Please use this identifier to cite or link to this item:
http://hdl.handle.net/11455/19505
標題: | 公眾無線網路服務之存取機制設計 Two Access Mechanisms for Public Wireless Internet Service |
作者: | 林志強 Lin, Chih-Chiang |
關鍵字: | Roaming;漫遊;WLAN;Fairness;Billing;anonymity;無線網路;公平性;帳單;匿名性 | 出版社: | 資訊科學與工程學系所 | 引用: | [1]. Ameen Ahmad, Roger Chandler, Abhay A. Dharmadhikari, Uttam Sengupta, "SIM based WLAN authentications for open platforms", Technology at Intel Magazine, August 2003 [2]. Khalid Al-Tawil, Ali Akrami, "A new authentication protocol for roaming users in GSM networks", Proceedings IEEE International Symposium on Computers and Communications, pp.93 – 99, July 1999 [3]. Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl, "Wireless Hotspots: Current Challenges and Future Directions", Mobile Networks and Applications, Volume 10, Issue 3, pp. 265-274, June 2005 [4]. M. Burnside, D. Clarke, T. Mills, A. Maywah, S. Devadas, R. Rivest, "Proxy-based Security Protocols in Networked Mobile Devices", Proceedings of the 2002 ACM Symposium of Applied computing, pp. 265-272, 2002 [5]. D. Chaum, "Blind Signature for untraceable payment", Proceeding of Advances in Cryptology-Cypto''82 , pp. 199-203, 1982 [6]. Raphael C.-W. Phan, "Security Limitations of an Authorized Anonymous ID-Based Scheme for Mobile Communication", IEEE Communication Magazine, Volume 43, Issue 5, pp. 149-153, May 2005 [7]. Ronald Cramer, Victor Shouper, "Signature schemes based on the strong RSA assumption", ACM Transactions on Information and System Security., Volume 3 , Issue 3 , pp. 161 - 185 , August 2000 [8]. Yu-Yi Chen, Jinn-Ke Jan, Chin-Ling Chen, "A Fair and Secure Mobile Billing System", Computer Networks, Volume 48, Issue 4, pp. 517-524, 15 July 2005 [9]. Taher ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory, Volume31, Issue 4, pp. 469-472, July 1985 [10]. Constantioins F. Grecas, Sotirios I. Maniatis, Iadovos S. Venieris, "Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration", Mobile Networks and Applications, Volume 8, Issue 2, pp. 145-150, April 2003 [11]. Michael G. Reed, Paul F. Syverson, David M. Goldschlag, "Anonymous Connections and Onion Routing", IEEE Journal on Selected Areas in Communications, Volume 16, Issue 4, pp. 482-494, May 1998 [12]. L. Harm, Y. Xu, "Design of generalized ElGamal type signature based on discrete logarithm", Electronics Letters , Volume 30, Issue 24, pp. 2025-2026, 24 Nov 1994 [13]. Thomas F Johnston, "Security issues in a satellite global GSM network", Information Security Technical Report, Volume 4, Issue 1, pp. 42-52, 1999 [14]. Charlie Kaufman, Radia Perlman, Mike Speciner, "Network Security: Private Communication in a Public World", 2nd ed., Prentice-Hall Series In Computer Networking And Distributed Systems archive, pp. 504, 1995 [15]. H. Krawxzyk, M. Bellare, R. Canetti, "HMAC: keyed-hashing for Message Authentication," IETF REC 2104, Feb. 1997 [16]. Byung-Gil Lee, Hyun-gon Kim, Sung-Won Sohn, Kil-Houm Park, "Concatenated wireless roaming security association and authentication protocol using ID-based cryptography", The 57th IEEE Semiannual, Vehicular Technology Conference, Volume 3, pp. 1507 - 1511, April 2003 [17]. Hung-Yu Lin, "Security and authentication in PCS", Computers & Electrical Engineering, Volume 25, Issue 4, pp. 