博碩士論文查詢聯邦系統首頁 聯絡信箱 關於我們 加入我們

本論文已被瀏覽 57 次, [ 造訪詳細資料與全文 ] 10 次,[ 回到前頁查詢結果 ] [ 重新搜尋 ]

利用變色龍雜湊函數技術實現無線網路之安全機制

Applying Chameleon Hash Function to Implement the Secure Schemes for Wireless Networks

作者:陳政燁
畢業學校:國立中山大學
出版單位:國立中山大學
核准日期:2016-01-13
類型:Electronic Thesis or Dissertation
權限:Copyright information available at source archive--National Sun Yat-sen University....

中文摘要

無線網路的應用非常廣,小到佈建於小區域的無線感測器網路,大至建構於整個城市的車輛隨意網路,前者為物聯網之一環,構成感知層將外界之感測資訊經轉傳之方式送往網路層,後者為智慧運輸系統之主架構,用來溝通整個智慧運輸網路;這些應用都有共同的主題,就是安全與效率。
在無線感測網路中如何建立安全通道將感測資訊轉傳到網路層,及在車輛隨意網路中如何確保傳播資訊完整可靠與隱私保護,都是無線網路中安全應用之重要議題。早期網路安全架構使用傳統之密碼技術達成,但是都有運算及儲存等大量負荷,近年變色龍雜湊函數以運算較為快速、儲存空間較小和及其有單向性、抗碰撞、及抗暗門碰撞之特性,且能與其他密碼技術結合,故成為網路安全應用之熱門技術。
本論文將變色龍雜湊函數運用在感測器網路及車輛隨意網路等無線網路安全技術上,首先利用楕圓曲線技術以雙暗門變色龍雜湊函數建構無線感測網路之允入控制機制,確保感測資訊轉傳之安全; 另以指數運算及單暗門變色龍雜湊函數技術建構車輛隨意網路之匿名驗證機制,確保車輛隨意網路資訊傳播及交換之安全,並保留車輛之隱私,兩項安全機制均有完整之理論架構及運作過程,並經安全及效能分析,確信所提之架構比相關研究更安全更有效。

英文摘要

The scope of wireless network applications is very wide: from wireless sensor networks (WSN) set up in a small area to collect sensing information, which constitute the sensor layer of the Internet of things (IOT), to Vehicular Ad-Hoc Networks (VANET) established in an entire city, which are the framework of Intelligent Transport System (ITS). The aforementioned applications have two themes in common: security and efficiency.
How to set up a secure path to relaying the sensing information from a sensor node to a gather node or a base station is the main issue concerning the security of WSNs. Meanwhile, the ways to ensure a message received is complete and reliable and that anonymity is protected are equally important issues on the subject.
In the early days, internet security was achieved through the use of traditional symmetric encryption, public key encryption, or public key infrastructure techniques, but all of them are subject to severe computation and storage overload. In recent years, due to its one-way, collision resistant and trapdoor collision-resistant properties, and less time and space required in calculations and storage which enable it to implement with various techniques, the chameleon hash functions have gained traction as one of the hottest techniques applied to network security.
In this dissertation, the research starts with the application of the double-trapdoor chameleon hash function to propose an access control scheme for WSNs and implementing it by Elliptic Curve Cryptography (ECC). The proposed access control scheme can set up a secure path to transmitting sensing information. The use of the single-trapdoor hash function and an exponent arithmetic operation to build a secure environment for VANETs. The structure of proposed schemes and the detailed processes are also covered in the paper. Finally, the results of the security analyses and performance evaluations of these proposed schemes show that they are superior to their counterparts in the related field.

 

計畫贊助者: