博碩士論文 108522077 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:22 、訪客IP:3.144.14.41
姓名 古承晏(Cheng-Yan Gu)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 車載異構網路中基於橢圓曲線加密的匿名協作式下載機制之研究
(A Study of Anonymous Cooperative Download Mechanism Based on Elliptic Curve Encryption in Heterogeneous-VANETs)
相關論文
★ 無線行動隨意網路上穩定品質服務路由機制之研究★ 應用多重移動式代理人之網路管理系統
★ 應用移動式代理人之網路協同防衛系統★ 鏈路狀態資訊不確定下QoS路由之研究
★ 以訊務觀察法改善光突發交換技術之路徑建立效能★ 感測網路與競局理論應用於舒適性空調之研究
★ 以搜尋樹為基礎之無線感測網路繞徑演算法★ 基於無線感測網路之行動裝置輕型定位系統
★ 多媒體導覽玩具車★ 以Smart Floor為基礎之導覽玩具車
★ 行動社群網路服務管理系統-應用於發展遲緩兒家庭★ 具位置感知之穿戴式行動廣告系統
★ 調適性車載廣播★ 車載網路上具預警能力之車輛碰撞避免機制
★ 應用於無線車載網路上之合作式交通資訊傳播機制以改善車輛擁塞★ 智慧都市中應用車載網路以改善壅塞之調適性虛擬交通號誌
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 ( 永不開放)
摘要(中) 如何保證車輛之服務下載請求安全性是一項重要的安全議題。為了解決車輛移動性問題,協作式下載方案被提出,透過中繼車輛的輔助下載來降低路邊基礎設施的負載,但是中繼車輛的選擇機制並不明確,且無法支援複數個中繼車輛;再者,車輛的下載請求通常涉及身分與服務內容的隱私,因此需要透過加密手段確保內容安全,但是過於複雜的加解密方案並不適用於車載環境;最後,異質化服務的QoS 需求也必須在佈署暫存內容時一併考慮。
本論文提出 ECDSA-based 的匿名協作式下載機制,藉由 ECDSA 數位簽章及 ECC 加密方案來確保下載請求的安全性。設計適用於車載網路的中繼車輛選舉機制,藉由行車速度、儲存空間及路邊距離來選出合適的中繼車人選,且中繼車輛會不定期重選,以因應時刻改變的車流。同時,車輛下載過程中運用輕量級的ECDSA 數位簽章方案來為下載請求簽章及加密,確保訊息之完整性、隱私性及不可否認性。請求驗證通過後,需要制定服務暫存至中繼車輛的佈署策略,透過 802.11 的規範將服務類別分類,並各別設定下載順序及資料傳送時的優先級別,同時確保延遲敏感類型的服務可優先暫存至鄰近使用者的中繼車輛中,達到服務QoS 規範。
模擬結果顯示,本論文提出的機制能有效提高服務下載效率。經由 ECDSA簽章相較於 RSA 簽章平均的訊息傳輸時間減少約 78.7%,證明該方案是輕量級的;此外,複數台中繼車輛的機制也可滿足大多數車輛下載需求,證明選舉策略的有效性;再加上服務內容的暫存佈署策略,平均可減少23.5%的下載時間,尤其是延遲敏感類型的服務提升更加顯著,平均減少 34.5%下載時間。
摘要(英) It is an important security issue on how to guarantee the security of service download requests from vehicles. In order to solve the problem of vehicle mobility, a cooperative download scheme was proposed, which reduces the load of roadside units through the auxiliary download with proxy vehicles, but the election mechanism of proxy vehicles is not clear and only support single proxy vehicles. Furthermore, the download request of a vehicle usually involves the privacy of identity and service content, so encryption methods are needed to ensure the security and privacy, but overly complex encryption and decryption schemes are not suitable for VANETs environments. Finally, the QoS requirements for heterogeneous services must be considered during deploying temporary content.
This dissertation proposes an ECDSA-based anonymous cooperative download mechanism, which uses ECDSA digital signature and ECC encryption scheme to guarantee the security of download requests. Design a proxy vehicle election mechanism suitable for VANETs. Appropriate candidates for proxy vehicles are elected based on driving speed, storage space and distance between RSU and itself, and proxy vehicles will be re-elected from time to time in response to the changing of traffic flows. Moreover, the lightweight ECDSA digital signature scheme is used to sign and encrypt the download request during the vehicle download process to ensure the integrity, privacy and non-repudiation of the message. After the request is verified, it is necessary to formulate a deployment strategy for temporarily storing the service to the proxy vehicle, classify the service category according to the 802.11 specification, and set the download order and the priority level of data transmission respectively. At the same time, it is ensured that delay-sensitive services can be temporarily stored in the proxy vehicles which closing to users so that can meet the quality of service.
