博碩士論文 964403003 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:30 、訪客IP:3.14.70.203
姓名 吳威震(Wei-Chen Wu)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱 車聯網中具隱私保護與服務權限管理之機制研究
(A Study on Privacy-Preserving Authentication and Service Rights Management for the Internet of Vehicles)
相關論文
★ 應用數位版權管理機制於數位影音光碟內容保護之研究★ 以應用程式虛擬化技術達成企業軟體版權管理之研究
★ 以IAX2為基礎之網頁電話架構設計★ 應用機器學習技術協助警察偵辦詐騙案件之研究
★ 擴充防止詐欺及保護隱私功能之帳戶式票務系統研究-以大眾運輸為例★ 網際網路半結構化資料之蒐集與整合研究
★ 電子商務環境下網路購物幫手之研究★ 網路安全縱深防護機制之研究
★ 國家寬頻實驗網路上資源預先保留與資源衝突之研究★ 以樹狀關聯式架構偵測電子郵件病毒之研究
★ 考量地區差異性之隨選視訊系統影片配置研究★ 不信任區域網路中數位證據保留之研究
★ 入侵偵測系統事件說明暨自動增加偵測規則之整合性輔助系統研發★ 利用程序追蹤方法關聯分散式入侵偵測系統之入侵警示研究
★ 一種網頁資訊擷取程式之自動化產生技術研發★ 應用XML/XACML於工作流程管理系統之授權管制研究
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 現今寬頻與無線通訊網路的普及促進了車聯網(IoV, Internet of Vehicles)的興起;相較於傳統車載網路(VANET, Vehicular Ad hoc NETworks),車聯網需要更多安全考量且所提供的服務必須有效管理,例如某些車輛必須允許讓不同的人駕駛,並分別給予不同的權限或服務(在計程車車隊中,同一輛車可能由不同的人輪班駕駛),同時在這樣的車聯網環境中駕駛人與車輛仍需受到匿名保護。在上述車聯網安全需求下,本論文提出一個具隱私保護與服務權限管理的機制來滿足此需求。本研究使用單向雜湊函數為每輛車設定一個假名並用盲簽章為每一位駕駛人產生一個匿名身分,在傳遞的訊息驗證上本研究使用訊息認證碼(MAC, Message Authentication Code)來驗證,並透過雜湊鏈來產生會議金鑰。只有在有爭議的情況下,公正單位(CA, Certificate Authority)才去揭露或廢止該車輛或駕駛人的服務權限,也只有CA可以追蹤車聯網上任何訊息的來源;在服務權限管理上,本研究也擴充權限管理機制提出一個新的服務權限管理(SRM, Service Right Management),透過不同的駕駛人在不同的車輛中給予不同的服務權限,以達到服務與權限分開管理的目的。為分析本研究所提機制在網路安全的保護功能,我們分析各個節點間所傳送的網路封包來說明機制如何抵禦相關的網路攻擊,在效能分析上以三個部分來分析,第一是分析每一個安全訊息的所需處理的時間,其中以訊息簽章和驗證來計算每一秒所能處理的訊息數量;第二是分析每輛車輛認證所花費的時間;第三是分析在分享多媒體檔案所花費的回合數。最後的分析結果顯示本研究在每一秒所能簽章和驗證的訊息高達59880個數量,而每輛車輛認證平均等待時間為0.01秒,且在分享多媒體檔案時所用到的訊息回合數遠小於其他機制。最後我們將這些結果與近幾年的相關研究做一個比較。
摘要(英) Due to the growth of the broadband and wireless communications network, it has been increasingly popular in recent years to promote the Internet of Vehicles (IoV) as a research topic. The IoV is different from Vehicular Ad hoc NETworks (VANETs). The IoV requires more security considerations than a VANET would. For example, the services provided must be effectively managed. Some vehicles must allow different drivers to use them, and are given different service rights (In a taxi fleet, the same car is driven by different people in shifts) and the identities of vehicles and drivers must be protected by anonymity. Given the above security considerations, we present a method of privacy-preserving authentication and services access control in the IoV. In this system, only the Certificate Authority (CA) can perform the revocation process when a vehicle or driver is judged as invalid. To achieve this purpose of services access control, we propose a new Service Rights Management (SRM) scheme that is given their different services depending on the different objects and then assign different digital rights for managing services and access rights separately.Our system carries out analysis and verification in a three-step process: First, it determines the overhead required for the safety message and the number of signing/verification messages per second. Second, it determines the computational load required for authentication and access verification. Third, it determines the number of rounds of multimedia file sharing. The final analysis results are 59880 messages per second of signing/verification, the average waiting time is about 0.01 s and the number of rounds is less than those of other mechanisms. In threats and attacks analysis, our scheme is compared to other mechanisms of preventing all kinds of wireless network attacks.
