簡易檢索 / 詳目顯示

研究生: 黎柏琦
Po-Chi Li
論文名稱: 一種針對無線感測網路的輕量安全資料整合協定
A Lightweight Secure Data Aggregation Protocol for Wireless Sensor Networks
指導教授: 孫宏民
Hung-Min Sun
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2007
畢業學年度: 96
語文別: 英文
論文頁數: 65
中文關鍵詞: 無線感測網路資料整合攻擊安全性
外文關鍵詞: wireless sensor networks, data aggregation, attacks, security
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 無線感測網路如今已經廣泛的被應用在各種領域,然而無線感測節點的運算能力、記憶空間以及能源等都是有限的。此外,由於無線感測節點在資料傳輸所消耗的能源遠大於計算所消耗的部份,因此為了減少能源的消耗,無線感測節點常以計算來取代傳輸,而透過資料的整合則能達到減少傳輸量,但資料整合常帶來一些副作用以及遭受一些攻擊。
    首先,資料整合是透過利用較少的資料量去表示大量的資料內容,因此經過整合的資料僅能表現出一些結果,而無法得知原始資料的相關特性,例如無法藉由運算的最終結果來得知原始資料的分布情況。換言之,使用者無法透過已經整合的資料還原原始資料,而進行更進ㄧ步的分析。
    無線感測網路中的中間節點能夠在他們進行資料整合之時針對傳輸的資料進行竄改或者丟棄。這些遭受竄改或丟棄的資料可能導致最終結果的偏差,進而導致使用者做出錯誤的決定。因此保護資料避免攻擊者的篡改是一件非常重要的事。然而,大部分的資料整合協定無法同時達成資料篡改以及丟棄等攻擊的偵測或抵擋。
    本篇提出一種輕量安全的資料整合協定以解決以上所提到的問題,同時也提出了詳細的安全性分析以驗證本篇架構的安全,最終並依據安全性、記憶空間量、計算量、通訊量以及應用環境將本篇架構與之前其他的方法進行比較。


    Wireless sensor networks are widely utilized in many areas nowadays. Sensor nodes have limited computation ability, memory and energy and so on. In addition, the energy consumption of communication is much more than computation for wireless sensor nodes. For the reason, data aggregation is a widely used technique in wireless sensor networks to reduce communication cost. Nevertheless, data aggregation brings some side effects and suffers from some attacks.
    Firstly, data aggregation exploits fewer messages to represent a great deal sensing readings. Therefore, the aggregated values just present some results. Nevertheless, the base station is unable to be aware of the distribution of these original sensing values. In other words, the base station can not recover to original messages from aggregated value to perform further analysis.
    Secondly, in wireless sensor networks, internal nodes are able to alter messages when it aggregates receiving messages. The altered messages will result in a deviation of final result. Consequently, the false result could cause a wrong decision. Hence, it is significant to protect these messages from an attacker altering them when internal nodes aggregate these data. However, less of them can indeed guarantee data integrity and resist dropping attack and so on. An attacker can simply forge data to affect the decision of base station by compromised nodes.
    This thesis, therefore, proposes a lightweight secure data aggregation protocol to solve above side effects and attack models. In the meanwhile, this thesis also provides detailed security analyses to verify the security of our scheme. Finally, we compare our scheme with other precious methods in terms of security, memory cost, communication cost, computation cost, and application environment etc.