The simulation results show the proposed mechanism can effectively improve the efficiency of service downloads. The average message transmission time of ECDSA signature is reduced by around 78.7% compared with that of RSA, which proves that the solution is lightweight. In addition, the proposed mechanism can support multiple proxy vehicles. The mechanism of multiple proxy vehicles can also meet the download requirements of most vehicles. Coupled with the temporary storage and deployment strategy of service content, the average download time can be reduced by 23.5%, especially on those services which is delay-sensitive, with an average reduction over 34.5%.
關鍵字(中) ★ 車載網路
★ 協作式下載
★ 匿名性
★ ECDSA
★ ECC
★ QoS
關鍵字(英) ★ VANETs
★ cooperative download
★ anonymity
★ ECDSA
★ ECC
★ QoS
論文目次 摘要 i
Abstract ii
誌謝 iv
目錄 v
圖目錄 viii
表目錄 x
第一章 緒論 1
1.1. 概要 1
1.2. 研究動機 2
1.3. 研究目的 3
1.4. 章節架構 3
第二章 背景知識與相關研究 5
2.1. 車載網路與邊緣異構雲 5
2.2. VANETs環境中的安全議題 8
2.3. 數位簽章(Digital Signature) 9
2.3.1. RSA(Rivest-Shamir-Adleman Algorithm) 9
2.3.2. DSA(Digital Signature Algorithm) 10
2.3.3. ECDSA(Elliptic Curve Digital Signature Algorithm) 11
2.4. DSRC(Dedicated Short Range Communication) 12
2.5. 相關研究 13
第三章 研究方法 15
3.1. 情境說明 15
3.2. ENPED模組 16
3.3. ENPED系統流程 18
3.3.1. 系統前提與假設 19
3.3.2. 認證(Authentication) 20
3.3.3. 選舉(Election) 23
3.3.4. 加解密流程(Encryption & Decryption Process) 32
3.3.5. 下載請求(Download Request) 34
3.3.6. 驗證(Verification) 38
3.3.7. 中繼內容暫存(Content Storage) 42
3.4. ENPED場域模擬 47
第四章 實驗與討論 49
4.1. 情境(一):ENPED功能性驗證 49
4.1.1. 實驗一:訊息傳播驗證(Message Dissemination Verification) 49
4.1.2. 實驗二:內容下載驗證(Content Download Verification) 51
4.1.3. 實驗三:地圖建置(Map Building) 52
4.2. 情境(二):ENPED成本與效能分析 54
4.2.1. 實驗四:數位簽章成本分析 55
4.2.2. 實驗五:ENPED傳輸延遲比較 61
4.2.3. 實驗六:車輛密度對於ENPED網路吞吐量之影響 62
4.2.4. 實驗七:車輛密度對於ENPED端對端延遲之影響 63
4.3. 情境(三):ENPED與其他方案之比較 64
4.3.1. 實驗八:下載時間與速率比較 65
第五章 結論與未來研究方向 69
5.1. 結論 69
5.2. 研究限制 70
5.3. 未來研究 70
5.3.1. 攻擊及分解演算法的進步 70
5.3.2. 跨範圍換手演算法 71
5.3.3. 防竄改設備的升級 71
5.3.4. 雙因素驗證方案 71
5.3.5. 多源中繼車下載 72
5.3.6. 儲存設備升級 72
參考文獻 73
參考文獻 [1] Salem, Mohammed A., et al. "QoS categories activeness-aware adaptive EDCA algorithm for dense IoT networks." International Journal of Computer Networks & Communications (IJCNC) Vol 11 (2019).
[2] J. Cui, L. Wei, J. Zhang, Y. Xu, and H. Zhong, “An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks,” IEEE Trans. Intell. Transp. Syst., vol. 20, no. 5, pp. 1621–1632, May 2019
[3] J. Zhang, J. Cui, H. Zhong, Z. Chen, and L. Liu, “PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks,” IEEE Trans. Dependable Secure Comput., early access, Mar. 11, 2019, doi: 10.1109/TDSC. 2019.2904274.
[4] J. B. Kenney, “Dedicated short-range communications (DSRC) standards in the united states,” Proc. IEEE, vol. 99, no. 7, pp. 1162–1182, Jul. 2011.
[5] Dey, Kakan Chandra, et al. "Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network–Performance evaluation." Transportation Research Part C: Emerging Technologies 68 (2016): 168-184.
