跳到主要內容

簡易檢索 / 詳目顯示

研究生: 黃建勳
Chien-Hsun Huang
論文名稱: 應用社會網路之信任概念於車載網路上存取控制之研究
Trust Relation Based Access Control For Vehicular Ad Hoc Networks
指導教授: 陳奕明
Yi-Ming Chen
口試委員:
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理學系
Department of Information Management
畢業學年度: 98
語文別: 中文
論文頁數: 67
中文關鍵詞: 車載網路信任存取控制安全
外文關鍵詞: Security, VANET, Trust, Access Control
相關次數: 點閱:13下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 車載網路 (Vehicular Ad Hoc Networks,VANET) 是目前正在崛起的新興研究議題,隨之也發展出許多新的應用服務,提升交通運輸效率並增加行車安全。
    VANET需要一種機制來管理快速增加的服務以免資源被浪費或成為攻擊工具,因此本研究從信任的角度出發,依據社會網路 (social network) 及其相關領域探討的「信任」概念以及結合資訊安全領域「存取控制」的原則設計出「以信任關係為基礎的存取控制」 (Trust Relation Based Access Control,TRBAC),希望將社會網路的信任概念應用到VANET中,提供VANET管理其服務的可行方案。
    本研究提出攻擊者散佈假訊息以及失竊車輛協尋兩個情境說明 TRBAC的使用情境。在攻擊者散佈假車禍訊息的使用情境進行模擬實驗,比較 TRBAC 與時間決(Freshest Message)、多數決(Majority Wins)兩種訊息傳播方式, TRBAC 能成功將車禍假訊息的數量抑制,比時間決減少約 60% ,比多數決減少約40% ~ 50%。本研究亦結合TRBAC 與行車記錄器提出新的車輛協尋服務流程,與傳統人力協尋相比在投入人力、資訊蒐集速度與資訊品質方面都具有優勢,可提升尋獲失竊車輛的機會。


    VANET (Vehicular Ad Hoc Networks) is an Emerging research issues, and with it the development of many new applications improve transport efficiency and increase road safety.
    It is necessary for VANET to develop a mechanism which is used to manage the variety of services so that resources could not be wasted or become attack tools. This research intends to use trust concept on VANET. We combine social network trust theory with access control design principle of information security areas and propose Trust Relation Based Access Control (TRBAC). This work defines trust on VANET and provides a scheme to manage the variety of services on VANET.
    This research proposes tow scenarios for TRBAC, attackers spread false information and a new service for searching for stolen vehicles. For scenario 1, attackers spread false message, we compare the TRBAC and other tow modes of transmission messages, Freshest Message and Majority Wins. The results show that TRBAC successfully suppress the number false message than Freshest Message reduced by about 60%, less than Majority Wins about 40% to 50%.
    For scenario 2, this work combines TRBAC with driving recorder and proposes a new service for searching for stolen vehicles. As compared with traditional service of searching for stolen vehicles, the new service is quicker when collecting information and provides good quality of information so that new service will enhance opportunities to find the stolen cars.

    中文摘要 i 英文摘要 ii 圖目錄 vi 表目錄 viii 第一章 緒論 1 1.1 研究背景 1 1.2 研究動機與目的 3 1.3 研究貢獻 5 1.4 章節架構 6 第二章 相關研究 7 2.1 關於信任概念的探討 7 2.2 信任在資訊科技領域的應用 14 2.3 VANET領域信任的相關研究 18 2.4 小結 22 第三章 以信任為基礎之存取控制 24 3.1 對於信任的描述 24 3.2 存取控制原則 27 3.3 以信任為基礎之存取控制 30 第四章 使用情境及分析 39 4.1 使用工具 39 4.2 使用情境1 ─ 抑制假訊息 41 4.3 使用情境2 ─ 失竊車輛協尋 46 4.4 小結 49 第五章 結論與未來研究 51 5.1 研究結論與貢獻 51 5.2 研究限制 52 5.3 未來研究 52 參考文獻 54

