博碩士論文 955202064 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:61 、訪客IP:3.144.106.207
姓名 陳昶吾(Chang-Wu Chen)  查詢紙本館藏   畢業系所 通訊工程學系
論文名稱 從隱私保護探討車間安全通訊
(Towards Privacy Preserving for Vehicle Safety Communications)
相關論文
★ 應用MSPP至DWDM都會光纖網路的設計★ 光網路與WiMAX整合架構研究及其簡化雛型實驗
★ 以Linux系統為基礎之NAT效能優化研究及其實作★ 光波長劃分多工網路之路徑保護機制研究
★ 標籤交換網路下具有服務品質路由安排之研究★ 以訊務相關性為基礎的整合性服務可調整QoS排程器之研究
★ 以群體播送支援IPv6環境下移動式網路連結更新之研究★ 無線區域網路資源動態分配之效能研究
★ 在微觀移動環境下有效資源保留之路徑管理研究★ 無線網路交握程序之預先認證方法分析與比較
★ 無線區域網路虛擬允入控制之研究★ IPv6環境下移動網路之連結更新程序及其效能之研究
★ 具有限數量波長轉換節點的分波多工網路之群播波長分配與容量計算研究★ 階層化行動式IPv6移動錨點選擇機制研究
★ 具高能量移動節點之叢集式感測網路 效能研究★ 預先註冊之快速換手階層化行動式IPv6研究
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 隨著無線網路技術的進步,許多通訊相關的應用隨之發展,其中一項典型且有別於傳統的應用為智慧型運輸系統,其整合資訊與通訊技術,進而強化道路安全與提高交通運輸效率。而各式各樣相關的研究與應用也儼然而生,包含維護車間安全、車流管理、駕駛輔助應用、多媒體加值應用等網路服務。此外,考慮資料在車間網路傳遞的正確性及匿名性,訊息的傳輸需經過合法憑證的認證,以杜絕不法車輛的惡意攻擊;然而,現有的憑證管理系統存在漏洞,使得執法機關可用以追蹤車輛,造成使用者喪失隱私。
本論文首先探討車流管理,致力於設計改善道路運輸流量的機制,以減少道路擁塞並保證道路安全。我們提出集中式的車流管理方法,透過車輛回報位置的機制,推送適合的路徑;在計算路徑上,考慮車輛在不同道路延遲下的行車時間,並且納入繞路機制,透過模擬分析,我們的方法有效降低傳統車輛的路由的時間。
雖然智慧運輸系統帶來車輛安全與效能的提升,但車間通訊伴隨隱私的洩漏。由於傳送方與接收方彼此能夠識別對方,若通訊的驗證機制無法保持匿名,攻擊者即可透過身分識別資料來進行車輛追蹤,侵犯使用者隱私。更甚,車間通訊必須避免攻擊者散播不實的資訊,除了要能設計可靠的感測器進行偵測之外,也必須將不法的車輛從車輛網路移除,以正視聽。權責性的問責將交由憑證管理系統來進行驗證,撤銷不法車輛相當於要能夠辨別不法車輛,權責與隱私之間必須取得微妙的平衡。目前,美國交通運輸部考慮在 2020 年推動車間網路,並且提出 SCMS 憑證管理系統,但很遺憾的,目前系統存在不當設計造成使用者隱私可能被侵犯,本文將探討系統設計並提出改善機制以維護車輛隱私。
摘要(英) Recent advances in the wireless network technologies have triggered the deployment of communications in many applications. Among them, the intelligent transportation system (ITS) is a typical example that may change the traditional life. ITS integrates information and telecommunication technology to enhance road safety and transportation efficiency. A wide range of applications has emerged, including public safety applications, traffic management applications, driver support applications, infotainment applications in network services. Besides, to achieve data correctness and anonymity from misbehaving and malicious vehicles, message must to be signed by the certificate before its transmission. However, the current Security Credential Management System (SCMS) is vulnerable and enables law enforcement to track the vehicle and compromise users’ privacy.