[6] FHWA DSRC Roadside Unit (RSU) Specifications Document v4.1, October 31, 2016. Accessed on: April 30, 2021. [Online]. Available: http://www.its.dot.gov/research_archives/testbed/PDF/USDOT_RSUSpecification4%200_FInal.pdf
[7] Prompt Cloud, “The Future of Big Data Processing : Edge Computing,” Accessed on: May 30, 2021. [Online]. Available: https://www.promptcloud.com/blog/big-data-processing-edge-computing/
[8] Tong, Liang, Yong Li, and Wei Gao. "A hierarchical edge cloud architecture for mobile computing." IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications. IEEE, 2016.
[9] Pan, Jianli, and James McElhannon. "Future edge cloud and edge computing for internet of things applications." IEEE Internet of Things Journal 5.1 (2017): 439-449.
[10] Ning, Huansheng, et al. "Heterogeneous edge computing open platforms and tools for internet of things." Future Generation Computer Systems 106 (2020): 67-76.
[11] Zhang, Wuyang, et al. "Hetero-edge: Orchestration of real-time vision applications on heterogeneous edge clouds." IEEE INFOCOM 2019-IEEE Conference on Computer Communications. IEEE, 2019.
[12] Zhang, Jin, Qian Zhang, and Weijia Jia. "VC-MAC: A cooperative MAC protocol in vehicular networks." IEEE Transactions on vehicular technology 58.3 (2008): 1561-1571.
[13] Hao, Yong, Jin Tang, and Yu Cheng. "Secure cooperative data downloading in vehicular ad hoc networks." IEEE Journal on Selected Areas in Communications 31.9 (2013): 523-537.
[14] Phull, Nitika, and Parminder Singh. "A Review on Security Issues in VANETs." 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 2019.
[15] FIPS PUB 186-4 “Digital Signature Standard (DSS), ” Information Technology Laboratory National Institute of Standards and Technology, July, 2013. Accessed on: May 30, 2021. [Online]. Available : https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf
[16] Rivest, Ronald L., Adi Shamir, and Leonard Adleman. "A method for obtaining digital signatures and public-key cryptosystems." Communications of the ACM 21.2 (1978): 120-126.
[17] ANDALIB, SAAD, and SAIFUL AZAD. "The RSA algorithm." PRACTICAL CRYPTOGRAPHY (2014): 135.
[18] Weisstein, Eric W. “Fermat′s little theorem.” Accessed on: May 30, 2021. [Online]. Available: https://mathworld. wolfram. com/
[19] Tasche, Dirk. Euler allocation: Theory and practice. Technical Report, 2007.
[20] “RSA public key cryptography mechanism,” Accessed on: May 31, 2021. [Online]. Available : http://mslab.csie.asia.edu.tw/~jackjow/courses/992_InfoSecurity/ppts/IS_RSA.pdf
[21] Kakvi, Saqib A., Eike Kiltz, and Alexander May. "Certifying rsa." International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, 2012.
[22] Chuang, Chih-Chwen, and James George Dunham. "Matrix extensions of the RSA algorithm." Conference on the Theory and Application of Cryptography. Springer, Berlin, Heidelberg, 1990.
[23] “RSA asymmetric encryption algorithm + public key encryption + encryption + digital signature,” Aug, 2011. Accessed on: May 31, 2021. [Online]. Available : https://blog.xuite.net/hellothere/blog/49077338
[24] “Digital Signature AlgorithmWiki,” Accessed on: May 31, 2021. [Online]. Available : https://en.wikipedia.org/wiki/Digital_Signature_Algorithm
[25] “DSA Algo.,” Accessed on: May 31, 2021. [Online]. Available : https://www.itsfun.com.tw/DSA%E6%BC%94%E7%AE%97%E6%B3%95/wiki-9925651-5720841
[26] Koblitz, Neal. "Elliptic curve cryptosystems." Mathematics of computation 48.177 (1987): 203-209.
[27] Johnson, Don, Alfred Menezes, and Scott Vanstone. "The elliptic curve digital signature algorithm (ECDSA)." International journal of information security 1.1 (2001): 36-63.
[28] “Elliptic curve cryptosystem,” Accessed on: May 31, 2021. [Online]. Available : http://security.nknu.edu.tw/textbook/chap6.pdf
[29] NIST Special Publication 800-57 Part 1, “Recommendation for Key Management, ” January, 2016. Accessed on: May 31, 2021. [Online]. Available : https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf
[30] Kenney, John B. "Dedicated short-range communications (DSRC) standards in the United States." Proceedings of the IEEE 99.7 (2011): 1162-1182.