關鍵字(中) ★ 車聯網
★ 服務權限管理
★ 服務權限管理
★ 訊息認證碼
★ 金鑰管理
關鍵字(英) ★ IoV
★ SRM
★ Privacy Preserving
★ MAC
★ Key Management
論文目次 中文摘要 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i
Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
謝誌 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv
Table of Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
Notations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.1 Security in the IoV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.2 Digital rights management in ad hoc networks . . . . . . . . . . . . . . . . . . . 4
1.2 Motivations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.2.1 Safety-related messages must be transmitted efficiently and securely 6
1.2.2 Multimedia on-demand should be provided in vehicle during traveling 7
1.3 Research Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. .8
1.4 Research Objectives and Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
1.5 Research Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
1.6 Outline of the Dissertation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2 Related Theories and Literature Reviews. . . . . . . . . . . . . . . . . . . . . . . . . . .15
2.1 Internet of Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
2.2 Related Theories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
2.2.1 Die-Hellman protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
2.2.2 GDH protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
2.2.3 Message authentication code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24
2.3 Message Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.3.1 Raya & Hubaux′s scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.3.2 VAST scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
2.3.3 2FLIP scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.4 Privacy-preserving Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.4.1 SECSPP scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.4.2 PAACP scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43
2.4.3 Wu and Chen′s scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
2.5 Sharing Multimedia Files in Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . .55
2.5.1 Zhang et al.′s scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
2.5.2 TLMS scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
3 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
3.1 Participants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
3.2 Network Channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
3.3 Design Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
3.4 Threats and Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
3.5 Service Rights Management (SRM) Model . . . . . . . . . . . . . . . . . . . . . . . .67
3.6 Message Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68
4 Privacy-Preserving Authentication and Service Rights Management. . . . .73
4.1 Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
4.2 Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
4.2.1 Services provider registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
4.2.2 Vehicle registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
4.2.3 Driver registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
4.3 Start Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
4.4 Login Service Provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
4.5 SMDS: Safety Message Delivery Services . . . . . . . . . . . . . . . . . . . . . . . . 80
4.5.1 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
4.5.2 Session key generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
4.5.3 Safety message signing and verification . . . . . . . . . . . . . . . . . . . . . . . .84
4.6 MFSS: Multimedia File Sharing Services . . . . . . . . . . . . . . . . . . . . . . . . . 87
4.6.1 Service registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
4.6.2 Determination of the popularity value . . . . . . . . . . . . . . . . . . . . . . . . . .91
4.6.3 Shadow key generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92
4.6.4 Group key agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
4.6.5 Digital content access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96
4.6.6 Driver addition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
4.6.7 Driver exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
4.6.8 Adjust the popularity value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .103
4.7 Vehicles and Drivers Revocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .104
4.8 Messages Tracing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
5 System Analysis and Verification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .107
5.1 Overhead for Safety Message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .107
5.2 Authentication Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
5.3 Multimedia File Sharing Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
5.4 Threats and Attacks Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
5.5 Design Objects Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .121
5.6 Comparisons with Related Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
6 Conclusions and Future Works. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
6.1 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . .131
6.1.1 Privacy-preserving authentication scheme in the IoV network . . . . . . . .131
6.1.2 Multimedia access services within a vehicle . . . . . . . . . . . . . . . . . . . . . 132
6.2 Future Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
6.2.1 Commercial value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .134
6.2.2 Extending technological development . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .141
參考文獻 [1] Market Intelligence & Consulting Institute. Online Available: http://www.ctci.org.tw/public/Attachment/614151144740.pdf, 2015.
[2] Ming-Kai Jiau, Shih-Chia Huang, Jenq-Neng Hwang, and Athanasios V Vasilakos. Multimedia services in cloud-based vehicular networks. IEEE Intelligent Transportation Systems Magazine, 7(3):62-79, 2015.