    Chapter 1 Introduction 1 1.1 Background 1 1.1.1 Wireless Sensor Network 1 1.1.2 Routing 3 1.1.3 Key Management 4 1.1.4 Data Aggregation 6 1.1.5 Denial-of-Service (DoS) 7 1.1.6 Location Privacy 8 1.1.7 Time Synchronization 11 1.1.8 Broadcast Authentication 12 1.2 Motivation 14 1.3 Contribution 14 1.4 Organization 14 Chapter 2 Related Works 17 2.1 Aggregation of Encrypted Data 17 2.2 Resilient Aggregation 20 2.3 Delayed Aggregation and Authentication 21 2.4 Divide-and-Conquer and Commit-and-Attest 23 2.5 Pattern-Based Data Aggregation 26 2.5.1 Pattern-Seed-Based Method 26 2.5.2 Hash-Based Method 28 2.6 Aggregate-Commit-Prove 30 2.7 Synopsis-Diffusion-Based Method 32 Chapter 3 The Proposed Protocol 36 3.1 Settings and Notations 36 3.2 Protocol Overview 38 3.2.1 Topology-construction 38 3.2.2 Data Processing 39 3.2.2.1 Single-path routing 40 3.2.2.2 Multi-path routing 41 3.2.3 Verification 42 Chapter 4 Analysis and Comparison 47 4.1 Security Analysis 47 4.1.1 Security requirements and attack models 47 4.1.2 Security analysis of the proposed protocol 50 4.2 Comparisons 53 Chapter 5 Conclusion and Future Work 59 5.1 Conclusion 59 5.2 Future work 59 Bibliography 62

    [1] A. Perrig, J. Stankovic, and D. Wagner, “Security in wireless sensor networks,” Communications of the ACM, Volume 47, Pages: 53-57, June 2004.
    [2] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar, “SPINS: Security Protocols for Sensor Networks,” Wireless Networks Journal (WINE), Volume 8, Pages: 521-534, September 2002.
    [3] M. Ding, X. Cheng, and G. Xue, “Aggregation Tree Construction in Sensor Network,” Vehicular Technology Conference, IEEE 58th, Volume 4, Pages: 2168–2172, October 2003.
    [4] H. Li, Y. Zheng, K. Chen, and M. Wen, “A Hash based Secure Aggregation Protocol for Sensor Network,” Proceedings of the 2006 IEEE International Conference on Mechatronics and Automation, Pages: 1920–1924, June 2006.
    [5] S. Roy, S. Setia, and Sushil Jajodia, “Attack-resilient hierarchical Data Aggregation in Sensor Networks,” Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks (SASN '06), Pages: 71–82, ACM Press, October 2006.
    [6] C. Castelluccia, E. Mykletun, and G. Tsudik, “Efficient Aggregation of Encrypted Data in Wireless Sensor Network,” Mobile and Ubiquitous Systems: Networking and Services (MobiQuitou ‘05), the Second Annual International Conference, Pages: 109-117, July 2005.
    [7] H. □am, S. □zdemir, P. Nair, and D. Muthuavinashiappan, “ESPDA: Energy-efficient and Secure Pattern-based Data Aggregation for wireless sensor networks,” Proceedings of IEEE on Sensors, Volume 2, Pages: 732-736, October 2003.
    [8] H. □am, S. □zdemir, P. Nair, D. Muthuavinashiappan, and H. O. Sanli, “Energy-efficient secure pattern based data aggregation for wireless sensor networks”, Computer Communications, Volume 29, Pages: 446-455, February 2005.
    [9] L. Butty□n, P. Schaffer, and I. Vajda, “RANBAR: RANSEC-Based Resilient Aggregation in Sensor Networks,” Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks (SASN '06), Pages: 83–90, ACM Press, October 2006.
    [10] D. Wagner, “Resilient Aggregation in Sensor Networks,” Proceedings of the ACM workshop on Security in Ad Hoc and Sensor Networks (SASN’04), Pages: 78–87, ACM Press, October 2004.
    [11] L. Hu, and D. Evans, “Secure Aggregation in Sensor Network,” Proceeding of Workshop on Security and Assurance in Ad Hoc Networks, Pages: 384-391, January 2003.
    [12] Y. Yang, X. Wang, S. Zhu, and G. Cao, “SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks,” Proceedings of the seventh ACM international symposium on Mobile ad hoc networking and computing (MobiHoc '06), Pages: 356–367, ACM Press, May 2006.
    [13] A. Mahimkar, and T. S. Rappaport, “SecureDAV: A Secure Data Aggregation and Protocol for Sensor Networks,” Proceedings of the IEEE Global Telecommunications Conference, Volume 4, Pages: 2175–2179, November - December 2004.
    [14] K. Wu, D. Dreef, B. Sun, and Y. Xia, “Secure Data Aggregation without Persistent Cryptographic Operations in Wireless Sensor Network,” 25th IEEE Performance, Computing, and Communications Conference (IPCCC), Pages: 6 pp, April 2006.
    [15] H. Chan, A. Perrig, and D. Song, “Secure Hierarchical In-Network Aggregation in Sensor Networks,” Proceedings of the 13th ACM conference on Computer and communications security (CCS’06), Pages: 278–287, ACM Press, October 2006.
    [16] B. Przydatek, D. Song, and A. Perrig, “SIA: Secure Information Aggregation in Sensor Networks,” Proceedings of the 1st international conference on Embedded networked sensor systems (SenSys '03), Pages: 255–265, ACM Press, November 2003.
    [17] H. O. Sanli, S. Ozdemir, and H. Cam, “SRDA: Secure Reference-Based Data Aggregation Protocol for Wireless Sensor Network,” Vehicular Technology Conference, IEEE 60th, Volume 7, Pages: 4650–4654, September 2004.  
    [18] M. Raina, S. Ghosh, R. Patro, G. Viswanath, and T. Chadrashekhar, “Secure Data Aggregation using Commitment Schemes and Quasi Commutative Functions,” Wireless Pervasive Computing, 2006 1st International Symposium, Pages: 5 pp, January 2006.
    [19] S. Ganeriwal and M. B. Srivastava, “Reputation-based Framework for High Integrity Sensor Networks,” Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN '04), Pages: 66–77, ACM Press, October 2004.
    [20] D. Westhoff, J. Girao and M. Archarya, “Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation,” Mobile Computing, IEEE Transactions, Volume 5, Pages: 1417–1431, October 2006.
    [21] J. Girao, D. Westhoff and M. Schneider, “CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks,” IEEE International Conference, Communications 2005(ICC 2005), Volume 5, Pages: 3044–3049, May 2005.
    [22] E. Mykletun, J. Girao and D. Westhoff, “Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks,” IEEE International Conference Communications 2006, Volume 5, Pages: 2288–2295, June 2006.
    [23] C. Karlof, D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Application, Pages: 113-127, May 2003.
    [24] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proceedings of the 2003 IEEE Symposium on Security and Privacy (SP.03), Pages: 197-213, May 2003.
    [25] S. Zhu, S. Setia, and S. Jajodia, “Leap: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,” Proceedings of the 10th ACM conference on Computer and communications security (CCS '03), Pages: 62-72, ACM Press, October 2003.
    [26] P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, “Enhancing Source-Location Privacy in Sensor Network Routing,” Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICSCS’05), Pages: 599–608, June 2005.
    [27] C. Ozturk, Y. Zhang, W. Trappe, and M. Ott, “Source-Location Privacy for Networks of Energy-Constrained Sensors,” Proceedings of the Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (WSTFEUS’04), Pages: 68–72, May 2004.
    [28] C. Ozturk, Y. Zhang and Wade Trappe, “Source-Location Privacy in Energy-Constrained Sensor Network Routing,” Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN’04), Pages: 88–93, ACM Press, October 2004.
    [29] J. Elson and D. Estrin, “Time Synchronization for Wireless Sensor Network,” Proceeding of 15Th Parallel and Distributed Processing Symposium, Pages: 1965-1970, Apr 2001.
    [30] D. Estrin, A. Sayeed and M. Srivastava, Mobicom 2002 Tutorial “Wireless Sensor Networks,” http://nesl.ee.ucla.edu/tutorials/mobicom02.
    [31] S. Ganeriwal, R. Kumar and M. B. Srivastava, “Timing-sync Protocol for Sensor Networks,” Proceeding of the 1st international conference on Embedded networked sensor systems (SenSys’03), Pages: 138-149, ACM Press, November 2003.
    [32] S. Madden, M. J. Franklin, J. M. Hellerstein and W. Hong, “TAG: a Tiny AGgregation Service for Ad-Hoc Sensor Networks,” Proceedings of the 5th symposium on Operating systems design and implementation, Pages: 131-146, ACM Press, December 2002.
    [33] S. Nath, P. B. Gibbons, S. Seshan and Z. R. Anderson, “Synopsis diffusion for robust aggregation in sensor networks,” Proceeding of the 2nd international conference on Embedded networked sensor systems (SenSys’04), Pages: 250-262, ACM Press, November 2004.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE