000 | 00000nam c2200205 c 4500 | |
001 | 000045867061 | |
005 | 20160330143750 | |
007 | ta | |
008 | 151229s2016 ulka bmAC 000c eng | |
040 | ▼a 211009 ▼c 211009 ▼d 211009 | |
085 | 0 | ▼a 0510 ▼2 KDCP |
090 | ▼a 0510 ▼b 6YD36 ▼c 297 | |
100 | 1 | ▼a 이찬행 |
245 | 1 1 | ▼a (An) anonymous authentication scheme in VANET and A DHT-based ID-LOC separation protocol in SDN / ▼d Chan-haeng Lee |
260 | ▼a Seoul : ▼b Graduate School, Korea University, ▼c 2016 | |
300 | ▼a xii, 91장 : ▼b 삽화 ; ▼c 26 cm | |
500 | ▼a 지도교수: 민성기 | |
502 | 1 | ▼a 학위논문(박사)-- ▼b 고려대학교 대학원 : ▼c 컴퓨터학과(정보통신대학), ▼d 2016. 2 |
504 | ▼a 참고문헌: 장 87-91 | |
530 | ▼a PDF 파일로도 이용가능; ▼c Requires PDF file reader(application/pdf) | |
653 | ▼a anonymous authentication ▼a VANET ▼a smartcard ▼a id-loc separation ▼a SDN ▼a DHT | |
776 | 0 | ▼t An Anonymous Authentication Scheme in VANET and A DHT-based ID-LOC Separation Protocol in SDN ▼w (DCOLL211009)000000064927 |
900 | 1 0 | ▼a Lee, Chan-haeng, ▼e 저 |
900 | 1 0 | ▼a 민성기, ▼e 지도교수 |
900 | 1 0 | ▼a Min, Sung-gi, ▼e 지도교수 |
945 | ▼a KLPA |
Electronic Information
No. | Title | Service |
---|---|---|
1 | (An) anonymous authentication scheme in VANET and A DHT-based ID-LOC separation protocol in SDN (24회 열람) |
View PDF Abstract Table of Contents |
Holdings Information
No. | Location | Call Number | Accession No. | Availability | Due Date | Make a Reservation | Service |
---|---|---|---|---|---|---|---|
No. 1 | Location Science & Engineering Library/Stacks(Thesis)/ | Call Number 0510 6YD36 297 | Accession No. 123052647 | Availability Available | Due Date | Make a Reservation | Service |
Contents information
Abstract
In the wired and wireless environments, security and privacy are one of the important issues. Especially, it is more important in vehicular networks because the wrong or incorrect message transmission will lead to a serious traffic accident or congestions on the roads. Furthermore, the use of one central Certificate Authority makes the deployment problems and brings network and processing overheads on the central Certificate Authority. To avoid those situations, a new authentication scheme is needed. The authentication scheme must provide mutual authentication between users, and distribute the role of central Certificate Authority by using trusted regional Certificate Authorities. Since the vehicle users would still not want their personal privacy to be invaded, user anonymity is also provided. On the other hand, the IP address is used as an identifier as well as a locator to bind a host and applications to their location in current Internet system. However, this binding makes the network to be difficult to support mobility and multihoming. In addition, as the mobile devices are exponentially increased, routing table size of Default Free Zone is also increased, and the addressing is hard to maintain. For the scalable routing and addressing, the host identifier and its locator need to be separated in future ii Internet. The efforts for separating ID and LOC from the IP are shown in several mobility related protocols such as Mobile IPv6 and Proxy Mobile IPv6. Recently, several ID-LOC separating protocols are proposed, but they have some limitations. In case of host-based schemes, they require the hosts’ modification for the deployment of the protocol, and it needs central management for the ID-LOC mapping information. The other case, network-based schemes do not need to modify the hosts’ protocol stack, however, they use tunneling to forward packets, and it may wastes much bandwidth. To solve these problems, we propose two schemes in this thesis. The first scheme is a simple authentication scheme for providing user anonymity and mutual authentication in VANET environments and the second scheme is a network-based identifier and locator separation scheme over Software-Defined Networking. The first scheme is based on smart cards and one-way hash function. By using our scheme, the number of transmitting messages that need to be authenticated could be minimized, and at the same time, the network overhead could be reduced, through the distribution of CAs. In the second scheme, we separate the underlying network into Host Identity and IP domains in order to directly forward unroutable identifiers. Host Identity domain includes its own routing strategy based on a distributed hash table algorithm. The proposed scheme directly handles the packets that have host identifiers as its addresses, and converts the host identifiers to the corresponding locators in the network. We compare the differences between the proposed scheme and other existing solutions.
Table of Contents
Chapter 1 Introduction 1.1 Background 1.2 Problem Statement and Objectives 1.2.1 Authentication Scheme and User Anonymity 1.2.2 Identifier - Locator Separation 1.3 Approaches 1.3.1 Simple Authentication Scheme for Providing Privacy Support with User Anonymity in VANET 1.3.2 Network-based ID-LOC Separating Protocol in SDN 1.4 Organization of This Thesis Chapter 2 Related Works 2.1 Authentication & Anonymity in VANET 2.1.1 Vehicular Networks 2.1.2 Security Threat 2.1.3 Privacy Issues and Anonymity 2.1.4 Authentication Methods 2.1.4.1 TPD-based Schemes 2.1.4.2 Smartcard-based Schemes 2.1.5 Certificate Authority Problem and the Use of Pseudonym 2.1.5.1 The needs of Distributed Certificate Authorities 2.1.5.2 Pseudonym for Privacy and Anonymity 2.2 Identifier-Locator Separation 2.2.1 Mobile IPv6 and Proxy Mobile IPv6 2.2.2 ID-LOC Separation Protocols 2.2.2.1 Host-based Schemes 2.2.2.2 Network-based Schemes 2.3 Software Defined Networking (SDN) 2.3.1 Definition and Architecture 2.3.2 OpenFlow Protocol 2.3.2.1 Main Components 2.3.2.2 OpenFlow Ports 2.3.2.3 Flow Table of the OpenFlow Table 2.3.2.4 Pipeline Processing of OpenFlow Table 2.3.2.5 Packet Matching 2.4 Distributed Hash Table 2.4.1 Chord 2.4.2 Pastry 2.4.3 Content Addressable Network (CAN) 2.4.3.1 CAN Construction 2.4.3.2 Joining the Routing 2.4.3.3 Zone Maintenance in CAN Chapter 3 A Simple Authentication Scheme for Providing Privacy Support with User Anonymity in VANET 3.1 Introduction 3.2 Requirements 3.3 Authentication Scheme for Providing Privacy Support with User Anonymity 3.3.1 Assumptions 3.3.2 Model Description 3.3.3 Simple Authentication Scheme with User Anonymity 3.3.3.1 Registration Phase 3.3.3.2 Log-in and Authentication Phase 3.3.3.3 Renewal Phase 3.4 Analysis and Discussion 3.4.1 Privacy and Anonymity 3.4.2 Mutual Authentication 3.4.3 Certificate Revocation 3.4.4 Security Analysis 3.5 Performance Comparison 3.6 Discussion Chapter 4 A Network-based Host Identifier Locator Separating Protocol in Software-Defined Networks 4.1 Introduction 4.2 Network-based Host Identifier - Locator Separating Protocol (NHILS) 4.2.1 HIT Identifier and Locator 4.2.2 System Architecture 4.2.3 Registration 4.2.4 Data Packet Forwarding 4.2.5 Route Optimization 4.3 Comparison Chapter 5 Conclusions