[3] Ning Lu, Nan Cheng, Ning Zhang, Xuemin Shen, and Jon W Mark. Connected vehicles: Solutions and challenges. IEEE Internet of Things Journal, 1(4):289-299, 2014.
[4] Fangchun Yang, Shangguang Wang, Jinglin Li, Zhihan Liu, and Qibo Sun. An overview of internet of vehicles. China Communications, 11(10):1-15, 2014.
[5] Youngseok Chung, Seokjin Choi, and Dongho Won. Lightweight anonymous authentication scheme with unlinkability in global mobility networks. Journal of Convergence, 4(4):23-29, Dec 2013.
[6] Ziya Cihan Taysi and Ali Gokhan Yavuz. Etsi compliant geonetworking protocol layer implementation for ivc simulations. Human-centric Computing and Information Sciences, 3(1):1-12, 2013.
[7] Rajinder Singh, Parvinder Singh, and Manoj Duhan. An effiective implementation of security based algorithmic approach in mobile ad hoc networks. Human-centric Computing and Information Sciences, 4(1):1-14, 2014.
[8] Kun Peng. A secure network for mobile wireless service. Journal of Information Processing Systems, 9(2):247-258, 2013.
[9] Nanjie Liu. Internet of vehicles: Your next connection. Huawei WinWin, 11:23-28, 2011.
[10] Christian Cseh. Architecture of the dedicated short-range communications (dsrc) protocol. In Vehicular Technology Conference, 1998. VTC 98. 48th IEEE, volume 3, pages 2095-2099. IEEE, 1998.
[11] John B Kenney. Dedicated short-range communications (dsrc) standards in the united states. Proceedings of the IEEE, 99(7):1162-1182, 2011.
[12] Maxim Raya and Jean-Pierre Hubaux. The security of vehicular ad hoc networks. In Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005.
[13] Fan Bai, Tamer Elbatt, Gavin Hollan, Hariharan Krishnan, and Varsha Sadekar. Towards characterizing and classifying communication-based automotive applications from a wireless networking perspective. In Proceedings of IEEE Workshop on Automotive Networking and Applications (AutoNet), pages 1-25, 2006.
[14] Neng-Wen Wang, Yueh-Min Huang, and Wei-Ming Chen. A novel secure communication scheme in vehicular ad hoc networks. Computer communications, 31(12):2827-2837, 2008.
[15] Lars Wischhof, Andre Ebner, and Hermann Rohling. Information dissemination in self-organizing intervehicle networks. IEEE Transactions on Intelligent Transportation Systems, 6(1):90-101, 2005.
[16] Jesus Tellez Isaac, Jose Sierra Camara, Sherali Zeadally, and Joaquin Torres Marquez. A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks. Computer Communications, 31(10):2478-2484, 2008.
[17] Saleh Yousefi, Mahmoud Siadat Mousavi, and Mahmood Fathy. Vehicular ad hoc networks (vanets): challenges and perspectives. In 2006 6th International Conference on ITS Telecommunications, pages 761-766. IEEE, 2006.
[18] Chenxi Zhang, Xiaodong Lin, Rongxing Lu, Pin-Han Ho, and Xuemin Shen. An ecient message authentication scheme for vehicular communications. IEEE Transactions on Vehicular Technology, 57(6):3357-3368, 2008.
[19] Chun-Ta Li, Min-Shiang Hwang, and Yen-Ping Chu. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications, 31(12):2803-2814, 2008.
[20] Lo-Yao Yeh, Yen-Cheng Chen, and Jiun-Long Huang. Paacp: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. Computer Communications, 34(3):447-456, 2011.
[21] Wei-ChenWu and Yi-Ming Chen. Cryptanalysis of a paacp: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. Applied Mathematics & Information Sciences, 6(2S):463S-469S, 2012.
[22] Fei Wang, Yongjun Xu, Hanwen Zhang, Yujun Zhang, and Liehuang Zhu. 2 A two-factor lightweight privacy-preserving authentication scheme for vanet. IEEE Transactions on Vehicular Technology, 65(2):896-911, 2016.
