• 沒有找到結果。

5.1 總結

本論文提出一個兼具穩定性與安全性的 IA 隨意網路分群架構,其貢獻主要 包含了安全性、穩定性與方便性三方面。其安全性貢獻如下:

(1) 利用 WPS Root Server 的設計和節點初始註冊動作,確保惡意/非法節點無 法輕易偽裝成拓墣建立前的初始合法節點,以在分群隨意拓墣成型前混入網 路中。

(2) 分群時節點間相互產生的 Diffie-Hellman session key 使惡意/非法節點無 法偽造身分加入群集、或非法創立群集。

(3) HMAC 和 Timestamp 的設計確保各類封包的認證、時效性與完整性 (4) 導入 WPS 註冊程序確保 IA 節點註冊時 Credential 發放的隱密性

穩定性的貢獻則下所述:

(1) 分群式隨意拓墣架構符合 IA 設備能力不對等的情境,讓能力較強的適當節 點擔任群集領導者(Leader Node),並管理附近的節點,此乃較有效率的作 法。

(2) Seed Leader Node 機制設計既符合 IA 的特性,又能保證 Leader Node 電供 給,保證隨意拓墣部分群集的永續運作。

(3) IAdNCA 演算法考量到距離、節點剩餘電能、Degree 等因素,選擇出來 的 Leader Node 所組成的拓墣可延長運作時間,增加拓墣壽命。

(4) Strong Gateway Node 評斷機制強化跨群集通訊的穩定性,降低群集被孤立 的可能性。

65

最後,方便性的貢獻為導入 WPS 註冊流程,令不具備良好 UI 的 IA 設備,能以幾 乎自動的方式加入拓墣網路並得到 Credential,讓使用者在 IA 設定上的困難降 到最低。

雖然本論文提出之分群架構具有以上貢獻,卻仍有限制及待改進之處,列舉 如下:

(1) 礙於 IA 設備的效能考量,Initial Phase 中 WPS 註冊程序所發配給初始合 法節點之 Credential 內含相同的對稱式金鑰(g_session_key, secret),而 非安全性更強的非對稱金鑰組合。因此,Authentication 步驟執行上 的安全性將會降低。

66

參考文獻

[1] A.D. Amis, R.Prakash, T.H.P. Vuong, D.T. Huynh, “Max-Min D-Cluster Formation in Wireless Ad Hoc Networks”, in Proceedings of IEEE INFOCOM , pp. 32-41, 2000.

[2] A.Pirhonen , H. Isomäki , C. Roast, P. Saariluoma, “Future Interaction Design”

Springer. pp. 129, 2008.

[3] B. David, T. Phil, T. Susan, “Designing Interactive Systems: People, Activities, Contexts, Technologies”, Addison-Wesley, 2005.

[4] C.H. Huang, “Cluster-Based Routing with Backup Route in Wireless Ad Hoc Networks”, Master Thesis, Department of Electrical Engineering, National Sun Yat-Sen University, 2006.

[5] C.H. Leon Lee, W.S. Tseng, C.M. Chen, A. Liu, S.M. Huang, H.B. Huang,

“Designing an Intelligent Agent for Information Appliances”, Journal of Computers , Vol.18, pp.61-70, 2007.

[6] C.R. Lin, M. Gerla, “Adaptive clustering for mobile wireless networks,” IEEE J.

Select. Areas Commun., pp. 1265-1275, 1997.

[7] C.R. Lin, M.Gerla, “Adaptive clustering for mobile wireless networks,” IEEE J.

Select. Areas Commun., pp. 1265-1275, 1997.

[8] C.W. Tseng , “Algorithms for the Tree-based Home Network Design Problem”, Master Thesis, Institute of Information Management, National Chiao Tung University, 2008.

[9] C.W. Wang, “A Study on Stable Clustering for Mobile Ad Hoc Networks”, Master Thesis, Department of Electrical Engineering, National Yunlin University of Science and Technology, 2002.

[10] C.Y. Lee, “A Novel Authentication Protocol for Ad Hoc Networks”, Master

67

Thesis, Institute of Information Management, National Chiao Tung University, 2005.

[11] D.C. Su, S.F. Hwang, C.R. Dow, Y. W. Wang, “An efficient k-hop clustering routing scheme for ad-hoc wireless networks”, Journal of the Internet Technology, Vol.3, No.2, Apr. 2002, pp.139-146, 2002.

[12] Directorate-General of Budget, Accounting and Statistic, Executive Yuan, ROC (Taiwan), http://www.dgbas.gov.tw

[13] Gainspan, http://www.gainspan.com/

[14] H. Luo, S. Lu, “Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks.” Technical Report TR-200030, Dept. of Computer Science, UCLA, 2000

[15] H.C. Ke, “A Double-Manager K-hop Clustering Algorithm in Mobile Ad Hoc Networks”, CIT The Fourth International Conference on Computer and Information Technology, 2004.

[16] Institute for Information Industry Market Intelligence Center, Industry &

Technology Intelligence Service Report, 2000

[17] J. Kong, P. Zerfos, H. Luo, S. Lu, L. Zhang, “Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks”, IEEE 9th International Conference on Network Protocols (ICNP'01), 2001

[18] L. Venkatraman, D. Agrawal, “A novel authentication scheme networks” in IEEE Wireless Communications and Networking Conference (WCNC 2000), vol. 3, pp.

1268--1273, 2000.

[19] M. Chatterjee, S.K. Das, D. Turgut, “An On-Demand Weighted Clustering Algorithm (WCA) for Ad hoc Networks”, Global Telecommunications Conference, 2000.

[20] M. Gerla, J. Tsai, “Multicluster, mobile, multimedia radio network”,

68

ACM/Baltzer Journal of Wireless Networks, vol. 1, pp. 225-238, 1995.

[21] T.J. Ross, J.L. Hill, M.Y. Chen, A.D. Joseph, D.E. Culler, E.A. Brewer, “A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices”, Third IEEE Workshop on Mobile Computing Systems and Applications, pp.171-182, 2000.

[22] V. Varadharajan, R. Shankaran, M. Hitchens. “Security for cluster based ad hoc networks.” Computer Communications, vol. 27, pp.488-501, 2004

[23] Wi-Fi Alliance, “Wi-Fi Protected Setup Specification”, version 1.0h, 2006.

[24] X. Chen, H.Y. Tang, W.J. Chen, S.L. Tu, Z.L. Chen, “Energy-based Multi-hop Clustering Algorithm for WSN”, Computer Engineering, Vol. 34, 2008

[25] Y.G. Sun, X.G. Wu, Y. Liu, “Cluster Header Algorithm for Wireless Sensor Network”, Computer Engineering, Vol. 34, 2008

[26] Y.H. Chien , “Locality-Based Trust Group Authentication Services in Mobile Ad Hoc Networks”, Master Thesis, Department of Computer Science and Information Engineering, National Taiwan University, 2007.

[27] Y.Y. Su, S.F. Hwang, C.R. Dow, “A Cluster-Based Routing Algorithm in Ad Hoc Networks with Unidirectional Links”, Master Thesis, Department of Information Engineering and Computer science, Feng Chia University, 2002.

[28] Z. Fan, H. Zhou, “A Distributed Weight-based Clustering Algorithm for WSNs”, WiCOM International Conference on Wireless Communications, Networking and Mobile Computing, 2006.

[29] Z.J. Haas, “A new routing protocol for the reconfigurable wireless networks”, Proceedings of IEEE ICUPC’97, pp.562-566, 1997.

相關文件