HOME > Detail View

Detail View

(An) anonymous authentication scheme in VANET and A DHT-based ID-LOC separation protocol in SDN

(An) anonymous authentication scheme in VANET and A DHT-based ID-LOC separation protocol in SDN

Material type
학위논문
Personal Author
이찬행
Title Statement
(An) anonymous authentication scheme in VANET and A DHT-based ID-LOC separation protocol in SDN / Chan-haeng Lee
Publication, Distribution, etc
Seoul :   Graduate School, Korea University,   2016  
Physical Medium
xii, 91장 : 삽화 ; 26 cm
기타형태 저록
An Anonymous Authentication Scheme in VANET and A DHT-based ID-LOC Separation Protocol in SDN   (DCOLL211009)000000064927  
학위논문주기
학위논문(박사)-- 고려대학교 대학원 : 컴퓨터학과(정보통신대학), 2016. 2
학과코드
0510   6YD36   297  
General Note
지도교수: 민성기  
Bibliography, Etc. Note
참고문헌: 장 87-91
이용가능한 다른형태자료
PDF 파일로도 이용가능;   Requires PDF file reader(application/pdf)  
비통제주제어
anonymous authentication , VANET , smartcard , id-loc separation , SDN , DHT,,
000 00000nam c2200205 c 4500
001 000045867061
005 20160330143750
007 ta
008 151229s2016 ulka bmAC 000c eng
040 ▼a 211009 ▼c 211009 ▼d 211009
085 0 ▼a 0510 ▼2 KDCP
090 ▼a 0510 ▼b 6YD36 ▼c 297
100 1 ▼a 이찬행
245 1 1 ▼a (An) anonymous authentication scheme in VANET and A DHT-based ID-LOC separation protocol in SDN / ▼d Chan-haeng Lee
260 ▼a Seoul : ▼b Graduate School, Korea University, ▼c 2016
300 ▼a xii, 91장 : ▼b 삽화 ; ▼c 26 cm
500 ▼a 지도교수: 민성기
502 1 ▼a 학위논문(박사)-- ▼b 고려대학교 대학원 : ▼c 컴퓨터학과(정보통신대학), ▼d 2016. 2
504 ▼a 참고문헌: 장 87-91
530 ▼a PDF 파일로도 이용가능; ▼c Requires PDF file reader(application/pdf)
653 ▼a anonymous authentication ▼a VANET ▼a smartcard ▼a id-loc separation ▼a SDN ▼a DHT
776 0 ▼t An Anonymous Authentication Scheme in VANET and A DHT-based ID-LOC Separation Protocol in SDN ▼w (DCOLL211009)000000064927
900 1 0 ▼a Lee, Chan-haeng, ▼e
900 1 0 ▼a 민성기, ▼e 지도교수
900 1 0 ▼a Min, Sung-gi, ▼e 지도교수
945 ▼a KLPA

Electronic Information

No. Title Service
1
(An) anonymous authentication scheme in VANET and A DHT-based ID-LOC separation protocol in SDN (24회 열람)
View PDF Abstract Table of Contents

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Stacks(Thesis)/ Call Number 0510 6YD36 297 Accession No. 123052647 Availability Available Due Date Make a Reservation Service B M