[31] Gonzalez-Martín, Manuel, et al. "Analytical models of the performance of C-V2X mode 4 vehicular communications." IEEE Transactions on Vehicular Technology 68.2 (2018): 1155-1166.
[32] COM, “DSRC/C-V2X standard comparison, ” Accessed on: May 31, 2021. [Online]. Available : https://www.2cm.com.tw/2cm/zh-tw/tech/1BE4026BE9BB4E13814A2832AB76AED8
[33] Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl, “V2X communication protocols,” Accessed on: May 31, 2021. [Online]. Available : https://www.sti-innsbruck.at/sites/default/files/courses/fileadmin/documents/vn-ws0809/11-VN-WAVE.pdf
[34] Lai, Chengzhe, et al. "SIRC: A secure incentive scheme for reliable cooperative downloading in highway VANETs." IEEE Transactions on Intelligent Transportation Systems 18.6 (2016): 1559-1574.
[35] Zhang, Yan, et al. "Secure, Robust and Flexible Cooperative Downloading Scheme for Highway VANETs." IEEE Access (2020).
[36] Cui, Jie, et al. "Edge computing in VANETs-an efficient and privacy-preserving cooperative downloading scheme." IEEE Journal on Selected Areas in Communications 38.6 (2020): 1191-1204.
[37] Luo, Guiyang, et al. "Cooperative vehicular content distribution in edge computing assisted 5G-VANET." China Communications 15.7 (2018): 1-17.
[38] Wen, Xiuxiu, and Peiyun Liu. "A Cooperative Vehicles Selection Method Based on Privacy-Preserving Driving Routes Comparison for Urban Scenarios." 2020 IEEE 5th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA). IEEE, 2020.
[39] US Government Publishing Office Electronic Code of Federal Regulations, 47 CFR Part 90, 2017. Accessed on: May 2, 2021. [Online]. Available: http://www.ecfr.gov/cgi-bin/text-idx?tpl=/ecfrbrowse/Title47/47cfr90_main_02.tpl
[40] Chang, James. "An overview of USDOT connected vehicle roadside unit research activities." (2017).
[41] EN 12795:2002 Dedicated Short-Range Communication (DSRC) – DSRC Data link layer: Medium Access and Logical Link Control (review), 2002. Accessed on: May 10, 2021. [Online]. Available: http://ant.comm.ccu.edu.tw/course/97_ITS/0_Lecture/Ch03_DSRC_WAVE_v3.pdf
[42] FCC 47CFR Part90 Subpart M, 2021. Accessed on: May 10, 2021. [Online]. Available: https://www.fcc.gov/wireless/bureau-divisions/technologies-systems-and-innovation-division/rules-regulations-title-47
[43] Zhang, Chenxi, et al. "RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks." 2008 IEEE international conference on communications. IEEE, 2008.
[44] Godse, Sachin P., and Parikshit N. Mahalle. "A Computational Analysis of ECC Based Novel Authentication Scheme in VANET." International Journal of Electrical & Computer Engineering (2088-8708) 8.6 (2018).
[45] Detailed EDCA mechanism, July 14, 2017. Accessed on: May 15, 2021. [Online]. Available: https://blog.csdn.net/LIN_SHUQING/article/details/75099047
[46] Yen-Chieh Cheng, “Strengthening the quality of communication   IEEE 1609.4 is in full swing,” May 4, 2010. Accessed on: May 15, 2021. [Online]. Available : https://www.2cm.com.tw/2cm/zh-tw/tech/95C0F10245A34D2F98B5BE413BC81FC3
[47] OMNet++ org., “OMNet++ Discrete Event Simulator,” Accessed on: May 7, 2021. [Online]. Available: https://omnetpp.org/
[48] OMNet++ document org., “OMNeT++ Tutorials and Technical Articles, ” Accessed on: May 20, 2021. [Online]. Available: https://docs.omnetpp.org/
[49] “Tutorial of OMNET++ tools – Part 2,” Accessed on: May 15, 2021. [Online]. Available: https://www.itread01.com/content/1548426258.html
[50] SUMO org., “Simulation of Urban Mobility,” Accessed on: May 7, 2021. [Online]. Available: https://www.eclipse.org/sumo/
[51] Rodrigue Tchamna, “Sumo (Simulation of Urban Mobility) Tutorials 1) Manually Creation of Network. 2) From OSM to Network + Random Trips Simulation, 3) From OD to Trips,” March 31, 2018. Accessed on: May 16, 2021. [Online]. Available: https://www.linkedin.com/pulse/sumo-simulation-urban-mobility-tutorial-part-1-manually-tchamna
