Responsive image
博碩士論文 etd-0731116-114212 詳細資訊
Title page for etd-0731116-114212
論文名稱
Title
在VANET環境偵測高速公路警報真實性
Detecting the Accuracy of Highway Incident Warnings in VANETs
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
92
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2016-07-25
繳交日期
Date of Submission
2016-09-22
關鍵字
Keywords
警報驗證、異常車輛偵測、VANET、車輛叢集、Beacon
Misbehavior detect, Verify alarm, Car Cluster, Beacon, VANET
統計
Statistics
本論文已被瀏覽 5818 次,被下載 62
The thesis/dissertation has been browsed 5818 times, has been downloaded 62 times.
中文摘要
車載通訊網路(VANET, Vehicular Ad Hoc Network),是利用車輛或道路設施為節點的概念,能讓車與車或車與道路設施之間可以互傳封包。在這基礎下便可以延伸出許多類型之車載系統,行車警報系統便是其中之一,當車輛出現異常情形時,便可以利用行車警報系統機制通知其他車輛。然而,攻擊者可以藉由散發假警報擾亂其他駕駛者,系統也有可能誤發警報的情形。因此,本論文研究駕駛者在高速公路上可能遭遇到的警報情形,制定完善的偵測系統探測行車警報系統的警報真實性,以及在行車警報系統未偵測到該異常車輛時,系統可以輔助偵查。
本研究根據過往文獻針對VANET異常車輛的偵測方式,統整為五大面向,然而,過往的文獻沒有任何一篇可以包含這五大面向。在本研究的系統設計中,即包含這五大面向,使得系統更加完善,攻擊者不易發送假警報擾亂駕駛者。在高速公路的環境中,車輛會發送Beacon資訊,每秒傳送一次車輛的位置等訊息給其他車輛。當接收到事故警報時,偵測系統可以藉由Beacon資訊確認警報真實性。然而,在現實環境中,不一定每輛車皆有車載系統可以傳送Beacon訊息,在過往文獻中,也都假設每輛車皆可發出Beacon資訊,與現實情況不一定相符。因此,本論文主要探究在不同的未發送Beacon資訊的車輛比例下,對於事故車輛的偵測率之影響。
本研究使用車輛叢集的概念,可以減低誤報率,更加確定何者為事故車輛。本研究也與LEAVE演算法相比較,證明本研究誤判率相當低,可以相當準確偵測到事故車輛。
Abstract
VANET, so called Vehicular Ad hoc Network, uses cars as nodes to send packages to other cars or road infrastructure. In this basis, VANET can extend lots of car system, and one of them is car alarm system. When the car have strange behavior, car alarm system can sand alarm messages to other cars. However, attackers can spread fake alarm messages to disturb other drivers. The system might also have alarm mistake. So, this study researches the possible situation in the highway, and formulate the perfect misbehavior detect scheme (MDS) to verify the alarm messages. When car alarm system can’t detect the misbehavior car, our system also can assist the car alarm system.
According to past studies against to detect misbehavior cars, our study integrate them to five dimensions. However, all of the past studies can’t complete contain five dimensions. This study can contain this five dimensions, so that the system can more complete, attackers can’t easily disturb the drivers. In highway, cars can send Beacon messages, which is sent by every second. The Beacon message contains such as car locations, so that the MDS can use the Beacon messages to verify the alarm message. In the real world, not all the cars can send Beacon messages, however, all the past studies assume all the car can send Beacon messages. It may not correct. Our study major for how the rate of not sending Beacon message cars that influences the MDS detection.
This study use “Car Cluster” to reduce false positive rate, and have more confidence to determine the misbehavior car. This study compares with LEAVE algorithm, proving our scheme have lower false positive rate and have high detect rate.
