A Study of Securing Ad Hoc Network:Routing Static Information Protection
碩士 === 國立成功大學 === 電腦與通信工程研究所 === 93 === Ad Hoc network is more convenient and cheaper than the networks with infrastructure in the usage and setup. More and more people involve in this research. The authors mainly research in routing protocols. Many routing methods are proposed by them. There are m...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/87874762820027111721 |
id |
ndltd-TW-093NCKU5652012 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-093NCKU56520122017-07-30T04:40:30Z http://ndltd.ncl.edu.tw/handle/87874762820027111721 A Study of Securing Ad Hoc Network:Routing Static Information Protection 無線隨意網路安全之研究:路由靜態資訊的保護 Jing-Hung Chen 陳勁宏 碩士 國立成功大學 電腦與通信工程研究所 93 Ad Hoc network is more convenient and cheaper than the networks with infrastructure in the usage and setup. More and more people involve in this research. The authors mainly research in routing protocols. Many routing methods are proposed by them. There are many problems in considering with security. As to wire network, the router and the terminals are separated. The route also has been protected securely. It can guarantee that the network route is correct. But in Ad Hoc network, nodes act two different roles meanwhile. It is a route and a terminal at the same time. Besides the research in communication security is important, correct route setup becomes a very important subject. We will do the research and simulation to different kinds of route attacks, and then we will design a secure routing protocol. On the based of the characteristics of Ad Hoc network, we have researched into two secure parts, one is the integrality verification of the routing information, and another is the identity authentication of node. Routing information can be divided into two parts, one is the routing static information, and another is the routing dynamic information. Static part is what we want to protect; dynamic part, it will be discuss in J.M Hou’s thesis. We have quoted RFC-3561 AODV route protocol as the example. We proposed two comparatively safe and practical methods. One is ID-Based signature based on pairing, and another is the asymmetric ID-MAC. The latter method besides solves the problems of routing forging, modifying, and identity authentication. It also reduces the large amount operation of signature. Finally we use NS2 to simulation and discuss the whole efficiency. Chi-Sung Laih 賴溪松 2005 學位論文 ; thesis 82 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立成功大學 === 電腦與通信工程研究所 === 93 === Ad Hoc network is more convenient and cheaper than the networks with infrastructure in the usage and setup. More and more people involve in this research. The authors mainly research in routing protocols. Many routing methods are proposed by them. There are many problems in considering with security. As to wire network, the router and the terminals are separated. The route also has been protected securely. It can guarantee that the network route is correct. But in Ad Hoc network, nodes act two different roles meanwhile. It is a route and a terminal at the same time. Besides the research in communication security is important, correct route setup becomes a very important subject. We will do the research and simulation to different kinds of route attacks, and then we will design a secure routing protocol.
On the based of the characteristics of Ad Hoc network, we have researched into two secure parts, one is the integrality verification of the routing information, and another is the identity authentication of node. Routing information can be divided into two parts, one is the routing static information, and another is the routing dynamic information. Static part is what we want to protect; dynamic part, it will be discuss in J.M Hou’s thesis. We have quoted RFC-3561 AODV route protocol as the example. We proposed two comparatively safe and practical methods. One is ID-Based signature based on pairing, and another is the asymmetric ID-MAC. The latter method besides solves the problems of routing forging, modifying, and identity authentication. It also reduces the large amount operation of signature. Finally we use NS2 to simulation and discuss the whole efficiency.
|
author2 |
Chi-Sung Laih |
author_facet |
Chi-Sung Laih Jing-Hung Chen 陳勁宏 |
author |
Jing-Hung Chen 陳勁宏 |
spellingShingle |
Jing-Hung Chen 陳勁宏 A Study of Securing Ad Hoc Network:Routing Static Information Protection |
author_sort |
Jing-Hung Chen |
title |
A Study of Securing Ad Hoc Network:Routing Static Information Protection |
title_short |
A Study of Securing Ad Hoc Network:Routing Static Information Protection |
title_full |
A Study of Securing Ad Hoc Network:Routing Static Information Protection |
title_fullStr |
A Study of Securing Ad Hoc Network:Routing Static Information Protection |
title_full_unstemmed |
A Study of Securing Ad Hoc Network:Routing Static Information Protection |
title_sort |
study of securing ad hoc network:routing static information protection |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/87874762820027111721 |
work_keys_str_mv |
AT jinghungchen astudyofsecuringadhocnetworkroutingstaticinformationprotection AT chénjìnhóng astudyofsecuringadhocnetworkroutingstaticinformationprotection AT jinghungchen wúxiànsuíyìwǎnglùānquánzhīyánjiūlùyóujìngtàizīxùndebǎohù AT chénjìnhóng wúxiànsuíyìwǎnglùānquánzhīyánjiūlùyóujìngtàizīxùndebǎohù AT jinghungchen studyofsecuringadhocnetworkroutingstaticinformationprotection AT chénjìnhóng studyofsecuringadhocnetworkroutingstaticinformationprotection |
_version_ |
1718507868379938816 |