| 研究生: |
張順傑 Chang, Shun-Chieh |
|---|---|
| 論文名稱: |
安全多點傳輸在隨意網路下之實作 Implementation of secure multicast communication in ad hoc networks |
| 指導教授: |
賴溪松
Laih, Chi-Sung |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 電機工程學系 Department of Electrical Engineering |
| 論文出版年: | 2004 |
| 畢業學年度: | 92 |
| 語文別: | 英文 |
| 論文頁數: | 58 |
| 中文關鍵詞: | 隨意網路 、多點傳播 、安全 |
| 外文關鍵詞: | secure, multicast, ad hoc network |
| 相關次數: | 點閱:72 下載:4 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
無線隨意網路(MANET)在這幾年受到大家的重視,它的特徵為動態的網路拓樸及有限的網路資源。針對此種網路的特殊限制,許多路由協定包含單點傳輸及多點傳輸已經被提出來應用。值得注意的是,多點傳輸路由協定不僅可以降低頻寬的消耗,而且可以節省網路中節點的電池電力,這剛好適用於無線隨意網路的環境。然而,這些路由協定都是假設在沒有攻擊的環境下的運作,事實上,節點之間的路由可能會包含許多個點,因此惡意的節點可以完全控制傳輸中的資料而為所欲為,因而造成頻寬及節點電力的消耗。
有鑑於此,我們提出一個可以抵抗網路資源消耗的安全架構叫做Secure MAODV,它利用多點傳輸協定來增加傳輸效率並且有效的防禦會造成網路資源消耗的攻擊。此架構採用Diffie-Hellman key exchange、RSA signature及祕密分享等密碼學的演算法來強化MAODV路由協定。Secure MAODV不但可以認證路由訊息而且可以抵擋多種攻擊,以達到減少網路資源的消耗及增加路由路徑的可用性。甚至當路由訊息被惡意更改之後,亦可偵測出被更改的部分而將之丟棄。所以在套用我們的架構之後,因為節點傳送的路由訊息可以被其他節點驗證,因此群組成員之間的通訊是安全的,加入群組的過程亦是安全的。最後,我們模擬所提出的Secure MAODV並且定義幾個測量效能的參數來評估此安全架構的效能。
Mobile Ad hoc Networks (MANET) have caught more attentions recently, and their unique characteristics are dynamic topology and limited resource. Some routing protocols have been proposed to apply this constraint network including unicasting and multicasting. Multicast routing protocols can not only minimize the link bandwidth consumption but also save the battery-power of a node. However, those who proposed protocols have studied the routing problem in a trusted environment. Because routes between nodes may contain multiple hops, the transmitting messages would be fully controlled by an adversary, which is one of the intermediate nodes in the network. This will cause resource consumption by performing some attacks.
For this reason, a secure scheme is proposed to save resource called Secure MAODV. We apply cryptography to strength the current routing protocol such as Diffie-Hellman key exchange, RSA signature, and secret sharing scheme. Secure MOADV can not only authenticate route information but also defend several kinds of attacks so that it reduces resource consumption and makes the route path available. Even though the authenticated message was substitute for a forge one by an adversary, the request node can still detect this forge. Consequently, a group member transmits data to group or other group member securely because of legitimate routing information. A non-group-member who wants to join the group or a group member who wants to leave the group is also secure. Finally, we also give a simulation results to evaluate the performance of our proposed scheme.
[1] M. Abolhasan, T. Wysocki, and E. Dutkiewicz, “A review of routing protocols for mobile ad hoc networks”, Elsevier Ad Hoc Networks Journal, vol. 2, no. 1, pp. 1-22, January 2004.
[2] L. Buttyán and J. P. Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad hoc Networks”, ACM/Kluwer Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, October 2003.
[3] C. M. Cordeiro, H. Gossain, and D. P. Agrawal, “Multicast over Wireless Mobile Ad Hoc Networks:Present and Future Directions”, IEEE Network, vol. 17, no. 1, pp. 52-59, January/February 2003.
[4] B. Dahill, K. Sanzgiri, B. N. Levine, C. Shields, and E. Royer, “A Secure Routing Protocol for Ad Hoc Networks”, in Proceeding of 10th IEEE International Conference on Network Protocols (ICNP 2002), pp. 78-87, November 2002.
[5] D. B. Johnson and D. A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks”, In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153–181, Kluwer Academic Publishers, 1996.
[6] J. J. Garcia-Luna-Aceves and E. L. Madruga, “The Core-Assisted Mesh Protocol”, IEEE Journal on Selected Areas in Communications, Special Issue on Ad-Hoc Networks, vol. 17, no. 8, pp. 1380-1394, August 1999.
[7] Y. C. Hu, A. Perrig and D. B. Johnson, “Ariadne: A Secure On-Demand Routing Protocol for Ad hoc Networks”, in Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002), pp. 12-23, September 2002.
[8] Y. C. Hu, D. B. Johnson, and A. Perrig., “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks”, in Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), pp. 3-13, June 2002.
[9] IEEE Computer Society LAN MAN Standards Committee. “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications”, IEEE Std 802.11-1997. The Institute of Electrical and Electronics Engineers, 1997.
[10] J. Jubin and J. D. Tornow, “The DARPA Packet Radio Network Protocols”, in Proceedings of the IEEE, Special Issue on Packet Radio Networks, vol. 75, no. 1, pp. 21-32, January 1987.
[11] P. Judge and M. Ammar, “Security Issues and Solutions in Multicast Content Distribution:A Survey” IEEE Network, vol. 17, pp. 30-36, January/February 2003.