In this dissertation, we first explore the traffic management applications and aim at improving traffic throughput of the transportation system to reduce traffic congestion and preserve road safety. We propose a centralized dispatching approach to compute routing paths for each vehicle based on its source and destination. Furthermore, the mechanism considers not only the routing costs but also safety factors and introduces detour method as alternative path selection. We evaluate the performance through the simulation analysis, and the result shows that our approach significantly outperforms traditional approach for transportation time.
Though ITS enables to provide smarter and safer transportation applications, data breach is introduced by vehicular communications. If the transmitter and the sender cannot preform anonymous communication, the attacker is able to track the vehicles and compromise vehicles’ privacy. In addition, the system must to be capable to prevent attackers from disseminating false messages. Not only the reliable and sophisticated sensor is required, but also the system needs to remove out the misbehaving vehicles to enhance system robustness. For accountability reasons, the credential management system is responsible for misbehavior detection and certificate revocation. In other words, the system can identify the misbehaving vehicle. Thus, the design of the system requires a delicate balance between privacy and accountability. Currently, National Highway Traffic Safety Administration (NHTSA) has announced its plan to deploy VANETs by 2020 and the SCMS is the leading credential management system in the US. Unfortunately, the current SCMS design fails to achieve its design goal and compromise users’ privacy. In this dissertation, we propose a solution to enhance the system security and preserve users’ privacy.
關鍵字(中) ★ 車載網路
★ 假名憑證
★ 撤銷
★ 隱私
關鍵字(英) ★ Vehicular Ad Hoc Networks
★ Pseudonym certificate
★ Revocation
★ Privacy
論文目次 中文摘要 iv
Abstract v
Acknowledgements vi
Table of Contents vii
List of Figures x
List of Tables xiii
Chapter 1 Introduction 1
1.1 Background 1
1.2 Organization of the Dissertation 2
Chapter 2 Overview of Vehicular Ad Hoc Networks 3
2.1 Introduction 3
2.2 Motivation 5
2.3 Pseudonym certificate management 7
Chapter 3 A Safe and Efficient Vehicle Routing Scheme 13
3.1 Chapter overview 13
3.2 Background 13
3.3 Deployment and Scenarios 15
3.4 The Design of an Intelligent Routing Method 16
3.4.1 Delay cost analysis 17
3.4.2 Intelligent routing design 20
3.5 Experimental Simulations 27
3.5.1 Simulation 1 27
3.5.2 Simulation 2 29
3.6 Conclusions and Future Works 31
Chapter 4 Privacy issues in vehicular ad hoc networks 32
4.1 Chapter Overview 32
4.2 Motivation 32
4.3 Background 35
4.3.1 SCMS components 35
4.3.1 Pseudonym resolution 38
4.3.2 Revocation processes 39
4.3.3 Misbehavior Detection Scheme 39
4.3.4 Analysis 40
4.4 Adversary models 40
4.4.1 Honest-But-Curious Adversary 41
4.4.2 Malicious Adversary 41
4.5 Approach 42
4.5.1 k-degree anonymity 42
4.5.2 Graph Relabeling 45
4.5.3 Differential privacy 46
4.5.4 Detection of collusion attacks 48
4.6 Experimental evaluation 49
4.6.1 Simulation settings 49
4.6.2 Differential Privacy’s Impact on Utility 51
4.6.3 Performance of collusion attack detection 53
4.7 Conclusion 57
Chapter 5 Dissertation Summary and Future Work 59
參考文獻 [1] E. Schmitt, H. Jula, “Vehicle Route Guidance Systems: Classification and Comparison,” in Proc. IEEE ITSC, Sep. 2006, pp. 242-247.
[2] ITS Taiwan, http://www.its-taiwan.org.tw/its-taiwan-2.htm
[3] RITA | ITS | Applications Overview, http://www.itsoverview.its.dot.gov
[4] Institute of Transportation, http://www.iot.gov.tw/mp.asp
[5] National ITS Architechure, http://www.iteris.com/itsarch
[6] J. Zhu and S. Roy, "MAC for Dedicated Short Range Communications in Intelligent Transport System," IEEE Comm., vol. 12, no. 41, Dec. 2003, pp. 60–67.
[7] http://grouper.ieee.org/groups/802/11/Reports/802.11_Timelines.htm
[8] Y. Sugiyama, M. Fukui, M. Kikuchi, K. Hasebe, A. Nakayama, K. Nishinari, S.-i. Tadaki, and S, Yukawa, “Traffic jams without bottlenecks—experimental evidence for the physical mechanism of the formation of a jam,” New Journal of Physics 10, 033001 (2008).
[9] J. Zhao and G. Cao, "VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks," IEEE Trans. Veh. Technol., Vol. 57, No. 3, pp. 1910-1922, May. 2008.
[10] Li. Li, F.Y. Wang, “Cooperative Driving at Blind Crossings Using Intervehicle Commnication,” IEEE Trans. Veh. Technol., Vol. 55, No. 6, p1712~1724, Nov. 2006
[11] O. Kwon, S.H. Lee, J.S. Kim, M.S Kim, K.J Li, “Collision Prediction at Intersection in Sensor Network Environment,” in Proc. IEEE ITSC, Sep. 2006, pp. 982-987.
[12] L. Le, A. Festag, R. Baldessari, and W. Zhang. “Communication-Based Intersection Safety: Motivation, Challenges and State-of-the-Art,” in 6th Int. Workshop on Intelligent Transportation (WIT), March 2009.
[13] S. Morinaka, T. Nishi, M. Konishi, and J. Imai, "A distributed routing. method for multiple agvs for motion delay disturbances," in Proc. IEEE IROS, Aug. 2005, pp. 1986-1991.
[14] B. Karp and H. T. Kung, “GPSR: Greedy perimeter stateless routing for wireless networks,” in Proc. Int. Conf. MobiCom, Aug. 2000, pp. 243-254.
[15] IEEE standard for wireless access in vehicular environments - security services for applications and management messages. IEEE Std. 1609.2-2013
[16] Intelligent transport systems (its); security; trust and privacy management. ETSI TS 102 940 V1.1.1 (2012-06)
[17] Aubernon, C.: NHTSA Unveils Plan Instituting New V2V Technology By 2020. http://www.thetruthaboutcars.com/2014/08/nhtsa-unveils-plan-instituting- new-v2v-technology-by-2020/ (2014), [2014-08-19]
[18] Bai, F., Krishnan, H., Sadekar, V., Holland, G., ElBatt, T.: Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective. In: IN PROCEEDINGS OF IEEE WORKSHOP ON AUTOMOTIVE NETWORKING AND APPLICATIONS (AUTONET) (2006)
[19] Chen, R., Jin, W.L., Regan, A.: Broadcasting safety information in vehicular networks: issues and approaches. IEEE Network 24(1), 20–25 (Jan 2010)
[20] Cheng, J., Fu, A.W.c., Liu, J.: K-isomorphism: Privacy preserving network publication against structural attacks. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data. pp. 459–470. SIGMOD ’10, ACM, New York, NY, USA (2010), http://doi.acm.org/10.1145/1807167.1807218
[21] Douceur, J.R.: The sybil attack. In: Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS) (2002), http://research.microsoft. com/apps/pubs/default.aspx?id=74220
[22] Dwork, C.: Differential privacy. In: 33rd International Colloquium on Automata, Languages and Programming, part II (ICALP 2006). Lecture Notes in Computer Science, vol. 4052, pp. 1–12. Springer Verlag, Venice, Italy (July 2006)
[23] Dwork, C.: Theory and Applications of Models of Computation: 5th International Conference, TAMC 2008, Xi’an, China, April 25-29, 2008. Proceedings, chap. Differential Privacy: A Survey of Results, pp. 1–19. Springer Berlin Heidelberg, Berlin, Heidelberg (2008), http://dx.doi.org/10.1007/978-3-540-79228-4_1
[24] Fonseca, E., Festag, A., Baldessari, R., Aguiar, R.L.: Support of anonymity in vanets - putting pseudonymity into practice. In: Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE. pp. 3400–3405 (March 2007)
[25] Haas, J., Hu, Y.C., Laberteaux, K.: Efficient certificate revocation list organization and distribution. Selected Areas in Communications, IEEE Journal on 29(3), 595– 604 (March 2011)
[26] Hartenstein, H., Laberteaux, L.P.: A tutorial survey on vehicular ad hoc networks. IEEE Communications Magazine 46(6), 164–171 (June 2008)