225-248, July 1999 [18]. Yi-Bing Lin, Yuan-Kai Chen, "Reducing authentication signaling traffic in third-generation mobile network", IEEE Transactions. Wireless Communications, Volume 2, Issue 3, pp. 493-501, May 2003 [19]. Asha Mehrotra, Leonard S. Golding, "Mobility and security management in the GSM system and some proposed future improvements", Proceedings of the IEEE, Volume 86, Issue 7, pp. 1480-1497, July 1998 [20]. Hassnaa Moustafa, Gilles Bourdon, Yvon Gourhant, "Authentication, Authorization and Accounting (AAA) in Hybrid Ad hoc Hotspot’s Environments", Proceedings of the 4th ACM international workshop on Wireless mobile applications and service on WLAN hotspots, pp. 37-46, 2006 [21]. Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuki, Randy H. Katz, "Secure Authentication System for Public WLAN Roaming", Proceedings of the 1st ACM international workgroup on Wireless mobile applications and service on WLAN hotspots”, pp. 113-121, 2003 [22]. K. Nyberg, R.A. Rueppel, "Message recovery for signature schemes based on the discrete logarithm problem", EUROCRYPT’94, LNCS 950, Springer-Verlag, pp. 182-193, May 1994 [23]. Hsia-Hung Ou, Min-Shiang Hwang, Jinn-Ke Jan, "A simple mobile communication billing system among charged parties", Applied Mathematics and Computation, Volume 192, Issue 2, pp. 487-495, 15 September 2007 [24]. Bhrat Patel, Jon Crowcroft, "Ticket based service access for the mobile user", Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking, pp. 223-233, 1997 [25]. Zuhua Shao, "Efficient deniable authentication protocol based on generalized ElGamal signature scheme", Computer Standards and Interfaces, Volume 26, Issue 5, pp. 449-454, September, 2004 [26]. Jack Verhoosel, Roel Stap, Alfons Salden, "A Generic Business Model for WLAN Hotspots – a Roaming Business Case in the Netherlands", Proceeding of the 1st ACM international workshop on Wireless Mobile Applications and Services on WLAN Hotspots archive, pp. 85-92, 2003 [27]. Mark Weiser, "Some Computer Science Issues in Ubiquitous computing", ACM SIGMOBILE Mobile Computing and Communications, Volume 3, Issue 3, PP. 12, 1999 [28]. Hua Wang, Jinli Cao, Yanchuan Zhang, "Ticket-based service access scheme for mobile users", Proceedings of the twenty-fifth Australasian conference on Computer Science, Volume 4, pp. 285-292, January 2002 [29]. Christos Xenakis, Lazaros Merakos, "Security in third Generation Mobile Networks", Computer Communications, Volume 27, Issue 7, pp. 638-650, 1 May 2004 [30]. Jianying Zhou, Kwok Lam, "Undeniable billing in mobile communication", Proceedings of the 4th annual ACM/IEEE international conference on mobile computing and networking, pp. 284-290, October 1998 [31]. Yanchao Zhang, Yuguang Fang, "A secure authentication and billing architecture for wireless mesh networks", Wireless Networks, Volume 13, Issue 5, pp. 663-678, October 2007 [32]. 3GPP TS 21.102, 3rd Generation Partnership Project (3GPP); Technical Specification Group (TSG) SA; 3G Security; Security Architecture, version 4.2.0, Release 4, 2001 [33]. European Telecommunications Standards Institute (ETSI), "GSM 2.09: Security aspects", June 1993 [34]. 林建興, 周斌妤, "民眾使用公眾無線區域網路上網行為之研究",國立中山大學公共事務管理研究所碩士論文, 2005 [35]. 英國倫敦;無線網路計劃 ; http://www.cityoflondon.gov.uk/Corporation/media_centre/files2006/wifi.htm [36]. 