[12] R. E. Kahn, S. A. Gronemeyer, J. Burchfiel, and R. C. Kunzelman, “Advances in Packet Radio Technology”, Proceedings of the IEEE, vol. 66, no 11, pp. 1468-1496, November 1978.
[13] V. Kärpijoki, “Security in Ad Hoc Networks”, in Proceedings of the Helsinki University of Technology, Seminar on Network Security, 2000, http://www.hut.fi/~!vkarpijo/netsec00/ netsec00_manet.ps
[14] C. S. Laih, L. Harn, and J. Y. Lee, “A New Threshold Scheme and its Application on Designing the Conference Key Distribution Cryptosystem”, Information processing Letters, vol.32, no.3, pp.95-99, 1989.
[15] S. J. Lee, M. Gerla, and C. C. Chiang, “On-Demand Multicast Routing Protocol”, in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC’99) , vol. 3, p. 1298-1302, September 1999.
[16] M. Liu, R. R. Talpade, A. McAuley, and E. Bommaiah, “AMRoute: Adhoc Multicast Routing Protocol”, Internet Draft, IETF, August 1998.
[17] J. Lundberg, “Routing Security in Ad Hoc Networks”, Tik-110.501 Seminar on Network Security, Helsinki University of Technology, Telecommunications Software and Multimedia Laboratory, 2000.
[18] “The Handbook of Ad Hoc Wireless Networks”, Edited by Mohammad IIyas.
[19] M. J. Moyer, J. R. Rao, and P. Rohatgi, “A Survey of Security Issues in Multicast Communications” IEEE Network, vol. 13, no. 6, pp. 12-23, November/December 1999.
[20] P. Ning and K. Sun, “How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols”, in Proceedings of the 4th Annual IEEE Information Assurance Workshop, pp. 60-67, June 2003.
[21] K. Obraczka and G. Tsudik, “Multicast Routing Issues in Ad Hoc Networks”, IEEE International Conference on Universal Personal Communication (ICUPC'98), vol. 1, pp.751-756, October 1998.
[22] P. Papadimitratos and Z. J. Haas, “Secure message transmission in mobile ad hoc networks”, Elsevier Ad Hoc Networks Journal, vol. 1, no. 1, pp. 193-209, Jan/Feb/March 2003.
[23] P. Papadimitratos and Z. J. Haas, “Secure Routing for Mobile Ad hoc Networks”, in Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, January 2002.
[24] S. Paul, “Multicasting on the Internet and its Applications”, Kluwer Academic Publishers, 1998.
[25] C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing”, RFC 3561– Experimental Standard, July 2003.
[26] B. Quinn and K. Almeroth, “IP Multicast Applications:Challenges and Solutions”, RFC 3170, September 2001.
[27] S. Rafaeli and D. Hutchison, “A Survey of Key Management for Secure Group Communications”, ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, September 2003.
[28] E. Resscorla, “Diffie-Hellman Key Agreement Method”, RFC 2631, June 1999.
[29] R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining Digital Signatures and Public Key Cryptosystems”, Communications of ACM, vol. 21, no. 2, pp. 120-126, February 1978.
[30] E. M. Royer and C. E. Perkins, “Multicast Operation of the Ad hoc On-Demand Distance Vector Routing Protocol”, in Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM’99), pp.207-218, August 1999.
[31] E. M. Royer and C. E. Perkins, “Multicast Ad hoc On-Demand Distance Vector (MAODV) Routing Protocol”, IETF, July 2000.
[32] A. Shamir, “How to Share a Secret”, Communications of ACM, vol. 22, no. 11, pp. 612-613, November 1979.
[33] D. Thaler, “Interoperability Rules for Multicast Routing Protocols”, RFC 2715, October 1999.
[34] U. Varshney, “Multicast Over Wireless Network”, Communications of ACM, vol. 45, no. 12, pp. 31-37, December 2002.
[35] F. Wang, B. Vetter, and S. F. Wu, “Secure Routing Protocols: Theory and Practices”, Technical report, Department of Computer Science, April 1998.
[36] W. Wang, Y. Lu, and B. K. Bhargava, “On Vulnerability and Protection of Ad Hoc On-demand Distance Vector Protocol”, in Proceedings of 10th IEEE International Conference on Telecommunication (ICT 2003), February 2003.
[37] C. W. Wu and Y. C. Tay, “AMRIS: A Multicast Protocol for Ad hoc Wireless Networks”, In Proceedings of IEEE Military Communications International Symposium (MILCOM ‘99) , pp.25-29, November 1999.
[38] B. Xu, S. Hischke, and B. Walke , “The Role of Ad hoc Networking in Future Wireless Communications”, in Proceeding of IEEE International Conference on Communication Technology (ICCT 2003),vol.2, pp.1353-1358, April 2003.
[39] M. G. Zapata and N. Asokan, “Securing Ad hoc Routing Protocols”, In Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe 2002), pp. 1-10, September 2002.
[40] L. Zhou and Z. J. Haas, “Securing Ad Hoc Networks”, IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
[41] Y. Zhu and T. Kunz, “MAODV Implementation for NS-2.26”, Systems and Computing Engineering, Carleton University, Technical Report SCE-04-01, January 2004.
[42] http://www.isi.edu/nsnam/ns/
[43] http://www.aamva.org/Documents/idsDigitalSignatureTechnologyAAMVAFinalReport092003.pdf
[44] http://www.socketcom.com/product/WL6000-320.asp