Contents information

Abstract

In the wired and wireless environments, security and privacy are one of the important issues. Especially, it is more important in vehicular networks because the wrong or incorrect message transmission will lead to a serious traffic accident or congestions on the roads. Furthermore, the use of one central Certificate Authority makes the deployment problems and brings network and processing overheads on the central Certificate Authority.
To avoid those situations, a new authentication scheme is needed. The authentication scheme must provide mutual authentication between users, and distribute the role of central Certificate Authority by using trusted regional Certificate Authorities. Since the vehicle users would still not want their personal privacy to be invaded, user anonymity is also provided.
On the other hand, the IP address is used as an identifier as well as a locator to bind a host and applications to their location in current Internet system. However, this binding makes the network to be difficult to support mobility and multihoming. In addition, as the mobile devices are exponentially increased, routing table size of Default Free Zone is also increased, and the addressing is hard to maintain. For the scalable routing and addressing, the host identifier and its locator need to be separated in future
ii
Internet. The efforts for separating ID and LOC from the IP are shown in several mobility related protocols such as Mobile IPv6 and Proxy Mobile IPv6. Recently, several ID-LOC separating protocols are proposed, but they have some limitations. In case of host-based schemes, they require the hosts’ modification for the deployment of the protocol, and it needs central management for the ID-LOC mapping information. The other case, network-based schemes do not need to modify the hosts’ protocol stack, however, they use tunneling to forward packets, and it may wastes much bandwidth.
To solve these problems, we propose two schemes in this thesis. The first scheme is a simple authentication scheme for providing user anonymity and mutual authentication in VANET environments and the second scheme is a network-based identifier and locator separation scheme over Software-Defined Networking.
The first scheme is based on smart cards and one-way hash function. By using our scheme, the number of transmitting messages that need to be authenticated could be minimized, and at the same time, the network overhead could be reduced, through the distribution of CAs.
In the second scheme, we separate the underlying network into Host Identity and IP domains in order to directly forward unroutable identifiers. Host Identity domain includes its own routing strategy based on a distributed hash table algorithm. The proposed scheme directly handles the packets that have host identifiers as its addresses, and converts the host identifiers to the corresponding locators in the network. We compare the differences between the proposed scheme and other existing solutions.

Table of Contents

Chapter 1 Introduction 

1.1 Background
1.2 Problem Statement and Objectives 
1.2.1 Authentication Scheme and User Anonymity 
1.2.2 Identifier - Locator Separation 
1.3 Approaches 
1.3.1 Simple Authentication Scheme for Providing Privacy Support with User Anonymity in VANET 
1.3.2 Network-based ID-LOC Separating Protocol in SDN 
1.4 Organization of This Thesis 

Chapter 2 Related Works

2.1 Authentication & Anonymity in VANET 
2.1.1 Vehicular Networks
2.1.2 Security Threat
2.1.3 Privacy Issues and Anonymity 
2.1.4 Authentication Methods 
2.1.4.1 TPD-based Schemes 
2.1.4.2 Smartcard-based Schemes 
2.1.5 Certificate Authority Problem and the Use of Pseudonym 
2.1.5.1 The needs of Distributed Certificate Authorities 
2.1.5.2 Pseudonym for Privacy and Anonymity 
2.2 Identifier-Locator Separation 
2.2.1 Mobile IPv6 and Proxy Mobile IPv6 
2.2.2 ID-LOC Separation Protocols 
2.2.2.1 Host-based Schemes 
2.2.2.2 Network-based Schemes 
2.3 Software Defined Networking (SDN) 
2.3.1 Definition and Architecture 
2.3.2 OpenFlow Protocol 
2.3.2.1 Main Components 
2.3.2.2 OpenFlow Ports 
2.3.2.3 Flow Table of the OpenFlow Table 
2.3.2.4 Pipeline Processing of OpenFlow Table 
2.3.2.5 Packet Matching
2.4 Distributed Hash Table 
2.4.1 Chord
2.4.2 Pastry
2.4.3 Content Addressable Network (CAN) 
2.4.3.1 CAN Construction
2.4.3.2 Joining the Routing 
2.4.3.3 Zone Maintenance in CAN 

Chapter 3 A Simple Authentication Scheme for Providing Privacy Support with User Anonymity in VANET 

3.1 Introduction
3.2 Requirements
3.3 Authentication Scheme for Providing Privacy Support with User Anonymity
3.3.1 Assumptions
3.3.2 Model Description
3.3.3 Simple Authentication Scheme with User Anonymity 
3.3.3.1 Registration Phase 
3.3.3.2 Log-in and Authentication Phase 
3.3.3.3 Renewal Phase
3.4 Analysis and Discussion
3.4.1 Privacy and Anonymity 
3.4.2 Mutual Authentication 
3.4.3 Certificate Revocation 
3.4.4 Security Analysis
3.5 Performance Comparison 
3.6 Discussion

Chapter 4 A Network-based Host Identifier Locator Separating Protocol in Software-Defined Networks 

4.1 Introduction 
4.2 Network-based Host Identifier - Locator Separating Protocol (NHILS) 
4.2.1 HIT Identifier and Locator 
4.2.2 System Architecture 
4.2.3 Registration 
4.2.4 Data Packet Forwarding 
4.2.5 Route Optimization 
4.3 Comparison 

Chapter 5 Conclusions

New Arrivals Books in Related Fields