| 研究生: |
高傳凱 Kao, Chuan-Kai |
|---|---|
| 論文名稱: |
無線隨意式網路中的智慧暨安全之車用資通訊系統 Intelligent and Secure Telematics System in Wireless Mobile Ad Hoc Network |
| 指導教授: |
李忠憲
Li, Jung-Shian |
| 學位類別: |
博士 Doctor |
| 系所名稱: |
電機資訊學院 - 電腦與通信工程研究所 Institute of Computer & Communication Engineering |
| 論文出版年: | 2012 |
| 畢業學年度: | 100 |
| 語文別: | 英文 |
| 論文頁數: | 110 |
| 中文關鍵詞: | 移動式隨意網路 、車用隨意網路 、網路電話 |
| 外文關鍵詞: | MANET, VANET, VoIP |
| 相關次數: | 點閱:67 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
移動式隨意網路(MANET)長期以來一直是無線領域上很重要的一部份,因為它能提供一個便利的無線傳輸環境,然而它的不穩定性、不安全性、不可靠性使得它實用性大幅降低,移動式隨意網路有三大限制,第一:拓樸環境一定是動態的,第二:硬體能力是較差的,第三:無法保證傳輸安全性,換句話說,要提升移動式隨意網路效能就要克服這三大限制,動態的拓樸環境導致傳輸路徑無法維持,因此提升傳輸路徑的穩定性及資料的傳輸成功率是我們的第一個目標,我們根據這狀況提出了一個使用地理資訊及獨特的傳輸機制來改善移動式隨意網路的傳輸效能,到了第二階段,由於受限網路上各裝置的硬體能力,我們將研究環境轉向與移動式隨意網路非常相似的環境『車用隨意網路(VANET) 』,在車用隨意網路,已經大幅改善裝置的硬體能力,所有的裝置大部份是車上裝置(OBU),然而仍然存在著大量移動式隨意網路就存在的問題,因此我們首先對車用隨意網路進行分析,並根據其特性提出了一個智慧型封包傳輸機制來改善車用隨意網路中時斷時續連線(intermittent connectivity)等問題。最後我們探討無線網路上的安全性問題並以網路電話(VoIP)為主題,網路電話是一個相當成熟的技術,然而當應用在無線的環境中,很多安全性問題一一浮現,我們針對整個網路電話的架構及終端移動(terminal mobility)的特性來改善這些問題。
Mobile ad hoc networks (MANETs) are an important topic in wireless network research, because they provide a convenient communication environment. However, their instability, insecurity, and unreliability make them impractical for data communication. There are three limitations of MANETs: a dynamic topology, insufficient hardware resources, and insecurity. Overcoming these limitations can improve MANET performance. The topology is dynamic in the sense that the link state is unstable and that it is difficult to maintain the transmission path. Thus, our first purpose is to improve stability and data delivery ratio. We propose a specific communication scheme to improve performance using geographic information. In the next step, we focus on a new environment, called vehicular ad hoc network (VANET), which is similar to MANET. In VANET, hardware resources are no longer sufficient, because most of the devices are on-board units (OBU). In general, an OBU has sufficient power, memory, and CPU strength. However, the disadvantages of MANETs (e.g., unstable link) still exist in VANET. Therefore, we analyze the properties of the VANET environment in detail and then propose an intelligent packet-forwarding scheme to improve performance. Finally, we discuss the wireless security issue and focus on VoIP security. VoIP is a convenient technology but has many security issues in wireless networks. Therefore, we propose a secure VoIP system structure for wireless security.
[1] M.W. Patricia, What is Bluetooth? IEEE Potentials, 23 (5) (2005) 33-35.
[2] T.K.K. Tsang, M.N. El-Gamal, Ultra-Wideband (UWB) Communications Systems: an Overview, The 3rd International IEEE-NEWCAS Conference (2005) 381-386.
[3] R.C. Qiu, W. Zhu, Y.Q. Zhang, Third-Generation and Beyond (3.5G) Wireless Networks and its Applications, IEEE International Symposium on Circuits and Systems, 1 (2002) I41-I44.
[4] B. Li; Y. Qin, C.P. Low, C.L. Gwee, A Survey on Mobile WiMAX [Wireless Broadband Access], IEEE Communications Magazine, 45 (12) (2007) 70-75.
[5] R. Nossenson, Long-term Evolution Network Architecture, IEEE International Conference on Microwaves, Communications, Antennas and Electronics Systems, (2009) 1-4.