[23] Jae-Youn Sung, Jeong-Yeon Jeong, and Ki-Song Yoon. Drm enabled p2p architecture. In The 8th International Conference Advanced Communication Technology, volume 1, pages 487-490. IEEE, 2006.
[24] Tetsuya Iwata, Takehito Abe, Kiyoshi Ueda, and Hiroshi Sunaga. A drm system suitable for p2p content delivery and the study on its implementation. In Communications, 2003. APCC 2003. The 9th Asia-Pacific Conference on, volume 2, pages 806-811. IEEE, 2003.
[25] CC Chu, X. Su, BS Prabhu, R. Gadh, S. Kurup, G. Sridhar, and V. Sridhar. Mobile drm for multimedia content commerce in p2p networks. In IEEE Consumer Communications and Networking Conference, pages 1119-1123, 2006.
[26] Xinwen Zhang, Dongyu Liu, Songqing Chen, Zhao Zhang, and Ravi Sandhu. Toward digital rights protection in bittorrent-like p2p systems. In Electronic Imaging 2008, pages 68180F-68180F. International Society for Optics and Photonics, 2008.
[27] John R Douceur. The sybil attack. In International Workshop on Peer-to-Peer Systems, pages 251-260. Springer, 2002.
[28] Brian Neil Levine, Clay Shields, and N Boris Margolin. A survey of solutions to the sybil attack. University of Massachusetts Amherst, Amherst, MA, 7, 2006.
[29] Eng Keong Lua. Securing peer-to-peer overlay networks from sybil attack. In Communications and Information Technologies, 2007. ISCIT′07. International Symposium on, pages 1213-1218. IEEE, 2007.
[30] Wei-Chen Wu and Yi-Ming Chen. Tlms: A novel drm scheme for multimedia sharing in p2p networks. In The 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pages 873-876, 2009.
[31] David L Chaum. Blinding for unanticipated signatures. In In Advances in Cryptology, EUROCRYPT′87, pages 227-233, 1988.
[32] David L Chaum. Blind signatures for untraceable payments. In In Advances in Cryptology, CRYPTO′83, volume 82, pages 199-203, 1983.
[33] David L Chaum. Blind signatures system. In In Advances in Cryptology, CRYPTO′82, pages 153-156, 1982.
[34] Lee George C.S. Koo, Simon G. M. and Karthik Kannan. Using p2p to distribute large-volume contents-research problems, solutions and future directions. In In Proceedings of the 9th World Multi-Conference on Systemics, Cybernetics and Informatics, pages 10-13, 2005.
[35] Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Message authentication using hash functions: The hmac construction. RSA Laboratories′ CryptoBytes, 2(1):12-15, 1996.
[36] Qiong Liu, Reihaneh Safavi-Naini, and Nicholas Paul Sheppard. Digital rights management for content distribution. In Proceedings of the Australasian information security workshop conference on ACSW frontiers, volume 21, pages 49-58. Australian Computer Society, Inc., 2003.
[37] Miao Wang, Hangguan Shan, Rongxing Lu, Ran Zhang, Xuemin Shen, and Fan Bai. Real-time path planning based on hybrid-vanet-enhanced transportation system. IEEE Transactions on Vehicular Technology, 64(5):1664-1678, 2015.
[38] Shancang Li, Li Da Xu, and Shanshan Zhao. The internet of things: a survey. Information Systems Frontiers, 17(2):243-259, 2015.
[39] Neeraj Kumar, Sudip Misra, Joel JPC Rodrigues, and Mohammad S Obaidat. Coalition games for spatio-temporal big data in internet of vehicles environment: a comparative analysis. IEEE Internet of Things Journal, 2(4):310-320, 2015.
[40] Cheng Cheng and Wu Zongxin. Design of a system for safe driving based on the internet of vehicles and the fusion of multi-aspects information. In Computational Intelligence and Security (CIS), 2013 9th International Conference on, pages 692-696. IEEE, 2013.
[41] Mohammad Ali Salahuddin, Ala Al-Fuqaha, and Mohsen Guizani. Software-defined networking for rsu clouds in support of the internet of vehicles. IEEE Internet of Things Journal, 2(2):133-144, 2015.
[42] Tuncer Baykas, Chin-Sean Sum, Zhou Lan, Junyi Wang, M Azizur Rahman, Hiroshi Harada, and Shuzo Kato. Ieee 802.15. 3c: the first ieee wireless standard for data rates over 1 gb/s. IEEE Communications Magazine, 49(7):114-121, 2011.
