博碩士論文 974203006 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:69 、訪客IP:3.135.195.168
姓名 黃建勳(Chien-Hsun Huang)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱 應用社會網路之信任概念於車載網路上存取控制之研究
(Trust Relation Based Access Control For Vehicular Ad Hoc Networks)
相關論文
★ 應用數位版權管理機制於數位影音光碟內容保護之研究★ 以應用程式虛擬化技術達成企業軟體版權管理之研究
★ 以IAX2為基礎之網頁電話架構設計★ 應用機器學習技術協助警察偵辦詐騙案件之研究
★ 擴充防止詐欺及保護隱私功能之帳戶式票務系統研究-以大眾運輸為例★ 網際網路半結構化資料之蒐集與整合研究
★ 電子商務環境下網路購物幫手之研究★ 網路安全縱深防護機制之研究
★ 國家寬頻實驗網路上資源預先保留與資源衝突之研究★ 以樹狀關聯式架構偵測電子郵件病毒之研究
★ 考量地區差異性之隨選視訊系統影片配置研究★ 不信任區域網路中數位證據保留之研究
★ 入侵偵測系統事件說明暨自動增加偵測規則之整合性輔助系統研發★ 利用程序追蹤方法關聯分散式入侵偵測系統之入侵警示研究
★ 一種網頁資訊擷取程式之自動化產生技術研發★ 應用XML/XACML於工作流程管理系統之授權管制研究
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 車載網路 (Vehicular Ad Hoc Networks,VANET) 是目前正在崛起的新興研究議題,隨之也發展出許多新的應用服務,提升交通運輸效率並增加行車安全。
VANET需要一種機制來管理快速增加的服務以免資源被浪費或成為攻擊工具,因此本研究從信任的角度出發,依據社會網路 (social network) 及其相關領域探討的「信任」概念以及結合資訊安全領域「存取控制」的原則設計出「以信任關係為基礎的存取控制」 (Trust Relation Based Access Control,TRBAC),希望將社會網路的信任概念應用到VANET中,提供VANET管理其服務的可行方案。
本研究提出攻擊者散佈假訊息以及失竊車輛協尋兩個情境說明 TRBAC的使用情境。在攻擊者散佈假車禍訊息的使用情境進行模擬實驗,比較 TRBAC 與時間決(Freshest Message)、多數決(Majority Wins)兩種訊息傳播方式, TRBAC 能成功將車禍假訊息的數量抑制,比時間決減少約 60% ,比多數決減少約40% ~ 50%。本研究亦結合TRBAC 與行車記錄器提出新的車輛協尋服務流程,與傳統人力協尋相比在投入人力、資訊蒐集速度與資訊品質方面都具有優勢,可提升尋獲失竊車輛的機會。
摘要(英) VANET (Vehicular Ad Hoc Networks) is an Emerging research issues, and with it the development of many new applications improve transport efficiency and increase road safety.
It is necessary for VANET to develop a mechanism which is used to manage the variety of services so that resources could not be wasted or become attack tools. This research intends to use trust concept on VANET. We combine social network trust theory with access control design principle of information security areas and propose Trust Relation Based Access Control (TRBAC). This work defines trust on VANET and provides a scheme to manage the variety of services on VANET.
This research proposes tow scenarios for TRBAC, attackers spread false information and a new service for searching for stolen vehicles. For scenario 1, attackers spread false message, we compare the TRBAC and other tow modes of transmission messages, Freshest Message and Majority Wins. The results show that TRBAC successfully suppress the number false message than Freshest Message reduced by about 60%, less than Majority Wins about 40% to 50%.
For scenario 2, this work combines TRBAC with driving recorder and proposes a new service for searching for stolen vehicles. As compared with traditional service of searching for stolen vehicles, the new service is quicker when collecting information and provides good quality of information so that new service will enhance opportunities to find the stolen cars.