[6] ASTM E2213 - 03 Standard Specification for Telecommunications and Information Exchange Between Roadside and Vehicle Systems — 5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications (2010).
[7] S. Dhawan, Analogy of Promising Wireless Technologies on Different Frequencies: Bluetooth, WiFi, and WiMAX, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, (2007) 1-14.
[8] IEEE P1609.0: Standard for Wireless Access in Vehicular Environments (WAVE) - Architecture
[9] IEEE P1609.3: Standard for Wireless Access in Vehicular Environments (WAVE) - Networking Services, 2006.
[10] F. Warthman, Delay-Tolerant Networks (DTNs): A Tutorial v1.1. InterPlanetary http://www.ipnsig.org/reports/DTN_Tutorial11.pdf. (2003).
[11] K. Scott, S. Burleigh, Bundle Protocol Specification. RFC 5050. (2007).
[12] M., Ramadas, S. Burleigh, S. Farrell, Licklider Transmission Protocol - Specification, Internet Draft. (2007).
[13] S. Farrell, V. Cahill, LTP-T: A Generic Delay Tolerant Transport Protocol, TCD Computer Science Technical Report TCD-CS-2005-69, (2005).
[14] L. Wood, W.M. Eddy, W. Ivancic, Saratoga: a Delay-Tolerant Networking Convergence Layer with Efficient Link Utilization, Third International Workshop on Satellite and Space Communications, (2007) 168-172.
[15] J. Rosenberg, et al. SIP: Session Initiation Protocol, RFC3261. Internet Engineering Task Force, 2002.
[16] F. Teraoka. Node Mobility Protocols in the Internet. Electronics and Communications in Japan (Part III: Fundamental Electronic Science, 2005; 88: 39-59.
[17] V. K. Gurbani, R. Jain. Contemplating Some Open Challenges in SIP. Bell Labs Technical Journal, 2004, 9: 255-269.
[18] N. Banerjee, Sajal K. Dan, A. Acharya, SIP-based Mobility Architecture for Next Generation Wireless Networks, 3rd IEEE Int’l. Conf. Pervasive Comp. and Commun., Mar. 2005, pp. 181–90.
[19] S. C. Huang, Z. H. Liu, J. C. Chen, SIP-Based Mobile VPN for Real-Time Applications, IEEE Wireless Communications and Networking Conference 2005.
[20] C. H. Yeh, Q. Wu, Y. B. Lin, SIP Terminal Mobility for both IPv4 and IPv6, Proceedings of the 26th IEEE International, 2006.
[21] J. Garman, Kerberos: The Definitive Guide, O’Reilly 2003.
[22] N. Nakajima, A. Dutta, S. Das, H. Schulzrinne, Handoff Delay Analysis and Measurement for SIP based Mobility in IPv6, in Proc. of IEEE International Conference on Communications (ICC) 2003, vol. 2, pp. 1085-1089, 2003.
[23] T. Robles, R. Ortiz, Porting the Session Initiation Protocol to IPv6, IEEE Internet Computing, vol. 07, no. 3, pp. 43-50, May/Jun, 2003.
[24] E. W. Zegura, M. H. Ammar, Application-Layer Anycasting : A Server Selection Architecture and Use in a Replicated Web Service, IEEE/ACM TRANSACTIONS ON NETWORKING, 2000.
[25] A. Demers, D. Greene, C. Hauser, W. Irish, and J. Larson, Epidemic Algorithms for Replicated Database Maintenance. In proc. ACM Symposium on Principles of Distributed Computing, Volume 15, pp.1-12, 1987.
[26] K. P. Birman, M. Hayden, and O. Ozkasap, Bimodal multicast ACM Transactions on Computer System, vol.17(2), pp.41-88, 1999.
[27] Z. J. Haas, J. Y. Halpern, and LiLi, Gossip-Based Ad Hoc Routing, Infocom, vol.3, pp.1707-1706, 2002
[28] X. Y. Li, M. K., F. O., Regional Gossip Routing for Wireless Ad Hoc Networks Local Computer Networks, pp.1-13, 2003.
[29] P. Baran., on Distributed Communications Networks. IEEE Transactions on Communications, vol.12, pp.1-12, 1964.
[30] N. F. Maxemchuk. Comparison of Deflection and Store and Forward Techniques in the Manhattan Street and Shuffle Exchange Networks. IEEE INFOCOM, vol.3, pp.800~809, 1989.