[43] SIG Bluetooth. Specification of the bluetooth system: core package version 2.1+ edr. Online Available: http://www.bluetooth.com, 2007.
[44] Ozan K Tonguz, Hsin-Mu Tsai, Timothy Talty, Andrew Macdonald, and Cem Saraydar. Rfid technology for intra-car communications: A new paradigm. In IEEE Vehicular Technology Conference, pages 1-6. IEEE, 2006.
[45] ZigBee Alliance. Zigbee 2007 specification. Online Available: http://www.zigbee.org/Specifications/ZigBee/Overview.aspx, 2007.
[46] Mike Burmester and Yvo Desmedt. A secure and efficient conference key distribution system. In Advances in cryptology|EUROCRYPT′94, pages 275-286. Springer, 1994.
[47] Michael Steiner, Gene Tsudik, and Michael Waidner. Diffie-hellman key distribution extended to group communication. In Proceedings of the 3rd ACM conference on Computer and communications security, pages 31-37. ACM, 1996.
[48] Michael Steiner, Gene Tsudik, and Michael Waidner. Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems,
11(8):769-780, 2000.
[49] Michael Steiner, Gene Tsudik, and Michael Waidner. Cliques: A new approach to group key agreement. In The 18th IEEE International Conference on Distributed Computing Systems, pages 380-387. Citeseer, 1997.
[50] Whiteld Diffie and Martin Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644-654, 1976.
[51] Alfred J Menezes, Paul C Van Oorschot, and Scott A Vanstone. Handbook of applied cryptography. CRC press, 1996.
[52] Ahren Studer, Fan Bai, Bhargav Bellur, and Adrian Perrig. Flexible, extensible, and efficient vanet authentication. Journal of Communications and Networks,
11(6):574-588, 2009.
[53] Don Johnson, Alfred Menezes, and Scott Vanstone. The elliptic curve digital signature algorithm (ecdsa). International Journal of Information Security, 1(1):36-63, 2001.
[54] Adrian Perrig, Ran Canetti, J Doug Tygar, and Dawn Song. The tesla broadcast authentication protocol. RSA CryptoBytes, 5, 2005.
[55] Ueli M Maurer and Yacov Yacobi. A non-interactive public-key distribution system. Designs, Codes and Cryptography, 9(3):305-316, 1996.
[56] Yuh-Min Tseng and Jinn-Ke Jan. Id-based cryptographic schemes using a non-interactive public-key distribution system. In Computer Security Applications Conference, 1998. Proceedings. 14th Annual, pages 237-243. IEEE, 1998.
[57] Kui Ren, Wenjing Lou, Kwangjo Kim, and Robert Deng. A novel privacy preserving authentication and access control scheme for pervasive computing environments. IEEE Transactions on Vehicular technology, 55(4):1373-1384, 2006.
[58] Yen-Cheng Chen and Lo-Yao Yeh. An efficient authentication and access control scheme using smart cards. In The 11th International Conference on Parallel and Distributed Systems (ICPADS′05), volume 2, pages 78-82. IEEE, 2005.
[59] Wei-Chen Wu and Yi-Ming Chen. Improving the authentication scheme and access control protocol for vanets. Entropy, 16(11):6152-6165, 2014.
[60] Adi Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
[61] Georgios Karagiannis, Onur Altintas, Eylem Ekici, Geert Heijenk, Boangoat Jarupan, Kenneth Lin, and Timothy Weil. Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions. IEEE Communications Surveys & Tutorials, 13(4):584-616, 2011.
[62] Rongxing Lu, Xiaodong Lin, Haojin Zhu, P-H Ho, and Xuemin Shen. Ecpp: Efficient conditional privacy preservation protocol for secure vehicular communications. In INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. IEEE, 2008.
[63] Bruce Schneier. Applied cryptography: protocols, algorithms, and source code in C. Second ed., John Wiley and Sons Inc., New York, NY, USA, 1996.
[64] Jung-San Lee and Chin-Chen Chang. Secure communications for cluster-based ad hoc networks using node identities. Journal of Network and Computer Applications, 30(4):1377-1396, 2007.