關鍵字(中) ★ 車載網路
★ 信任
★ 存取控制
★ 安全
關鍵字(英) ★ Security
★ VANET
★ Trust
★ Access Control
論文目次 中文摘要 i
英文摘要 ii
圖目錄 vi
表目錄 viii
第一章 緒論 1
1.1 研究背景 1
1.2 研究動機與目的 3
1.3 研究貢獻 5
1.4 章節架構 6
第二章 相關研究 7
2.1 關於信任概念的探討 7
2.2 信任在資訊科技領域的應用 14
2.3 VANET領域信任的相關研究 18
2.4 小結 22
第三章 以信任為基礎之存取控制 24
3.1 對於信任的描述 24
3.2 存取控制原則 27
3.3 以信任為基礎之存取控制 30
第四章 使用情境及分析 39
4.1 使用工具 39
4.2 使用情境1 ─ 抑制假訊息 41
4.3 使用情境2 ─ 失竊車輛協尋 46
4.4 小結 49
第五章 結論與未來研究 51
5.1 研究結論與貢獻 51
5.2 研究限制 52
5.3 未來研究 52
參考文獻 54
參考文獻 參考文獻
中文文獻
[1] 柯志亨團隊,「計算機網路實驗─使用 NS2 模擬多媒體通訊與無線網路」,學貫出版,民國 96 年。
[2] 周淑美,「車載網路資訊安全應用之探討」,國立東華大學資訊工程所碩士論文,民國 97 年。
[3] 蔡効謙,「汽車隨意網路上偽造訊息的影響及防禦方法」,國立台灣科技大學資訊管理所碩士論文,民國 96 年。
[4] 鍾惟欣,「植基於身分安全架構之車載網路設計」,國立東華大學資訊工程所碩士論文,民國96年。
[5] 葉力齊,「車輛隨意網路模糊傳輸機制加密之研究」,國立台灣師範大學工程教育研究所碩士論文,民國 97 年。
英文文獻
[6] A. Jøsang, “An Algebra For Assessing Trust In Certification Chains,” In Proceedings of the Network and Distributed Systems Security , 1999.
[7] Artz, D., and Gil, Y., “A Survey of Trust in Computer Science and the Semantic Web” Software Engineering and the Semantic Web Vol. 5, No. 2, pp. 58-71, 2007
[8] Bauer, R.A., “Consumer behavior as risk taking,” Risk taking and information handling in consumer behavior, Boston, MA: Harvard University Press; pp. 23–33, 1967.
[9] Bigley G. A. and Pearce, J. L., “Straining for Shared Meaning in Organization Science: Problems of Trust and Distrust ,” The Academy of Management Review, Vol. 23, No. 3, pp. 405-421, Jul., 1998.
[10] Deutsch, M., "Cooperation And Trust: Some Theoretical Notes," In Nebraska Symposium on Motivation, pp. 275-319, 1962.
[11] Dotzer, F., Fischer, L. and Magiera, P., “VARS: A Vehicle Ad-Hoc Network Reputation System,” Sixth IEEE International Symposium on World of Wireless Mobile and Multimedia Networks, pp. 454 – 456, 2005.
[12] Gambetta, S. D., “Can we trust trust?” In Gambetta, Diego (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213-237, 2000.
[13] Gefen, D., Karahanna, E. and Straub D. W., “Trust and TAM in Online Shopping: An Integrated Model ”MIS Quarterly, Vol. 27, No. 1, pp. 51-90, Mar., 2003.
[14] Gerlach, M., Steglich, S., Arbanowski, S., Wegdam, M. and Teunissen, H., “Trustworthy applications for Vehicular Environments,” IEEE Vehicular Technology Magazine, Vol.1, No.2, pp.9-15, 2006.
[15] Golbeck, J., “Trust on the World Wide Web: A Survey,” Foundations and Trends in Web Science, Vol. 1, Issue 2, pp.131-197, January 2006.
[16] Golle, P., Greene, D. and Staddon, J., “Detecting And Correcting Malicious Data In Vanets,” In Proceedings 1st ACM Int’l Workshop on Vehicular Ad Hoc Networks, pp. 29–37, Oct. 2004.
[17] Grandison, T. and Sloman, M., “A survey of trust in internet applications,” IEEE Communications Surveys and Tutorials, Vol.4, No.4, 2000.
[18] Heider, F., “Attitudes and cognitive organization.” Journal of Psychology, Vol. 21, pp. 107-112, 1946.
[19] Hubaux, J.P., Capkun S. and Luo, J., “The Security and Privacy of Smart Vehicles ,” Security & Privacy, IEEE Vol. 2 , Issue 3, pp. 49 - 55, 2004.
[20] Karnadi, F. K., Mo, Z. H. and Lan., K-C., “Rapid Generation of Realistic Mobility Models for VANET,” IEEE Wireless Communications and Networking Conference, pp. 2506-2511, 2007.
[21] Krackhardt, D. “The Strength Of Strong Ties,” N. Nohria and R. Eccles (Eds.), Networks and organizations: Structure, form, and action, Harvard Business School Press, 1994.
[22] Mui, L., Mohtashemi, M. and Halberstadt, A. “A computational model of trust and reputation,” In Proceedings of the 35th International Conference on System Science, pp. 280–287, 2002.