    參考文獻
    中文文獻
    [1] 柯志亨團隊,「計算機網路實驗─使用 NS2 模擬多媒體通訊與無線網路」,學貫出版,民國 96 年。
    [2] 周淑美,「車載網路資訊安全應用之探討」,國立東華大學資訊工程所碩士論文,民國 97 年。
    [3] 蔡効謙,「汽車隨意網路上偽造訊息的影響及防禦方法」,國立台灣科技大學資訊管理所碩士論文,民國 96 年。
    [4] 鍾惟欣,「植基於身分安全架構之車載網路設計」,國立東華大學資訊工程所碩士論文,民國96年。
    [5] 葉力齊,「車輛隨意網路模糊傳輸機制加密之研究」,國立台灣師範大學工程教育研究所碩士論文,民國 97 年。
    英文文獻
    [6] A. Jøsang, “An Algebra For Assessing Trust In Certification Chains,” In Proceedings of the Network and Distributed Systems Security , 1999.
    [7] Artz, D., and Gil, Y., “A Survey of Trust in Computer Science and the Semantic Web” Software Engineering and the Semantic Web Vol. 5, No. 2, pp. 58-71, 2007
    [8] Bauer, R.A., “Consumer behavior as risk taking,” Risk taking and information handling in consumer behavior, Boston, MA: Harvard University Press; pp. 23–33, 1967.
    [9] Bigley G. A. and Pearce, J. L., “Straining for Shared Meaning in Organization Science: Problems of Trust and Distrust ,” The Academy of Management Review, Vol. 23, No. 3, pp. 405-421, Jul., 1998.
    [10] Deutsch, M., "Cooperation And Trust: Some Theoretical Notes," In Nebraska Symposium on Motivation, pp. 275-319, 1962.
    [11] Dotzer, F., Fischer, L. and Magiera, P., “VARS: A Vehicle Ad-Hoc Network Reputation System,” Sixth IEEE International Symposium on World of Wireless Mobile and Multimedia Networks, pp. 454 – 456, 2005.
    [12] Gambetta, S. D., “Can we trust trust?” In Gambetta, Diego (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213-237, 2000.
    [13] Gefen, D., Karahanna, E. and Straub D. W., “Trust and TAM in Online Shopping: An Integrated Model ”MIS Quarterly, Vol. 27, No. 1, pp. 51-90, Mar., 2003.
    [14] Gerlach, M., Steglich, S., Arbanowski, S., Wegdam, M. and Teunissen, H., “Trustworthy applications for Vehicular Environments,” IEEE Vehicular Technology Magazine, Vol.1, No.2, pp.9-15, 2006.
    [15] Golbeck, J., “Trust on the World Wide Web: A Survey,” Foundations and Trends in Web Science, Vol. 1, Issue 2, pp.131-197, January 2006.
    [16] Golle, P., Greene, D. and Staddon, J., “Detecting And Correcting Malicious Data In Vanets,” In Proceedings 1st ACM Int’l Workshop on Vehicular Ad Hoc Networks, pp. 29–37, Oct. 2004.
    [17] Grandison, T. and Sloman, M., “A survey of trust in internet applications,” IEEE Communications Surveys and Tutorials, Vol.4, No.4, 2000.
    [18] Heider, F., “Attitudes and cognitive organization.” Journal of Psychology, Vol. 21, pp. 107-112, 1946.
    [19] Hubaux, J.P., Capkun S. and Luo, J., “The Security and Privacy of Smart Vehicles ,” Security & Privacy, IEEE Vol. 2 , Issue 3, pp. 49 - 55, 2004.
    [20] Karnadi, F. K., Mo, Z. H. and Lan., K-C., “Rapid Generation of Realistic Mobility Models for VANET,” IEEE Wireless Communications and Networking Conference, pp. 2506-2511, 2007.
    [21] Krackhardt, D. “The Strength Of Strong Ties,” N. Nohria and R. Eccles (Eds.), Networks and organizations: Structure, form, and action, Harvard Business School Press, 1994.
    [22] Mui, L., Mohtashemi, M. and Halberstadt, A. “A computational model of trust and reputation,” In Proceedings of the 35th International Conference on System Science, pp. 280–287, 2002.
    [23] Olmedilla, D., Rana, O., Matthews, B. and Nejdl, W. “Security And Trust Issues In Semantic Grids,” In Proceedings of the Dagsthul Seminar, Semantic Grid: The Convergence of Technologies, 2005.