舊金山;無線網路計劃 ; http://www.sfgov.org/site/tech_connect_page.asp?id=38562 [37]. 加拿大;無線網路計劃 ; http://www.gov.sk.ca/news?newsId=71f283b3-f8f8-44c4-b0d6-693921262e29 [38]. 安源通訊; WIFLY ; http://www.wifly.com.tw/Wifly6/tw [39]. 新加坡政府;Wireless@SG無線網路 ; http://www.ida.gov.sg/home/index.aspx [40]. 台北市政府;無線網路新都 ;http://wlan.taipei-elife.net/wlanplan.html [41]. 高雄市政府;無線網路共用平台; https://www.kcgwlan.nat.gov.tw/Account/Desktop/Register.aspx [42]. 麥當勞速食餐廳; http://www.mcdonalds.com.tw/ [43]. 美國西雅圖; 無線網路計劃;http://www.seattle.gov/html/citizen/wifi.htm [44]. 香港政府;GovWiFi;http://www.gov.hk/tc/theme/wifi/program/index.htm [45]. 新加坡政府;Wireless@SG ; http://www.ida.gov.sg/Programmes/20061027174147.aspx?getPagetype=36 [46]. 淡水;無線幸福城; http://publish.tpc.gov.tw/post/action/2004tamsui_net/page_03.htm [47]. 經濟部工業局;無線寬頻網路應用服務;http://www.moeaidb.gov.tw/portal.html [48]. 中華電信;WLAN無線上網;http://wlan.hinet.net/ [49]. 資策會; How Many;http://www.find.org.tw/0105/howmany/index.asp [50]. 中國報告大廳;無線費城計劃; http://big5.chinabgao.com/gate/big5/www.chinabgao.com/freereports/19515.htm | 摘要: | 因應資訊全球化、企業M化的發展趨勢,無線網路的建置已成為一項不可或缺的重要基礎建設,現今也有許多即時的服務,例如行動交易、交通資訊、行動娛樂等,都是應用在無線網路的環境之中,使人們在悠遊的連網環境中可以獲得想要的資訊,確實提供相當程度之便利性。因此本文分別在兩種不同性質之無線網路系統上作研究與探討,其一是有關於無線網路計費系統的公平性,其二是有關於可保障用戶使用隱私之免費城市無線網路運作模式的研究與探討。 在現實的無線網路環境之中,使用者使用無線網路的時間往往是網路服務商單方面認定,而且業者之間亦無跨網漫遊服務,使用者使用無線網路的時候會有許多使用不方便或者不公平的地方。因此本文提出一個公平及安全的無線網路計費系統。在我們的機制中,使用者註冊的個人資訊,不會因為漫遊而讓他人得知,達到漫遊時使用者匿名的目的。同時帳單也應該是客觀的,網路服務商和使用者雙方面都必須接受的,也就是帳單不應該只有網路服務商單方面認定,使用者也必須參與其中,達到計費公平的目的。 「無線城市」是目前全球各先進城市的重要發展趨勢與競爭指標。不過,由於建設所需的預算編列因素及為維持後續營運的利潤問題,影響到免費無線網路的運作,形成對人們對無線網路城市的遠景大打折扣。因此本論文提出一個具有保障使用隱私之免費城市無線網路運作模式,在這個運作模式之下,市民可以免費的使用無線網路、政府無須出資,無線網路業者有錢賺的境界,本文具有用戶匿名性、不可追蹤、以及不可偽造等功能。 Two access mechanisms for public wireless internet service are discussed in this paper, one is a fair and secure WLAN billing system, another is free metropolitan area network service with privacy protection. Nowadays, wireless network technology is booming and becoming popular. It's more convenient for people to access information anytime and anywhere. In this paper, a fair and secure WLAN billing system is proposed. Each billing record is confirmed and verified immediately by user and service provider. User will not doubt the billing correctness. Moreover, user's privacy is also considered. The concern of user's privacy is particularly signified in roaming network, user should keep anonymous to service provider, this scheme meets requirement of anonymity, fairness, non-repudiation, and non-forging. The second topic, wireless city is the important development trend and competition indicator for major city at present. However, because of the budget and profit question may influence free wireless network operation. This paper, we also propose a new model of wireless metropolitan area network service with free use and privacy protection. This scheme, profit-making comes from advertisement impression by forcing user to browse advertisements before using network service, and still guarantee that user identity is anonymous, non-traceable and non-forgeable. |
URI: | http://hdl.handle.net/11455/19505 | 其他識別: | U0005-0507200818045200 |
Appears in Collections: | 資訊科學與工程學系所 |
Show full item record
TAIR Related Article
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.