A Study of Securing Ad Hoc Network:Routing Static Information Protection

碩士 === 國立成功大學 === 電腦與通信工程研究所 === 93 ===  Ad Hoc network is more convenient and cheaper than the networks with infrastructure in the usage and setup. More and more people involve in this research. The authors mainly research in routing protocols. Many routing methods are proposed by them. There are m...

Full description

Bibliographic Details
Main Authors: Jing-Hung Chen, 陳勁宏
Other Authors: Chi-Sung Laih
Format: Others
Language:en_US
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/87874762820027111721
id ndltd-TW-093NCKU5652012
record_format oai_dc
spelling ndltd-TW-093NCKU56520122017-07-30T04:40:30Z http://ndltd.ncl.edu.tw/handle/87874762820027111721 A Study of Securing Ad Hoc Network:Routing Static Information Protection 無線隨意網路安全之研究:路由靜態資訊的保護 Jing-Hung Chen 陳勁宏 碩士 國立成功大學 電腦與通信工程研究所 93  Ad Hoc network is more convenient and cheaper than the networks with infrastructure in the usage and setup. More and more people involve in this research. The authors mainly research in routing protocols. Many routing methods are proposed by them. There are many problems in considering with security. As to wire network, the router and the terminals are separated. The route also has been protected securely. It can guarantee that the network route is correct. But in Ad Hoc network, nodes act two different roles meanwhile. It is a route and a terminal at the same time. Besides the research in communication security is important, correct route setup becomes a very important subject. We will do the research and simulation to different kinds of route attacks, and then we will design a secure routing protocol.  On the based of the characteristics of Ad Hoc network, we have researched into two secure parts, one is the integrality verification of the routing information, and another is the identity authentication of node. Routing information can be divided into two parts, one is the routing static information, and another is the routing dynamic information. Static part is what we want to protect; dynamic part, it will be discuss in J.M Hou’s thesis. We have quoted RFC-3561 AODV route protocol as the example. We proposed two comparatively safe and practical methods. One is ID-Based signature based on pairing, and another is the asymmetric ID-MAC. The latter method besides solves the problems of routing forging, modifying, and identity authentication. It also reduces the large amount operation of signature. Finally we use NS2 to simulation and discuss the whole efficiency. Chi-Sung Laih 賴溪松 2005 學位論文 ; thesis 82 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立成功大學 === 電腦與通信工程研究所 === 93 ===  Ad Hoc network is more convenient and cheaper than the networks with infrastructure in the usage and setup. More and more people involve in this research. The authors mainly research in routing protocols. Many routing methods are proposed by them. There are many problems in considering with security. As to wire network, the router and the terminals are separated. The route also has been protected securely. It can guarantee that the network route is correct. But in Ad Hoc network, nodes act two different roles meanwhile. It is a route and a terminal at the same time. Besides the research in communication security is important, correct route setup becomes a very important subject. We will do the research and simulation to different kinds of route attacks, and then we will design a secure routing protocol.  On the based of the characteristics of Ad Hoc network, we have researched into two secure parts, one is the integrality verification of the routing information, and another is the identity authentication of node. Routing information can be divided into two parts, one is the routing static information, and another is the routing dynamic information. Static part is what we want to protect; dynamic part, it will be discuss in J.M Hou’s thesis. We have quoted RFC-3561 AODV route protocol as the example. We proposed two comparatively safe and practical methods. One is ID-Based signature based on pairing, and another is the asymmetric ID-MAC. The latter method besides solves the problems of routing forging, modifying, and identity authentication. It also reduces the large amount operation of signature. Finally we use NS2 to simulation and discuss the whole efficiency.
author2 Chi-Sung Laih
author_facet Chi-Sung Laih
Jing-Hung Chen
陳勁宏
author Jing-Hung Chen
陳勁宏
spellingShingle Jing-Hung Chen
陳勁宏
A Study of Securing Ad Hoc Network:Routing Static Information Protection
author_sort Jing-Hung Chen
title A Study of Securing Ad Hoc Network:Routing Static Information Protection
title_short A Study of Securing Ad Hoc Network:Routing Static Information Protection
title_full A Study of Securing Ad Hoc Network:Routing Static Information Protection
title_fullStr A Study of Securing Ad Hoc Network:Routing Static Information Protection
title_full_unstemmed A Study of Securing Ad Hoc Network:Routing Static Information Protection
title_sort study of securing ad hoc network:routing static information protection
publishDate 2005
url http://ndltd.ncl.edu.tw/handle/87874762820027111721
work_keys_str_mv AT jinghungchen astudyofsecuringadhocnetworkroutingstaticinformationprotection
AT chénjìnhóng astudyofsecuringadhocnetworkroutingstaticinformationprotection
AT jinghungchen wúxiànsuíyìwǎnglùānquánzhīyánjiūlùyóujìngtàizīxùndebǎohù
AT chénjìnhóng wúxiànsuíyìwǎnglùānquánzhīyánjiūlùyóujìngtàizīxùndebǎohù
AT jinghungchen studyofsecuringadhocnetworkroutingstaticinformationprotection
AT chénjìnhóng studyofsecuringadhocnetworkroutingstaticinformationprotection
_version_ 1718507868379938816