    [24] Ostermaier, B., D‥otzer F. and Strassberger M., “Enhancing the Security of Local Danger Warnings in VANETs - A Simulative Analysis of Voting Schemes,” In Proceedings of the The Second International Conference on Availability, Reliability and Security, pp. 422-431, 2007.
    [25] Pai, S., Roosta, T., Wicker, S. and Sastry, S., “Using Social Network Theory Towards Development of Wireless Ad hoc Network Trust,” Networking and Applications Workshops, 2007.
    [26] Papadimitratos, P., Kung, A., Hubaux, J-P. and Kargl, F., “Privacy and Identity Management for Vehicular Communication Systems a Position Paper,” In Proceedings of Workshop on Standards for Privacy in User-Centric Identity Management, 2006.
    [27] Peden, M., Scurfield, R., Sleet, D., Mohan, D., Hyder, A., Jarawan, E. and Mathers, C., “The World Report On Road Traffic Injury Prevention,” Geneva, World Health Organization, 2004.
    [28] Raya, M., Papadimitratos, P., Aad, I., Jungels D. and Hubaux, J.-P., “Eviction Of Misbehaving And Faulty Nodes In Vehicular Networks,” IEEE Journal on Selected Areas in Communications, Vol. 25, No. 8, pp. 1557-1568, 2007.
    [29] Raya, M., Papadimitratos, P., Gligor, V. D. and Hubaux, J-P., “On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks,” IEEE The 27th Conference on Computer Communication, pp. 1238 – 1246, 2008.
    [30] Sandhu, R. S., and Samarati, P., “Access Control Priciples and Practice,” Communications Magazine, IEEE, Vol. 32 , Issue 9 , pp. 40 – 48, 1994.
    [31] Sitkin, B., Burt, R.S. and Camerer, C., "Not So Different After All: A Cross-Discipline View of Trust," The Academy of Management Review, Vol.23, No.3, pp. 393-404, 1998.
    [32] Song, J-H, Wong, V. and Leung, V., "Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks," IEEE International Conference on Communications, pp. 1-6, 2009.
    [33] Sun, J., Zhang C. and Fang, Y., “An Id-Based Framework Achieving Privacy And Non-Repudiation In Vehicular Ad Hoc Networks,” IEEE Military Communications Conference, pp. 1–7, 2007.
    [34] Sun, Y. L., Yu, W., Han, Z. and Liu, K.J.R., “Information theoretic framework of trust modeling and evaluation for ad hoc networks.” IEEE Journal on Selected Areas in Communications, Vol.24, No.2, pp. 305-317, 2006.
    [35] Theodorakopoulos, G. and Baras, J. S., “Trust evaluation in ad-hoc networks,” In Proceedings ACM Workshop Wireless Security, pp. 1–10, Oct. 2004.
    [36] Varadharajan, V., “A Note On Trust-Enhanced Security,” IEEE Security & Privacy, Vol. 7, No. 3, pp. 57-59, 2009.
    [37] Wang, J., Liu, Y., Liu, X. and Zhang, J., “A Trust Propagation Scheme in VANETs,” IEEE Intelligent Vehicles Symposium, pp. 1067-1071, 2009.
    [38] Zand, E.D., “Trust and Managerial Problem Solving,” Administrative Science Quarterly, Vol. 17, pp.229-239, 1972.
    [39] Zhang, C., Lin, X., Lu, R., Ho, H. and Shen, X., “An Efficient Message Authentication Scheme for Vehicular Communications,” IEEE Vehicular Technology, Vol. 57, No.6, pp. 3357-3368, 2008.
    [40] Zucker, L. G., “Production of trust: Institutional sources of economic structure, 1840 to 1920.” In B. M. Staw & L. L. Cummings (Eds.), Research in organizational behavior, Vol.8 pp. 53-112, 1986.
    相關網站
    [41] 行車記錄器實際裝載圖,http://yuann.tw/?p=1602
    [42] 交通部運輸研究所RDS-TM系統,http://e-iot.iot.gov.tw/RDS-TMC_Format.htm
    [43] SUMO, http://sumo.sourceforge.net/
    [44] The Network Simulator – NS-2, http://www.isi.edu/nsnam/ns/

    QR CODE
    :::