English  |  正體中文  |  简体中文  |  Items with full text/Total items : 65317/65317 (100%)
Visitors : 21374582      Online Users : 234
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/9094


    Title: 應用於MANET & WMANs整合網路上具有安全性的中控指導路由協定;Secure Agent Guided Routing Protocol (SAGRP) for Heterogeneous Wireless Network (MANET & WMANs)
    Authors: 許金花;Jin-Hwa Shiu
    Contributors: 資訊工程研究所
    Keywords: 路由協定;整合網路;安全性;中控;security;routing protocol;agent guided;heterogeneous network
    Date: 2005-11-23
    Issue Date: 2009-09-22 11:41:00 (UTC+8)
    Publisher: 國立中央大學圖書館
    Abstract: 行動隨意式網路是一種能夠在沒有事先建置基礎架構的環境下,由無線主機所臨時組成的網路。因為缺乏足夠頻寬供應,不但影響傳輸效能外,在安全性方面也有很大缺陷。若能透過具有完整安全層面架構的802.16寬頻無線網路技術就可以提昇無線傳輸上的安全性。這項研究所提出的WMANs與ad hoc網路整合系統架構上的中控中心Agent負責完成分配與交換金鑰且決定路由等任務。 Agent 會將每個網路傳輸連線根據連線時的需求,賦予不同之安全等級。利用使用者之AK來做認證。TEK是對每個連線產生之獨立加密金鑰。可以用它來保護資料的機密性,真實性。所以此整合系統可以避免掉一些惡意的攻擊。由實驗結果顯示,我們所提的(SAGRP)具有安全性的中控指導路由協定的傳輸效能表現高於AODV,並且尋找路由的負載也比較輕。 A mobile ad hoc network is a collection of wireless terminals that can be deployed rapidly. Its deficiencies include limited wireless bandwidth efficiency, low throughput, large delays, and weak security. Integrating it with 802.16 networks, via a well established 802.16 security architecture for ad hoc network security managements, can improve communication and security in ad hoc networks. This research proposes WMANs Guided Mobile Ad Hoc Network (WGMA) architecture, in which a WGMA agent in the WMANs provides key management, distribution and route decision. A Secure Agent Guided Routing Protocol (SAGRP) is proposed. The routing and security information is exchanged between the nodes and the agent through SS. Using the AK for each node and the TEK for each service flow, can do node to node authentication and can prevent attacks using modification, impersonation and fabrication. Simulation results show that the ad hoc network performance can be greatly improved with the higher throughput and lesser delay and routing load than AODV.
    Appears in Collections:[資訊工程研究所] 博碩士論文

    Files in This Item:

    File SizeFormat
    0KbUnknown556View/Open


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback  - 隱私權政策聲明