[65] Hsing-Bai Chen and Sue-Chen Hsueh. Light-weight authentication and billing in mobile communications. In Security Technology, Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on, pages 245-252. IEEE, 2003.
[66] MOTC Institute of Transportation. Traffic accident loss about 475 billion annually. Online Available: https://www.motc.gov.tw/uploaddowndoc?file=news/201408210828550.docx, 2014.
[67] Ministry of Transportation and Communications. Statistics of ministry of transportation and communications. Online Available: http://stat.motc.gov.tw/, 2016.
[68] Yunchuan Wang, Wei Shu, and Michael Her. Internet protocol television, May 12 2006. US Patent App. 11/433,142.
[69] Far Eastern Electronic Toll Collection Co. (FETC). etag card. Online Available: http://www.fetc.net.tw/product/eTag-card.html, 2016.
[70] Bo Yang and Yiqun Lei. Vehicle detection and classification for low-speed congested traffic with anisotropic magnetoresistive sensor. IEEE Sensors Journal, 15(2):1132-1138, 2015.
[71] Andrew C Hazlett, John L Crassidis, Daniel P Fuglewicz, and Patrick Miller. Dierential wheel speed sensor integration with gps/ins for land vehicle navigation. American Institute of Aeronautics and Astronautics, 2013.
[72] Markus Dielacher, Martin Flatscher, Thomas Herndl, Thomas Lentsch, Rainer Matischek, Josef Prainsack, and Werner Weber. A robust wireless sensor node for in-tire-pressure monitoring. In MEMS-based Circuits and Systems for Wireless Communication, pages 313-328. Springer, 2013.
[73] Hyung-ik Kim, Jungwook Shon, and Kihyung Lee. A study of fuel economy and exhaust emission according to engine coolant and oil temperature. Journal of Thermal Science and Technology, 8(1):255-268, 2013.
[74] Ratan Hudda, Clint Kelly, Garrett Long, Jun Luo, Atul Pandit, Dave Phillips, Lubab Sheet, and Ikhlaq Sidhu. Self driving cars. College of Engineering University of California, Berkeley, Berkeley: College of Engineering University of California, 2013.
[75] Gary Silberg, Richard Wallace, G Matuszak, J Plessers, C Brower, and D Subramanian. Self-driving cars: The next revolution. White paper, KPMG LLP & Center of Automotive Research, 2012.
[68] Yunchuan Wang, Wei Shu, and Michael Her. Internet protocol television, May 12 2006. US Patent App. 11/433,142.
[69] Far Eastern Electronic Toll Collection Co. (FETC). etag card. Online Available: http://www.fetc.net.tw/product/eTag-card.html, 2016.
[70] Bo Yang and Yiqun Lei. Vehicle detection and classification for low-speed congested traffic with anisotropic magnetoresistive sensor. IEEE Sensors Journal, 15(2):1132-1138, 2015.
[71] Andrew C Hazlett, John L Crassidis, Daniel P Fuglewicz, and Patrick Miller. Dierential wheel speed sensor integration with gps/ins for land vehicle navigation. American Institute of Aeronautics and Astronautics, 2013.
[72] Markus Dielacher, Martin Flatscher, Thomas Herndl, Thomas Lentsch, Rainer Matischek, Josef Prainsack, and Werner Weber. A robust wireless sensor node for in-tire-pressure monitoring. In MEMS-based Circuits and Systems for Wireless Communication, pages 313-328. Springer, 2013.
[73] Hyung-ik Kim, Jungwook Shon, and Kihyung Lee. A study of fuel economy and exhaust emission according to engine coolant and oil temperature. Journal of Thermal Science and Technology, 8(1):255-268, 2013.
[74] Ratan Hudda, Clint Kelly, Garrett Long, Jun Luo, Atul Pandit, Dave Phillips, Lubab Sheet, and Ikhlaq Sidhu. Self driving cars. College of Engineering University of California, Berkeley, Berkeley: College of Engineering University of California, 2013.
[75] Gary Silberg, Richard Wallace, G Matuszak, J Plessers, C Brower, and D Subramanian. Self-driving cars: The next revolution. White paper, KPMG LLP & Center of Automotive Research, 2012.
指導教授 陳奕明(Yi-Ming Chen) 審核日期 2016-8-16
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明