目次 Table of Contents
摘要 i
Abstract ii
第一章 緒論 1
1.1 研究背景 1
1.2 研究動機與目的 7
1.3 論文架構 8
第二章 文獻探討 9
2.1 物聯網簡介 9
2.2 VANET簡介 10
2.3 MDS簡介與五大面向 13
2.4 探討過往文獻的偵測方法 16
2.5 以五大面向探討過往文獻 19
第三章 系統設計 23
3.1 攻擊模式 24
3.2 VANET模擬環境 25
3.3 車輛叢集 31
3.4 系統流程 34
3.5 慢速車輛偵測情形探討 43
第四章 系統評估 46
4.1 評估方式 46
4.2 模擬環境 48
4.3 LEAVE演算法 51
4.4 實驗簡介 52
4.5 實驗一:初探未發送Beacon車輛比率對於偵測率之影響 53
4.6 實驗二:車輛叢集間距對於偵測率之影響 56
4.7 實驗三:車輛速度對偵測率之影響 59
4.8 實驗四:未發送Beacon車輛比率與密度對於偵測率之影響 61
4.9 實驗五:資料傳送範圍對於偵測率之影響 71
4.10 實驗六:車輛比例對於偵測率之影響 73
第五章 結論 75
參考文獻 77
參考文獻 References
[1] Wikipedia.org , ”物聯網”, 2015. [Online]. Available: https://zh.wikipedia.org/wiki/物联网. [Accessed: 7- sep- 2016]
[2] R. G. Engoulou, M. Bellaïche, S. Pierre, and A. Quintero, “VANET security surveys”, Computer Communications, vol. 44, pp. 1-13, May, 2014.
[3] M. N. Mejri, J. Ben-Othman, and M. Hamdi, “Survey on VANET security challenges and possible cryptographic solutions”, Vehicular Communications, vol. 1, pp. 53-66, April, 2014.
[4] A. P. Jadhao, and D. N. Chaudhari, “ A Novel Approach For Security Aware Topological Based Routing Protocol In Vehicular Ad hoc Network”, International Journal of Scientific & Engineering Research, vol. 14, pp. 45-51, June, 2013.
[5] F. D. Cunha, A. Boukerche, L. Villas, A. C. Viana, and A. A. F. Loureiro, “Data Communication in VANETs: A Survey, Challenges and Applications”, INRIA Saclay, INIRA. 2014.
[6] W. Xiong, and D. Liang, “Vehicular Ad Hoc Networks”, Hans Journal of Wireless Communications 无线通信, pp. 22-44, March, 2013.
[7] Utms, “UTMS society of Japan”, 2012, [Online]. Available: http://www.utms.or.jp/english/index.html. [Accessed: 6- May- 2016]
[8] I. Stojmenovic , “Mobile Ad Hoc Networks” in Handbook of Wireless Networks and Mobile Computing, John Wiley & Sons, 2002, ch. 15, sec. 1,pp. 125-126.
[9] S. Khan, and J. L. Mauri, “Detection of Misbehaving Nodes in Vehicular Ad Hoc Network” in Security for Multihop Wireless Networks, CRC Press, 2014, ch. 6, sec. 2, pp. 129.
[10] U. Khan, S. Agrawal, and S. Silakari,” A Detailed Survey on Misbehavior Node Detection Techniques in Vehicular Ad Hoc Networks”, Proceedings of Second International Conference INDIA , 2015, pp. 11-19.
[11] S. Ruj, M. A. Cavenaghi, Z. Huang, A. Nayak, and I. Stojmenovic, “On Data-centric Misbehavior Detection in VANETs”, Vehicular Technology Conference, IEEE, 2011, pp. 1-5.
[12] F. A. Ghaleb, M. A. Razzaque, and A. Zainal, ” Mobility Pattern based Misbehavior Detection in Vehicular Adhoc Networks to Enhance Safety”, International Conference on Connected Vehicles and Expo (ICCVE), IEEE, 2014, pp.894-901.
[13] H. Sedjelamci, T. Bouali, and S. M. Senouci, “Detection and Prevention From Misbehaving Intruders in Vehicular Networks”, in IEEE Global Communications Conference, 2014, pp. 39-44.
[14] Chun-Yan Li, Yi-liang Liu, and Liang-min Wang, “Intrusion detection scheme based on traffic scenarios in vehicular ad hoc networks”, Journal od Shandong University (Engineering Science), Vol. 44, No. 1 ,pp. 29-34.
[15] R. P. Barnwal, and S. K. Ghosh, “Heartbeat message based misbehavior detection scheme for Vehicular Ad-hoc Networks”, in International Conference on Connected Vehicles and Expo (ICCVE), 2012, pp. 29-34.
[16] S. K. Harit, G. Singh, and N. Tyagi, “Fox-Hole Model for Data-centric Misbehavior”, in International Conference on Computer and Communication Technology (ICCCT), 2012, pp. 271-277.
