English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4205178      Online Users : 515
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://140.128.103.80:8080/handle/310901/24113


    Title: 在無線網路環境中使用Data Connection Core建立安全的傳輸通道
    Other Titles: A Secure Communication over Wireless Environments by Using a Data Connection Core
    Authors: 尉可忠
    Wei,Ko-Chung
    Contributors: 呂芳懌
    Leu,Fang-Yie
    資訊工程學系
    Keywords: 資料聯結核心
    Data Connection Core
    Date: 2012
    Issue Date: 2014-02-19T08:37:44Z (UTC)
    Abstract: 近年來,無線網路如Wi-Fi及3G在世界上已被廣泛的裝備及普遍的使用。人們在現代的無線網路以手持智慧型裝置可以方便地存取網際網路。然而,當人們正享受的使用無線系統時,網路安全是一個關鍵的挑戰,因為無線的訊號,無論是否有被加密,都可能被駭客惡意的截取。在分析及解密後,駭客非法的取得或偷竊訊號內之重要訊息,如信用卡卡號或帳號密碼。目前的網路安全機制是利用SSL及IPsec來保護這些傳遞中的訊息。然而,這兩種安全協定在金鑰交換和加解密的步驟中仍有其缺點。本研究中,我們提出一種安全的通訊系統Wireless Security System with Data Connection Core(簡稱WiSDC),其中有兩種安全構想,包含對稱金鑰交換程序及二維串流加密機制。前者在Data Connection Core(簡稱DCC)中採用隨機變數及關聯金鑰以產生內部金鑰,藉以加強金鑰交換程序的安全等級。在此,DCC是一組在嚴謹的無線系統中使用者登錄相關資料後所創造的隨機亂數,這些隨機亂數在無線系統中只有使用者及AAA伺服器知道。後者,以二維串流加密機制為例,則引用兩種數學運算,包括互斥運算及二進制加法,並使用兩個隨機亂數來加密明文以便有效的保護明文。WiSDC同時採用隨機亂數產生器以反饋的方式產生更複雜的金鑰及加密密文。實驗的結果顯示WiSDC對於無線環境中可以有效地保護傳輸訊息。分析的結果指出WiSDC比SSL及IPsec有更高的安全等級及執行效率。關鍵字 : Wi-Fi,3G,Data Connection Core,內部金鑰,隨機亂數產生器,二維串流加密
    Recently, wireless networks, such as Wi-Fi and 3G, have been widely equipped and popularly used in the world. People holding smart devices can conveniently access the Internet services through modern wireless networks. However, when people are enjoying using wireless systems, network security has been a crucial challenge because wireless messages, encrypted or unencrypted, may be maliciously intercepted by hackers. After analyzing and/or decrypting the messages, hackers can illegally capture or steal important information, such as credit card numbers or usernames/passwords, carried in the messages. Currently, SSL and IPsec are utilized to protect the delivery of these types of information. However, each of the two security protocols has its own drawbacks both in their key exchange and message encryption/decryption processes. To solve these drawbacks, in this paper, we propose a secure communication system, named the Wireless Security System with Data Connection Core (WiSDC for short), which consists of two security schemes, including a symmetric key exchange process and a two-dimensional stream cipher mechanism. The former employs random numbers and the connection keys contained in the Data Connection Core (the DCC for short) to generate internal keys, through which the security level of the key exchange process can be enhanced. Here, the DCC is a set of random numbers created when the underlying user registers himself/herself with the wireless system being considered, and the random numbers are only known to the user and AAA server of the wireless system. The latter, i.e., the two-dimensional stream cipher mechanism, invokes two operators, including exclusive-or ? and binary adder +2 operators, and two Pseudo Random Number Sequences (PRNSs) to encrypt plaintext so as to well protect the plaintext. The WiSDC also adopts a pseudo random number generator, which feeds back keys generated in current stage as a part of the inputs of the next stage, to produce more complicated keys for data encryption. Experimental results show that the WiSDC can effectively protect transmitted messages for wireless environments. The analytical results indicate that the WiSDC has higher security level and execution efficiency than those of the SSL and IPsec.Keywords:Wi-Fi, 3G, Data Connection Core, Internal Key, Pseudo Random Number Generator, Two-dimensional Stream Cipher
    Appears in Collections:[資訊工程學系所] 碩士論文

    Files in This Item:

    File SizeFormat
    101THU00394005-001.pdf781KbAdobe PDF63View/Open


    All items in THUIR are protected by copyright, with all rights reserved.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback