§ 瀏覽學位論文書目資料
  
系統識別號 U0002-2108201823134700
DOI 10.6846/TKU.2018.00647
論文名稱(中文) 在隨意行動網路通訊架構下利用拜占庭協議演算法來防禦及偵測女巫攻擊
論文名稱(英文) Defense and Detection of Sybil Attack Using Byzantine Agreement Algorithm in Mobile Ad Hoc Network
第三語言論文名稱
校院名稱 淡江大學
系所名稱(中文) 資訊工程學系碩士班
系所名稱(英文) Department of Computer Science and Information Engineering
外國學位學校名稱
外國學位學院名稱
外國學位研究所名稱
學年度 106
學期 2
出版年 107
研究生(中文) 鄭勝鴻
研究生(英文) Sheng-Hong Cheng
學號 604410273
學位類別 碩士
語言別 繁體中文
第二語言別
口試日期 2018-07-02
論文頁數 52頁
口試委員 指導教授 - 張世豪(jonhenry02@gmail.com)
委員 - 林其誼(chiyilin@gmail.com)
委員 - 夏至賢(chhsia625@gmail.com)
關鍵字(中) 隨意行動網路
女巫攻擊
傳輸安全
NS-3
關鍵字(英) Mobile ad hoc network
Sybil attack
Transport Security
第三語言關鍵字
學科別分類
中文摘要
隨意行動網路 (Mobile Ad-Hoc Network, MANET) 是無線網路的其中一項分支。隨意行動網路具有能快速設置、動態拓樸的節點及缺少如轉接器、無線基地台(Access Point, AP)等基礎設施等特性,這些特性讓隨意行動網路能應用於特定的場景如軍事用途、搜救或緊急行動。基於路由協定,節點互相提供連結資訊並能共同建立完整傳輸路徑。但傳輸安全一直是隨意行動網路中的一項問題,起因於隨意行動網路的特性如連結公開的網路、因此缺少安全防線、去中心化的設置及路由協定中缺乏安全考慮的設計都讓MANET比有線網路更難於管理和抵禦利用這些弱點所形成的攻擊。  
    在本研究中針對隨意行動網路最常見的女巫攻擊(Sybil Attack)來做進一步的研究,女巫攻擊可能造成封包流量改向以及其他延伸影響。我們使用 NS3模擬器來模擬一個基於共識機制的演算法拜占庭將軍問題協議(Byzantine Agreement Algorithm)來解決Sybil attack 對於隨意行動網路的威脅,確保所有原來易遭受竄改的網路節點在傳輸過程中可以保持資料的完整性。目標在沒有網路基礎架構下,仍能保持通訊安全。
英文摘要
The topology of mobile ad hoc networks (MANET) is dynamic, can be quickly configured, and lacks features such as wireless APs and adapters. Due to these benefits, a MANET system is able to be applied to specific situations, such as search and rescue operations, military use or emergency operations. Based on the routing protocol, node connections provide information to each other and can jointly establish a complete transmission path independently. But security is a major issue in MANET systems. Because MANET system are open and perform on a non-centralized infrastructure, they lacks security considerations in routing protocols, which make MANET systems more difficult to secure than wired networks. Attacks are easily exploited by its weaknesses.
    In this study, we conducted further research on the most common Sybil Attack of MANET systems. The common Sybil attack may cause packet flow redirection and other extended effects. We used the simulation environment NS-3 Project to create a consensus-based practical Byzantine Fault Tolerance algorithm to explore solutions to the Sybil attack's threat to free mobile networks. Ensuring that all the original network nodes that are vulnerable to tampering are protected can ensure the integrity of the data during transmission. We must demonstrate in the simulation experiment that this method can have an ideal performance in both network and security performance. The goal is to ensure that the general network has the security of the network form under the infrastructure without being compromised.