[31] A. Borodin and J.E. Hopcroft. Routing, Merging, and Sorting on Parallel Models of Computation. Journal of Computer and System Sciences, vol.30, pp.1-9, 1985.
[32] B. Karp, H.T. Kung, GPSR: Greedy Perimeter Stateless Routing for Wireless Networks, in Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking, 2000.
[33] C. Lochert, H. Hartenstein, J. Tian, A Routing Strategy for Vehicular Ad Hoc Networks in City Environments, in Proceedings of IEEE Intelligent Vehicles Symposium, pp.156–161, 2003.
[34] H. Idjmayyel, B.R. Qazi, J.M.H. Elmirghani, Position Based Routing Protocol for a City Environment, 2010 Fourth International Conference on Next Generation Mobile Applications, Services and Technologies, pp.174-179, 2010.
[35] M. Bilal, P.M.L. Chan, P. Pillai, Fastest-Vehicle Multi-hop Routing in Vehicular Ad hoc Networks, 2010 IEEE 10th International Conference on Computer and Information Technology, pp.773-748, 2010.
[36] C. Lochert, H. Hartenstein, J. Tian, A Routing Strategy for Vehicular Ad Hoc Networks in City environment, Proceedings. IEEE Intelligent Vehicles Symposium, pp.156-161, 2003.
[37] M. Jerbi, S.M. Senouci, T. Rasheed, Towards Efficient Geographic Routing in Urban Vehicular Networks, IEEE Transactions on Vehicular Technology, vol.58 (9), pp.5048-5059, 2009.
[38] C. Maihöfer, A Survey of Geocast Routing Protocols, IEEE Communications Surveys & Tutorials, vol.6(2), pp.32–42, 2004.
[39] B. Ducourthial, Y. Khaled, M. Shawky, Conditional Transmissions~ Performance Study of a New Communication Strategy in VANET, IEEE Transactions on Vehicular Technology, vol.56(6), pp.3348-3357, 2007.
[40] J. Nzouonta, N. Rajgure, G. Wang, VANET Routing on City Roads Using Real-Time Vehicular Traffic Information, IEEE Transactions on Vehicular Technology, vol.58(7), pp.3609-3626, 2009.
[41] T. Taleb, E. Sakhaee, A. Jamalipour, A Stable Routing Protocol to Support ITS Services in VANET Networks, IEEE Transactions on Vehicular Technology, vol.56(6), pp. 3337-3347, 2007.
[42] K. Day, B. Arafeh, A. Touzene, A Unified Fault-tolerant Routing Scheme for a Class of Cluster Networks, Journal of Systems Architecture, vol.54(8), pp.757-768, 2008.
[43] D. Yu, Y.B. Ko, FFRDV~ Fastest-Ferry Routing in DTN-enabled Vehicular Ad Hoc Networks, 11th International Conference on Advanced Communication Technology, vol.2, pp.1410-1414, 2009.
[44] M. Ye, X. Tang, D.L. Lee, Fair Delay Tolerant Mobile Data Ferrying, Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, pp.182-191, 2009.
[45] A. Vahdat, D. Becker, Epidemic Routing for Partially Connected Ad Hoc Networks, Technical Report CS-2000, 2000.
[46] X. Li, W. Shu, M. Li, DTN Routing in Vehicular Sensor Networks, IEEE Global Telecommunications Conference, pp.1-5, 2008.
[47] C. Holman, K.A. Harras, K.C. Almeroth, A Proactive Data Bundling System for Intermittent Mobile Connections, Sensor and Ad Hoc Communications and Networks, pp.216-225, 2006.
[48] A. Krifa, C. Barakat, T. Spyropoulos, An Optimal Joint Scheduling and Drop Policy for Delay Tolerant Networks, World of Wireless, Mobile and Multimedia Networks, pp.1-6, 2008.
[49] V. N. G. J. Soares, J. J. P. C. Rodrigues, F. Farahmand, Exploiting Node Localization for Performance Improvement of Vehicular Delay-Tolerant Networks, IEEE International Conference on Communications, pp.1-5, 2010.
[50] W. Zhao, Y. Chen, M. Ammar, Capacity Enhancement using Throwboxes in DTNs, IEEE International Conference on Mobile Adhoc and Sensor Systems, pp.31-40, 2006.
[51] V.N.G.J. Soares, F. Farahmand, J.J.P.C. Rodrigues, Improving Vehicular Delay-Tolerant Network Performance with Relay Nodes, Next Generation Internet Networks, pp.1-5, 2009.