[27] Khodaei, M., Jin, H., Papadimitratos, P.: Towards deploying a scalable amp; robust vehicular identity and credential management infrastructure. In: 2014 IEEE Vehicular Networking Conference (VNC). pp. 33–40 (Dec 2014)
[28] Khodaei, M., Papadimitratos, P.: The key to intelligent transportation: Identity and credential management in vehicular communication systems. IEEE Vehicular Technology Magazine 10(4), 63–69 (Dec 2015)
[29] Krajzewicz, D., Erdmann, J., Behrisch, M., Bieker, L.: Recent development and applications of SUMO - Simulation of Urban MObility. International Journal On Advances in Systems and Measurements 5(3&4), 128–138 (December 2012)
[30] Li, F., Wang, Y.: Routing in vehicular ad hoc networks: A survey. Vehicular Technology Magazine, IEEE 2(2), 12–22 (June 2007)
[31] Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. pp. 93–106. SIGMOD ’08, ACM, New York, NY, USA (2008), http://doi.acm.org/10. 1145/1376616.1376629
[32] Mittal, P., Papamanthou, C., Song, D.X.: Preserving link privacy in social network based systems. In: NDSS (2013)
[33] Petit, J., Schaub, F., Feiri, M., Kargl, F.: Pseudonym schemes in vehicular networks: A survey. Communications Surveys Tutorials, IEEE 17(1), 228–255 (Firstquarter 2015)
[34] Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.P.: Eviction of misbehaving and faulty nodes in vehicular networks. Selected Areas in Communications, IEEE Journal on 25(8), 1557–1568 (Oct 2007)
[35] Reidt, S., Srivatsa, M., Balfe, S.: The fable of the bees: Incentivizing robust revocation decision making in ad hoc networks. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. pp. 291–302. CCS ’09, ACM, New York, NY, USA (2009), http://doi.acm.org/10.1145/1653662.1653698
[36] Ruj, S., Cavenaghi, M., Huang, Z., Nayak, A., Stojmenovic, I.: On data-centric misbehavior detection in vanets. In: Vehicular Technology Conference (VTC Fall), 2011 IEEE. pp. 1–5 (Sept 2011)
[37] Sarathy, R., Muralidhar, K.: Evaluating laplace noise addition to satisfy differential privacy for numeric data. Trans. Data Privacy 4(1), 1–17 (Apr 2011), http://dl.acm. org/citation.cfm?id=2019312.2019313
[38] Studer, A., Shi, E., Bai, F., Perrig, A.: Tacking together efficient authentication, revocation, and privacy in vanets. In: 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. pp. 1–9 (June 2009)
[39] Wernke, M., Skvortsov, P., Dürr, F., Rothermel, K.: A classification of location privacy attacks and approaches. Personal Ubiquitous Comput. 18(1), 163–175 (Jan 2014), http://dx.doi.org/10.1007/s00779-012-0633-z
[40] Whyte, W., Weimerskirch, A., Kumar, V., Hehn, T.: A security credential management system for v2v communications. In: Vehicular Networking Conference (VNC), 2013 IEEE. pp. 1–8 (Dec 2013)
[41] Wiedersheim, B., Ma, Z., Kargl, F., Papadimitratos, P.: Privacy in inter-vehicular networks: Why simple pseudonym change is not enough. In: Wireless On-demand Network Systems and Services (WONS), 2010 Seventh International Conference on. pp. 176–183 (Feb 2010)
[42] Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: Defending against sybil attacks via social networks. SIGCOMM Comput. Commun. Rev. 36(4), 267–278 (Aug 2006), http://doi.acm.org/10.1145/1151659.1159945
[43] Zeadally, S., Hunt, R., Chen, Y.S., Irwin, A., Hassan, A.: Vehicular ad hoc networks (vanets): status, results, and challenges. Telecommunication Systems 50(4), 217–241 (2010), http://dx.doi.org/10.1007/s11235-010-9400-5
[44] Zhou, B., Pei, J.: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowledge and Information Systems 28(1), 47–77 (2010), http://dx.doi.org/10.1007/s10115-010-0311-2
指導教授 陳彥文(Yen-Wen Chen) 審核日期 2016-7-29
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明