第三語言摘要
論文目次
目錄
第一章、	緒論...........................................1
1-1研究背景與動機.......................................1
1-2研究目的.............................................4
1-3論文的組織與架構......................................5
第二章、	文獻探討........................................6
2-1無線隨意網路..........................................6
2-2隨意行動網路安全......................................7
2-2-1安全服務...........................................8
2-2-2網路攻擊...........................................9
2-3女巫攻擊...........................................11
2-3-1攻擊方法.........................................12
2-3-2攻擊型態.........................................13
2-4拜占庭將軍問題......................................14
2-4-1口頭消息OM(M) ...................................15
2-4-2簽名消息SM(M) ...................................18
第三章、	研究方法與步驟................................21
3-1 PBFT算法流程.....................................24
3-1-1預準備(pre-prepare) ............................25
3-1-2準備(prepare) ..................................26
3-1-3確認(commit) ...................................27
第四章、	實驗及結果....................................29
4-1NS3模擬...........................................29
4-2Sybil節點的攻擊方式................................30
4-3防禦機制..........................................31
4-4節點吞吐量比較.....................................32
4-5多個惡意節點實驗...................................33
第五章、	結論..........................................36
參考文獻...............................................37
附錄-英文論文..........................................40

圖目錄
圖一 女巫攻擊的攻擊方法、類型、時間......................12
圖二 女巫攻擊的網路型態.................................13
圖三 OM(1)算法圖.......................................18
圖四 SM(1)算法圖......................................20
圖五 PBFT流程圖.......................................24
圖六 PBFT算法節點的執行流程圖..........................25
圖七 節點模擬設置......................................29
圖八 模擬女巫攻擊.....................................30
圖九 Sybil節點成功串改消息.............................31
圖十 防禦及偵測惡意攻擊.................................32
圖十一 女巫攻擊的吞吐量.................................32
圖十二 使用PBFT機制的吞吐量............................33
圖十三 25個惡意節點存在網路模擬........................34
圖十四 25個惡意節點存在網路模擬........................34
圖十五 惡意節點攻擊成功竄改網路訊息.....................35
參考文獻
[1]Guo Chengyu, "The design and implementation of data transmission module for NS2 simulator,,"Proceedings of the Chung hua university,pp.1-76,February,2010.
[2]Ramanathan, R. and Redi, J., "A Brief Overview of AD Hoc Networks:Challenges And Directions, "Proceedings of the IEEE communication Magazine 50th Anniversary Commemorative Issue, pp. 20-22, May, 2002.
[3]	https://zh.wikipedia.org/wiki/%E9%9A%A8%E5%BB%BA%E5%8D%B3%E9%80%A3%E7%B6%B2%E8%B7%AF
[4]L.Zhou and Z.J. Haas, "Securing ad hoc networks, " Proceedings of the IEEE Network, vol.13,no.6, pp.24-30.1999. 
[5]H.Deng, W. Li, and D. P. Agrawal, "Routing security in wireless ad hoc networks,," Proceedings of the IEEE Communications magazine, vol.40, no.10, pp.70-75. Oct,2002.
[6]Zhang, Y. and Lee, W., "Intrusion Detection in Wireless Ad-Hoc networks," Proceedings of the 6th annual international conference on Mobile computing and networking. ACM, pp. 275-283,2000. 
[7]Sanzgiri, Kimaya, et al. "A secure routing protocol for ad hoc networks." Proceedings of the IEEE International Conference 10th,pp. 78-87.Nov,2002 
[8]Ali Dorri and Seyed Reza Kamel et al., "Security Challenges In Mobile Ad Hoc Networks" Proceedings of the International Journal of Computer Science & Engineering Survey (IJCSES), Vol.6, No.1, February,2015.
[9]Xiuyuan Huang,Zheng ji Li,Guoyou Huang, “ The Security Technology of MANET“ Proceedings of the Asian University Department of Computer and Communication ,2006.
[10]Sharma, Saloni, and Anuj Kumar Gupta. "A Comprehensive Review of Security Issues in Manets." Proceedings of the International Journal of Computer Applications,Vol.69, No.21,pp.32-37, May,2013  
[11]Goyal, Priyanka, et al., "Manet: vulnerabilities, challenges, attacks, application." Proceedings of the International Journal of Computational Engineering & Management, vol.11, pp.32-372,011.
[12]A.MISHRA, R. Jaiswal et al., " A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in Ad hoc Network," Proceedings of the International Conference on Advance Computing Conference 3rd, pp. 499-504. 2013.
[13]M.A. Gorlatova, P. C. Mason, et al., " Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis," Proceedings of the IEEE Military Communications Conference, pp.1-7,2006.