[23] Olmedilla, D., Rana, O., Matthews, B. and Nejdl, W. “Security And Trust Issues In Semantic Grids,” In Proceedings of the Dagsthul Seminar, Semantic Grid: The Convergence of Technologies, 2005.
[24] Ostermaier, B., D‥otzer F. and Strassberger M., “Enhancing the Security of Local Danger Warnings in VANETs - A Simulative Analysis of Voting Schemes,” In Proceedings of the The Second International Conference on Availability, Reliability and Security, pp. 422-431, 2007.
[25] Pai, S., Roosta, T., Wicker, S. and Sastry, S., “Using Social Network Theory Towards Development of Wireless Ad hoc Network Trust,” Networking and Applications Workshops, 2007.
[26] Papadimitratos, P., Kung, A., Hubaux, J-P. and Kargl, F., “Privacy and Identity Management for Vehicular Communication Systems a Position Paper,” In Proceedings of Workshop on Standards for Privacy in User-Centric Identity Management, 2006.
[27] Peden, M., Scurfield, R., Sleet, D., Mohan, D., Hyder, A., Jarawan, E. and Mathers, C., “The World Report On Road Traffic Injury Prevention,” Geneva, World Health Organization, 2004.
[28] Raya, M., Papadimitratos, P., Aad, I., Jungels D. and Hubaux, J.-P., “Eviction Of Misbehaving And Faulty Nodes In Vehicular Networks,” IEEE Journal on Selected Areas in Communications, Vol. 25, No. 8, pp. 1557-1568, 2007.
[29] Raya, M., Papadimitratos, P., Gligor, V. D. and Hubaux, J-P., “On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks,” IEEE The 27th Conference on Computer Communication, pp. 1238 – 1246, 2008.
[30] Sandhu, R. S., and Samarati, P., “Access Control Priciples and Practice,” Communications Magazine, IEEE, Vol. 32 , Issue 9 , pp. 40 – 48, 1994.
[31] Sitkin, B., Burt, R.S. and Camerer, C., "Not So Different After All: A Cross-Discipline View of Trust," The Academy of Management Review, Vol.23, No.3, pp. 393-404, 1998.
[32] Song, J-H, Wong, V. and Leung, V., "Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks," IEEE International Conference on Communications, pp. 1-6, 2009.
[33] Sun, J., Zhang C. and Fang, Y., “An Id-Based Framework Achieving Privacy And Non-Repudiation In Vehicular Ad Hoc Networks,” IEEE Military Communications Conference, pp. 1–7, 2007.
[34] Sun, Y. L., Yu, W., Han, Z. and Liu, K.J.R., “Information theoretic framework of trust modeling and evaluation for ad hoc networks.” IEEE Journal on Selected Areas in Communications, Vol.24, No.2, pp. 305-317, 2006.
[35] Theodorakopoulos, G. and Baras, J. S., “Trust evaluation in ad-hoc networks,” In Proceedings ACM Workshop Wireless Security, pp. 1–10, Oct. 2004.
[36] Varadharajan, V., “A Note On Trust-Enhanced Security,” IEEE Security & Privacy, Vol. 7, No. 3, pp. 57-59, 2009.
[37] Wang, J., Liu, Y., Liu, X. and Zhang, J., “A Trust Propagation Scheme in VANETs,” IEEE Intelligent Vehicles Symposium, pp. 1067-1071, 2009.
[38] Zand, E.D., “Trust and Managerial Problem Solving,” Administrative Science Quarterly, Vol. 17, pp.229-239, 1972.
[39] Zhang, C., Lin, X., Lu, R., Ho, H. and Shen, X., “An Efficient Message Authentication Scheme for Vehicular Communications,” IEEE Vehicular Technology, Vol. 57, No.6, pp. 3357-3368, 2008.
[40] Zucker, L. G., “Production of trust: Institutional sources of economic structure, 1840 to 1920.” In B. M. Staw & L. L. Cummings (Eds.), Research in organizational behavior, Vol.8 pp. 53-112, 1986.
相關網站
[41] 行車記錄器實際裝載圖,http://yuann.tw/?p=1602
[42] 交通部運輸研究所RDS-TM系統,http://e-iot.iot.gov.tw/RDS-TMC_Format.htm
[43] SUMO, http://sumo.sourceforge.net/
[44] The Network Simulator – NS-2, http://www.isi.edu/nsnam/ns/
指導教授 陳奕明(Yi-Ming Chen) 審核日期 2010-7-23
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明