[17] J. Grover, M. S. Gaur, V. Laxmi, and R. K. Tiwari, “Detection of Incorrect Position Information using Speed and Time Span Verification in VANET” in International Conference on Security of Information and Networks, 2012, pp. 53-59.
[18] D. Huang, S. A. Williams, and S. Shere, “Cheater Detection in Vehicular Networks”, in International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, 2012, pp.193-200.
[19] Y. C. Wei, and Y. M. Chen, “An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETs”, in International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, 2012, pp.393-400.
[20] M. Ghosh, A. Varghese, A. Gupta, A. A. Kherani, and S. N. Muthaiah, “Detecting misbehaviors in VANET with integrated root-cause analysis”, Journal Ad Hoc Networks, Elsevier Science ,Vol. 8, 2010, pp. 778-790.
[21] T. H. J. Kim, A. Studer, R. Dubey, X. Zhang, A. Perrig, F. Bai, B. Bellur, and A. Iyer, “VANET Alert Endorsement Using Multi-Source Filters”, ser. 7th ACM International Workshop on Vehicular Internet working, 2010, pp. 51-60.
[22] A. Vulimiri, A. Gupta, P. Roy, S. N. Muthaiah, and A. A. Kherani, “Application of Secondary Information for Misbehavior Detection in VANET”, in International IFIP TC 6 Networking Conference, 2010, pp. 385-396.
[23] M. Ghosh, A. Varghese, A. A. Kherani, and A. Gupta, “Distributed Misbehavior Detection in VANETs”, in IEEE Wireless Communications and Networking Conference (WCNC), 2009, pp. 1-6.
[24] M. Abuelela , and S. Olariu, “Automatic Incident Detection In VANETs: A Bayesian Approach”, in Vehicular Technology Conference, 2009. VTC Spring 2009. IEEE 69th. 2009, pp. 1-5.
[25] M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J. P. Hubaux, “Eviction of Misbehaving and Faulty Nodes in vehicular nodes”, IEEE Journal on Selected Areas in Communications, IEEE, Vol.8, 2007, pp. 1557-1568.
[26] P. Golle, D. Greene, and J. Staddon, “Detecting and Correcting Malicious Data in VANETs”, in ACM international workshop on Vehicular ad hoc networks, 2004, pp.29-37.
[27] Yi-Lin Ye, and Hual-Jen Liu, “Study on Detection of Abnormal Traffic Conditions on Highway”, Journal of Information Technology and Applications, Vol. 6, No. 3, 2012, pp. 92-101.
[28] Wikipidia.org, “ROC曲線”, 2013. [Online]. Available: https://zh.wikipedia.org/wiki/ROC曲线. [Accessed: 14- Jul- 2016]
[29] 國道高速公路局, ”交通安全資訊”, 2010. [Online]. Available: https://www.freeway.gov.tw/Publish.aspx?cnid=516&p=2230. [Accessed: 7- Sep- 2016].
[30] 國道高速公路局, “高速公路局年報(民國96年)”, 2007. [Online]. Available: https://www.freeway.gov.tw/Upload/200804/6.pdf. [Accessed: 16- May- 2016].
[31] 國道高速公路局, “高速公路局年報(民國104年)”, 2015. [Online]. Available:
https://www.freeway.gov.tw/Upload/201605/104高速公路年報-下(第86-128頁)_450426.pdf. [Accessed: 16-May- 2016].
[32] S.Singh, and N.Singh, nghcessed: 16Things(IoT): Security Challenges, Business Opportunities & Reference Architecture for E-commerce”, in 2015 International Conference on Green Computing and Internet of Things, 2015, pp. 1577-1581.
[33] Sujithra, and G.Padmavathi, World Scientific News, vol.41, 2016, pp.232-239
[34] Zhi-Kai Zhang, Cheng Yi Cho, and Shiuh-Pyng Shieh, “Emerging Security Threats and Countermeasures in IoT”, ASIA CCS '15 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ACM New York, NY,2015, pp.1-6.
[35] R. Mahmoud, T. Yousuf, and F. Aloul, “Internet of things (IoT) security: Current status, challenges and prospective measures”, International Journal for Information Security Research (IJISR), vol.5, 2015, pp. 608-616.
[36] Zhi-Kai Zhang, Michael Cheng Yi Cho, Chia-Wei Wang, Chia-Wei Hsu, Chong-Kuan Chen, and Shiuh-Pyng Shieh, “IoT Security: Ongoing Challenges and Research Opportunities”, in IEEE 7th International Conference on Service-Oriented Computing and Applications (SOCA), 2014, pp. 230-234.