[14]S.Keer and A. Suryavanshi, "To prevent wormhole attacks using wireless protocol in MANET," Proceedings of the IEEE Computer and Communication Technology (ICCCT), pp. 159-163,Sep, 2010. 
[15]Z.A.Khan and M. H. Islam, "Wormhole attack: A new detection technique," Proceedings of the IEEE International Conference Emerging Technologies, pp.1-6 ,Oct ,2012. 
[16]S.Shaw, K. Orea, et al., " Simulation and Performance Analysis of OLSR under Identity Spoofing Attack for Mobile Ad-Hoc Networks," Proceedings of the Springer International Conference on Advances in Communication, Network, and Computing, vol. 142, pp. 308-310, 2011.
[17]B.Kannhavong, H. Nakayama, et al, "A survey of routing attacks in mobile ad hoc networks," Proceedings of the IEEE Security in Wireless Mobile AD Hoc and Sensor Networks, vol. 14,pp. 85-91,2007 
[18]M.Abdelhaq, R. Hassan, et al., "Using Dendritic Cell Algorithm to Detect the Resource Consumption Attack over MANET," Proceedings of the Springer International Conference on Software Engineering and Computer Systems, vol. 181, pp. 429-442, 2011. 
[19]L.Rajeswari, A. Prema, et al., "Enhanced intrusion detection techniques for mobile ad hoc networks," Proceedings of the International Conference on Information and Communication Technology in Electrical Sciences (ICTES), pp.1008-1013,Dec,2007.
[20]J.Soryal and T. Saadawi, "IEEE 802.11 Denial of Service attack detection in MANET," Proceedings of the IEEE Wireless Telecommunications Symposium,pp.1-8,Apr,2012.
[21]A.Hamieh and J. Ben-othman, "Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution," Proceedings of the International Conference on Communications,pp.1-6, 2009
[22]J.Ben-othman and A. Hamieh, "Defending method against jamming attack in wireless ad hoc networks," Proceedings of the IEEE 34th Conference on Local Computer Networks, pp.758-762, 2009
[23]D.Sharma, P. G. Shah, and X. Huang, "Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange," Proceedings of the IEEE International Conference on Network and System Security, pp.588-593,2010.
[24]Douceur J R, "The sybil attack, "Proceedings of the Springer International Workshop on Peer-to-Peer Systems, pp.251-260,2002. 
[25]Davis CR, Fernandez JM, Neville S, et al. "Sybil attacks as a mitigation strategy against the storm botnet, "Proceedings of the IEEE International Conference on Malicious and Unwanted Software,pp. 32-40, Oct,2008.
[26]Newsome J, Shi E, Song D, et al. "The Sybil attack in sensor networks: analysis & defenses, " Processing of the Third International Symposium on Information Processing in Sensor Networks,pp.259-268, Apr.2004
[27]Ankit Gupta,Deepak Sukheja,et al, "Impact of Sybil Attack and Security Threat in Mobile Adhoc Network, " Proceedings of the International Journal of Computer Applications, Vol 124, pp.5-12,Aug. 2015.
[28]Kuan Zhang,Xiaohui Liang, et al., "Sybil Attacks and Their Defenses in the Internet of Things, "Proceedings of the IEEE Internet of Things Journal, Vol. 1,pp.372-383, Oct.2014
[29]Leslie Lamport, Robert Shostak,et al, “The Byzantine Generals Problem,” Proceedings of the ACM Transactions on Programming Languages and Systems, Vol. 4, pp. 382-401,July. 1982. 
[30]Miguel Castro,Microsoft Research,et al, “Practical Byzantine Fault Tolerance and Proactive Recovery,” Proceedings of the ACM Transactions on Computer Systems, Vol. 20, pp. 398–461,Nov.2002.
[31]Miguel Castro and Barbara Liskov,  "Practical Byzantine Fault Tolerance", Proceedings of the Third Symposium on Operating Systems Design and Implementation,pp.1-14, Feb.1999.
論文全文使用權限
校內
校內紙本論文立即公開
同意電子論文全文授權校園內公開
校內電子論文立即公開
校外
同意授權
校外電子論文立即公開

如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信