[52] F. Farahmand, I. Cerutti, A.N. Patel, Relay Node Placement in Vehicular Delay-Tolerant Networks, IEEE GLOBECOM 2008 Global Telecommunications Conference, pp.1-5, 2008.
[53] Chun-Chih Lo, Jeng-Wei Lee, Che-Hung Lin, A Cooperative Destination Discovery Scheme to Support Adaptive Routing in VANETs, 2010 IEEE Vehicular Networking Conference (VNC), pp.202-208, 2010.
[54] Ji-Young Kwak, Ubiquitous Services System Based on SIP, IEEE Transactions on Consumer Electronics, vol.53, pp.938-944, 2007.
[55] M. Takizawa, T. Minato, T. Furukawa, K. Seki, H. Shimada, Future Service Platform and Home Gateway, APSITT 2005 Proceedings, 2005.
[56] Yeon-Joo Oh, Eui-Hyun Paik, Kwang-Roh Park, Design of a SIP-based real-time visitor conversation and door control architecture using a home gateway, International Conference on Consumer Electronics 2006, 2006.
[57] Hyo-Moon Jeong, Myung-Jin Lee, Dong-Kyu Lee, Soon-Ju Kang, Design of Home Network Gateway for Real-Time A/V Streaming between IEEE1394 and Ethernet, IEEE Transactions on Consumer Electronics, 2007.
[58] Cisco Unified Communications System. Retrieved September 18, 2008, from the World Wide Web: http://www.cisco.com/en/US/prod/collateral/voicesw/ps6882/ps6884/solution_overview_c22-484573.html
[59] D. Bradbury, The security challenges inherent in VoIP, Computers & Security, Vol.26(7-8), pp.485-487, 2007.
[60] Dimitris Geneiatakis, Costas Lambrinoudakis, An ontology description for SIP security flaws, Computer Communications, Vol.30(6), pp.1367-1374, 2007.
[61] Francesco Palmieri, Ugo Fiore, Providing true end-to-end security in converged voice over IP infrastructures, Computers & Security, Vol.28(6), pp.433-449, 2009.
[62] A. Milanovic, S. Srbljic, I. Raznjevic, D. Sladden, D. Skrobo, I. Matosevic, Distributed system for lawful interception in VoIP networks, EUROCON 2003. Computer as a Tool. The IEEE Region 8, vol.1, pp.203-207, 2003.
[63] B. Karpagavinayagam, R. State, O. Festor, Monitoring Architecture for Lawful Interception in VoIP Networks, ICIMP 2007, pp.5-5, July 2007.
[64] Seokung Yoon, Jongil Jeong, Hyuncheol Jeong, Yoojae Won, Lawful Interception Scheme for Secure VoIP Communications Using TTP, CSA 2008, pp.149 - 152, 2008.
[65] Chen-Hua Yeh, Quincy Wu, Yi-Bing Lin, SIP Terminal Mobility for both IPv4 and IPv6, Proceedings of the 26th IEEE International, 2006.
[66] Jin Lian, Layuan Li, Xiaoyan Zhu, A Multi-constraint QoS Routing Protocol with Route-Request Selection Based on Mobile Predicting in MANET, Computational Intelligence and Security Workshops, 2007. CISW 2007. International Conference on, pp. 342-345, 15-19 Dec. 2007.
[67] W. Yeong, T. Howes, S. Kille, Lightweight Directory Access Protocol, RFC 1777.
[68] Sajal K. Das, Sanjoy K. Sen, Rajeev Jayaram, A Novel Load Balancing Scheme for the Tele-traffic Hot Spot Problem in Cellular Networks., wireless networks, vol.4, pp.325-340, 1998.
[69] J. Jobin, Michalis Faloutsos, Satish K. Tripathi, Srikanth V. Krishnamurthy, Understanding the Effects of HotSpots in Wireless Cellular Networks, Infocom, vol.1, pp.671-680, 2004.
[70] Tak-Shing Peter Yum, Wing-Shing Wong. Hot-Spot Traffic Relief in Cellular Systems. IEEE Journal on Selected Areas in Communications, vol.11(6), 1993.
[71] Jung-ShyrWu, Jen-Kung Chung, Chang-Chung Wen, Performance Study for Microcell Hot Spot Embedded in CDMA Macrocell Systems. IEEE Transactions on Vehicular Technology., vol.48(1), pp.47-59, 1999.
[72] Andrew S. Tanenbaum (1996). Computer Networks, third ed.. Upper Saddle River, N.J. :Prentice Hall PTR. chap.6, 508~509.