[52] Veins github, “Veins - The open source vehicular network simulation framework,” Accessed on: May 7, 2021. [Online]. Available: https://github.com/sommer/veins
[53] Veins org., “Veins - The open source vehicular network simulation framework,” Accessed on: May 15, 2021. [Online]. Available: https://veins.car2x.org/
[54] “Veins (vehicle communication simulation framework) introductory tutorial, ” Accessed on: May 15, 2021. [Online]. Available: http://www.cxyzjd.com/article/xiaoxiao123jun/79406654
[55] OpenStreetMap wiki, “OpenStreetMap,” Accessed on: May 15, 2021. [Online]. Available: https://zh.wikipedia.org/wiki/%E9%96%8B%E6%94%BE%E8%A1%97%E5%9C%96
[56] Osm.org., “Open Street Map・Taiwan,” Accessed on: May 15, 2021. [Online]. Available: https://osm.tw/
[57] Crypto++ org., “Crypto++® Library 8.5,” Accessed on: May 15, 2021. [Online]. Available: https://www.cryptopp.com/
[58] Conrad Chung, 2BrightSparks, “An Introduction to FTP, ” Accessed on: May 17, 2021. [Online]. Available: https://www.2brightsparks.com/resources/articles/an-introduction-to-ftp.pdf
[59] Lawrence Abrams, “Introduction to the File Transfer Protocol (FTP),” April 2, 2004. Accessed on: May 17, 2021. [Online]. Available : https://www.bleepingcomputer.com/tutorials/introduction-to-ftp/
[60] SUMO Document, “netconvert tutorial,” Accessed on: May 19, 2021. [Online]. Available : https://sumo.dlr.de/docs/netconvert.html
[61] SUMO Document, “polyconvert tutorial,” Accessed on: May 19, 2021. [Online]. Available : https://sumo.dlr.de/docs/polyconvert.html
[62] Consul, Prem C., and Gaurav C. Jain. "A generalization of the Poisson distribution." Technometrics 15.4 (1973): 791-799.
[63] Busanelli, Stefano, Gianluigi Ferrari, and Roberto Gruppini. "Performance analysis of broadcast protocols in VANETs with Poisson vehicle distribution." 2011 11th International Conference on ITS Telecommunications. IEEE, 2011.
[64] Freeway BUREUA, MOTTC, “Speed limit for major sections of the national highway,” Jan 25, 2017. Accessed on: May 22, 2021. [Online]. Available: https://www.freeway.gov.tw/Publish.aspx?cnid=183&p=6
[65] Rachmawati, Dian, J. T. Tarigan, and A. B. C. Ginting. "A comparative study of Message Digest 5 (MD5) and SHA256 algorithm." Journal of Physics: Conference Series. Vol. 978. No. 1. IOP Publishing, 2018.
[66] Moriarty, Kathleen, et al. "PKCS# 1: RSA cryptography specifications version 2.2." Internet Engineering Task Force, Request for Comments 8017 (2016).
[67] Kerry, Cameron F., and Patrick D. Gallagher. "Digital signature standard (DSS)." FIPS PUB (2013): 186-4.
[68] Bi, Wei, Xiaoyun Jia, and Maolin Zheng. "A secure multiple elliptic curves digital signature algorithm for blockchain." arXiv preprint arXiv:1808.02988 (2018).
[69] Courtois, Nicolas, Guangyan Song, and Ryan Castellucci. "Speed optimizations in Bitcoin key recovery attacks." Tatra Mountains Mathematical Publications-The Journal of Slovak Academy of Sciences 67.1 (2016): 55-68.
[70] Bitcoin-core secp256k1 github, “secp256k1 guthub, ” Accessed on: May 15, 2021. [Online]. Available: https://github.com/bitcoin-core/secp256k1
[71] Fernández-Carames, Tiago M., and Paula Fraga-Lamas. "Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks." IEEE access 8 (2020): 21091-21116.
[72] NIST,.” Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process: NISTIR 8309,” July, 2020. Accessed on: July 20, 2021. [Online]. Available: https://csrc.nist.gov/publications/detail/nistir/8309/final
[73] C.H. Luo, “Comprehensive analysis of FIDO network identity, ” February 5, 2019. Accessed on: June 10, 2021. [Online]. Available: https://www.ithome.com.tw/news/128566
指導教授 周立德(Li-Der Chou) 審核日期 2021-7-28
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明