1999.
[6] F. Zhu, M. Mutka, and L. Ni, ”Splendor: A Secure, Private, and Locationaware
Service Discovery Protocol Supporting Mobile Services”, Proceedings of the First
IEEE International Conference on Pervasive Computing and Communications, 2003.
[7] F. Zhu, M.W. Mutka, and L.M. Ni, "A Private, Secure, and User-Centric Information
Exposure Model for Service Discovery Protocols", IEEE Transactions on Mobile
Computing, vol. 5, no. 4, pp. 418-429, April 2006.
[8] L. Lamport, ”Password Authentication with Insecure Communication”,
Communications of the ACM, vol. 24, no. 11, pp. 770-772, November 1981.
[9] M. Weiser, ”The Computer for the 21st Century”, Scientific American, September
1991.
[10] D. L. Chaum. ”Untraceable electronic mail, return addresses, and digital
pseudonyms”, Commun. ACM, vol. 24, no.2, pp. 84-88, 1981.
[11] K. Sampigethaya, and R. Poovendran, ”A Survey on Mix Networks and Their Secure
Applications”, Proceedings of the IEEE, vol. 94, no. 12, December 2006.
[12] D. R. Stinson, Cryptography: Theory and Practice, 2nd ed. Boca Raton, FL: CRC,
2002.
[13] E. Tatli, D. Stegemann, S. Lucks, ”Dynamic Anonymity”, Proceedings of the 4th
World Enformatika Conference: International Conference on Information Security,
WEC’05. Istanbul-Turkey.[14] V. Shoup, ”Sequences of Games: a Tool for Taming Complexity in Security Proofs”,
manuscript, Available at www.shoup.net, 2005.