[73] I. Gupta, T. D. Chandra, and G. S. Goldszmidt (2001). On scalable and efficient distributed failure detectors. In Proc. of the 20th ACM symp. on Principles of distributed computing.
[74] Kevin Fall, Kannan Varadhan (2009). The ns Manual. The Network Simulator - ns-2. http://www.isi.edu/nsnam/ns/doc/index.html.
[75] Jain, R., Chiu, D.M., and Hawe, W (1984). A Quantitative Measure of Fairness and Discrimination for Resource Allocation in Shared Systems. DEC Research Report TR-301
[76] Dongjin Son, Ahmed Helmy, Bhaskar Krishnamachari, The Effect of Mobility-Induced Location Errors on Geographic Routing in Mobile Ad Hoc and Sensor Networks: Analysis and Improvement Using Mobility Prediction, IEEE Transactions on Mobile Computing, vol. 3(3), pp.233-245, 2004.
[77] M. Mauve, J. Widmer, and H. Hartenstein. A survey on position-based routing in mobile ad hoc networks. IEEE Network, vol. 15(6), pp.30–39, 2001.
[78] T. Camp. , J Boleng, L Wilcox, Location information services in mobile ad hoc networks, IEEE International Conference on Communications Conference Proceedings ICC 2002, vol. , pp.3318-3324, 2002.
[79] T. Camp, J. Boleng, and L. Wilcox. Location information services in mobile ad hoc networks. In Proceedings of the IEEE International Conference on Communications (ICC), pp.3318–3324, 2002.
[80] S. Jiang, D. He, J. Rao, A Prediction-Based Link Availability Estimation for routing metrics in MANETs, vol. 13(6), pp.1302-1312, 2005.
[81] L. Gong, Y. Bai, M. Chen, Link Availability Prediction in Ad Hoc Networks, 14th IEEE International Conference on Parallel and Distributed Systems, pp.423-428, 2008.
[82] N. Sadagopan, F. Bai, B. Krishnamachari, PATHS: analysis of PATH duration statistics and their impact on reactive MANET routing protocols, 4th ACM international symposium on Mobile ad hoc networking & computing, pp.1-15, 2003.
[83] M. Gerharz, C. de Waal, M. Frank, Link Stability in Mobile Wireless Ad Hoc Networks, 27th Annual IEEE International Conference on Local Computer Networks, pp.1-10, 2002.
[84] K. Medepalli and F. A. Tobagi, Towards performance modeling of IEEE 802.11 based wireless networks: a unified framework and its applications, in Proc. of INFOCOM, pp.1-12, 2006.
[85] F. Li, Y. Wang, Routing in vehicular ad hoc networks: A survey, IEEE Vehicular Technology Magazine, vol. 2 (2) (2007) 12-22.
[86] P. Tomer, M. Chandra, An application of routing protocols for Vehicular Ad-hoc Networks, 2010 International Conference on Networking and Information Technology, (2010) 157-160.
[87] M. Grossglauser, D. Tse, Mobility increases the capacity of ad-hoc wireless networks, INFOCOM 2001, vol. 3 (2001) 1360-1369.
[88] Fraunhofer FOKUS, SER (SIP Express Router). Available: http://www.iptel.org/ser/.
[89] Minisip. Available: http://www.minisip.org/.
[90] Asterisk. Available: http://www.asterisk.org/.
[91] US-CERT, CERT Coordination Center, http://www.cert.org/
[92] John C. Welch, MacCentral, Analysis: The end of Netinfo, http://www.macworld.com/article/61097/2007/11/netinfo.html
[93] R. Castro, M. Coates, G. Liang, R. Nowak, B. Yu, Network Tomography: Recent Developments, Statistical Science, vol.19(3), pp.499-517, 2004.
[94] BitWizard B.V., http://www.bitwizard.nl/mtr/.
[95] Khadivi, P., Samavi, S., Todd, T.D., Saidi, H., Multi-constraint QoS routing using a new single mixed metric, Communications, 2004 IEEE International Conference on, vol.4, pp.2042- 2046, 2004.
[96] M. Coates, A. O. Hero III, R. Nowak, B. Yu, Internet Tomography, IEEE Signal Processing Magazine, vol.19(3), pp.47-65, 2002.
[97] Butcher, D, Xiangyang Li, Jinhua Guo, Security Challenge and Defense in VoIP Infrastructures, Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, vol.37(6), pp.1152-1162, 2007.
校內:2017-07-16公開