[37] T. Xu, J. B. Wendt, and M. Potkonjak, “Security of IoT systems: Design challenges and opportunities”, in IEEE/ACM International Conference on Computer-Aided Design (ICCAD) ,2014, pp.417-423.
[38] Weco.net, “物聯網簡介”, 2012. [Online]. Available: http://sls.weco.net/node/17007. [Accessed: 6- Sep- 2016].
[39] 楊采蓉, “IoT物聯網市場趨勢與最新技術應用”, 2015. [Online]. Available: http://www.digitimes.com.tw/tw/iot/shwnws.asp?cnlid=15&cat=10&cat1=15&id=0000418508_8SM60U7QLPTAMX9X35QE4. [Accessed: 6- Sep- 2016].
[40] Trand Labs, “< IoT 物聯網>五種物聯網上可能的攻擊及防範的方法”, 2015. [Online]. Available: http://blog.trendmicro.com.tw/?p=11690. [Accessed: 7- Sep- 2016].
[41] S. B. Priya, and C. Theebendra, “A Study On Security Challenges In Mobile Ad hoc Networks”, International Journal Of Research In Computer Applications And Robotics, Vol.4, 2016, pp.12-18.
[42] B. Bansal, P. Gupta, and N. Sharma,” Attacks Finding and Prevention Techniques in MANET: A Survey”, International Journal of Wired Communication, Vol.3, 2015, pp. 1-7.
[43] B. Selim, and C. Y. Yeun, “Key Management for the MANET: A Survey”, in International Conference on Information and Communication Technology Research (ICTRC), 2015, pp.326-329.
[44] S. H. Kauser, and P. A. Kumar, ”MANET : Services, Parameters, Applications, Attacks & Challenges ”, International Journal of Scientific Research in Science, Engineering and Technology, Vol.2, 2016, pp.4-9.
[45] S. B. Sharma, and N. Chauhan, “Security issues and their solutions in MANET”, in 1st International Conference on Futuristic trend in Computational Analysis and Knowledge Management, 2015, pp.289-294.
[46] A. Kannammal and S.S. Roy, “Survey on Secure Routing in Mobile Adhoc Networks”, in International Conference on Advances in Human Machine Interaction, 2016.
[47] RF Wireless World,” MANET vs VANET-difference between MANET and VANET”. [Online]. Available: http://www.rfwireless-world.com/Terminology/MANET-vs-VANET.html. [Accessed: 6- Sep- 2016].
[48] Wikipedia, “Mobile ad hoc network”, 2015. [Online]. Available: https://en.wikipedia.org/wiki/Mobile_ad_hoc_network. [Accessed: 6- Sep- 2016]
[49] DLR, “SUMO – Simulation of Urban MObility”. [Online]. Available: http://www.dlr.de/ts/en/desktopdefault.aspx/tabid-9883/16931_read-41000/. [Accessed: 16- Apr- 2016]
[50] DLR wiki,” Definition of Vehicles, Vehicle Types, and Routes”, 2016. [Online]. Available: http://sumo.dlr.de/wiki/Definition_of_Vehicles,_Vehicle_Types,_and_Routes. [Accessed: 16- Apr- 2016]
[51] DLR wiki, “Main Page”, 2016. [Online]. Available: http://sumo.dlr.de/wiki/Main_Page. [Accessed: 16- Apr- 2016]
[52] N. M. Mittal, and S. Choudhary, “Comparative Study of Simulators for Vehicular Ad-hoc Networks (VANETs)”, International Journal of Emerging Technology and Advanced Engineering, vol.4, 2014, pp.528-537.
[53] F. J. Martinez, C. K. Toh, J. C. Cano, C. T. Calafate, and P. Manzoni, “A survey and comparative study of simulators for vehicular ad hoc networks (VANETs)”, Wireless Communications and Mobile Computing, vol.11, 2011, pp. 813-828.
[54] F. Kaisser, C. Gransart, and M. Berbineau, “Simulations of VANET Scenarios with OPNET and SUMO”, Communication Technologies for Vehicles, Vol.7266, 2012, pp.103-112.
[55] 國道高速公路局, “即時資料庫”, 2015. [Online]. Available: http://tisvcloud.freeway.gov.tw. [Accessed: 12- Sep- 2016]
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code