簡易檢索 / 詳目顯示

研究生: 楊正隆
Yang, Cheng-Lung
論文名稱: 在叢集式無線感測網路提供多重防禦機制之研究
Defending Against Multiple Attacks in Cluster-based Wireless Sensor Networks
指導教授: 唐文華
Tarng , Wen-Hua
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2009
畢業學年度: 97
語文別: 中文
中文關鍵詞: 無線感測網路橢圓曲線密碼網路安全金鑰管理
外文關鍵詞: wireless sensor network, ECC, network security, key management
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 由於無線感測網路使用無線傳輸,資料容易遭到竊聽、竄改,而感測網路節點受硬體的限制,無法使用複雜的加密技術。因此目前對於無線感測網路之金鑰管理的研究上,主要都集中在對稱式金鑰,因為有較低的計算複雜度,但卻使得感測網路的連結性(Connectivity)、可延展性(Scalability)受到限制。
    本研究基於橢圓曲線加密(Elliptic Curve Cryptography, ECC)的金鑰管理機制,對於感測節點身分和訊息傳輸提供認證服務,使用憑證檢驗實體身分,在叢集式無線感測網路上防禦多重攻擊,並分析整體網路的安全性。


    The data of wireless sensor networks are liable to eavesdropping and tampering due to wireless transmission, but complicated encryption technologies can not be used for prevention due to the hardware limitation of sensor nodes. Therefore, the researches of key management in wireless sensor network mainly focus on symmetric-key encryption by considering its lower computational complexity, in spite of its limited connectivity and scalability.
    This study proposed a key management mechanism based on elliptic curve cryptography (ECC) to provide certification services for sensor nodes’ identity and message. The mechanism can be use to test physical identity for the defense of multiple attacks in cluster-based wireless sensor network. Analysis of network security is conducted by examples using this mechanism.

    第一章 緒論 1 第一節 研究背景 1 第二節 研究動機 2 第三節 研究目的 3 第二章 相關技術與研究 5 第一節 無線感測網路路由協定 5 第二節 無線感測網路攻擊 10 第三節 金鑰分配與管理 14 第四節 橢圓曲線密碼學 17 第三章 研究方法 22 第一節 網路環境與假設 22 第二節 初始化階段 23 第三節 會議金鑰交換 29 第四章 安全性分析 31 第五章 結論 35 參考文獻 36

    [1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, pp. 393-422, 2002.
    [2] J. Yick, B. Mukherjee, and D. Ghosal, "Wireless sensor network survey," Computer Networks, vol. 52, pp. 2292-2330, 2008.
    [3] M. Alan, C. David, P. Joseph, S. Robert, and A. John, "Wireless sensor networks for habitat monitoring," in Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications Atlanta, Georgia, USA: ACM, 2002.
    [4] V. A. Kottapalli, A. S. Kiremidjian, J. P. Lynch, E. Carryer, T. W. Kenny, K. H. Law, and Y. Lei, "Two-tiered wireless sensor network architecture for structural health monitoring," in Smart Structures and Materials 2003: Smart Systems and Nondestructive Evaluation for Civil Infrastructures, San Diego, CA, USA, 2003, pp. 8-19.
    [5] G. Werner-Allen, J. Johnson, M. Ruiz, J. Lees, and M. Welsh, "Monitoring volcanic eruptions with a wireless sensor network," in Wireless Sensor Networks, 2005. Proceeedings of the Second European Workshop on, 2005, pp. 108-120.
    [6] R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, pp. 120-126, 1978.
    [7] V. Miller, "Use of Elliptic Curves in Cryptography," in Advances in Cryptology - CRYPTO '85: Proceedings, 1986, p. 417.
    [8] N. Koblitz, "Elliptic Curve Cryptosystems," Mathematics of Computation, vol. 48, pp. 203-209, 1987.
    [9] S. Vanstone, "Responses to NIST's proposal," Commun. ACM, vol. 35, pp. 50-52, 1992.
    [10] N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs," in Cryptographic Hardware and Embedded Systems - CHES 2004, 2004, pp. 925-943.
    [11] D. J. Malan, M. Welsh, and M. D. Smith, "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography," in Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004. 2004 First Annual IEEE Communications Society Conference on, 2004, pp. 71-80.
    [12] W. Ronald, K. Derrick, C. Sue-fen, G. Charles, L. Charles, and K. Peter, "TinyPK: securing sensor networks with public key technology," in Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks Washington DC, USA: ACM, 2004.
    [13] P. Krzysztof, L. Peter, and P. Steffen, "How public key cryptography influences wireless sensor node lifetime," in Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks Alexandria, Virginia, USA: ACM, 2006.
    [14] M. H. Sandra, T. H. Stephen, and L. L. Arthur, "A survey of gossiping and broadcasting in communication networks," Networks, vol. 18, pp. 319-349, 1988.
    [15] H. Wendi Rabiner, K. Joanna, and B. Hari, "Adaptive protocols for information dissemination in wireless sensor networks," in Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking Seattle, Washington, United States: ACM, 1999.
    [16] B. David and E. Deborah, "Rumor routing algorthim for sensor networks," in Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications Atlanta, Georgia, USA: ACM, 2002.
    [17] I. Chalermek, G. Ramesh, and E. Deborah, "Directed diffusion: a scalable and robust communication paradigm for sensor networks," in Proceedings of the 6th annual international conference on Mobile computing and networking Boston, Massachusetts, United States: ACM, 2000.
    [18] X. Ya, H. John, and E. Deborah, "Geography-informed energy conservation for Ad Hoc routing," in Proceedings of the 7th annual international conference on Mobile computing and networking Rome, Italy: ACM, 2001.
    [19] Y. Yu, R. Govindan, and D. Estrin, "Geographical and Energy Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks," 2001.
    [20] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks," in System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on, 2000, p. 10 pp. vol.2.
    [21] M. J. Handy, M. Haase, and D. Timmermann, "Low energy adaptive clustering hierarchy with deterministic cluster-head selection," in Mobile and Wireless Communications Network, 2002. 4th International Workshop on, 2002, pp. 368-372.
    [22] S. Lindsey and C. S. Raghavendra, "PEGASIS: Power-efficient gathering in sensor information systems," in Aerospace Conference Proceedings, 2002. IEEE, 2002, pp. 3-1125-3-1130 vol.3.
    [23] A. Manjeshwar and D. P. Agrawal, "TEEN: a routing protocol for enhanced efficiency in wireless sensor networks," in Parallel and Distributed Processing Symposium., Proceedings 15th International, 2001, pp. 2009-2015.
    [24] A. Manjeshwar and D. P. Agrawal, "APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks," in Parallel and Distributed Processing Symposium., Proceedings International, IPDPS 2002, Abstracts and CD-ROM, 2002, pp. 195-202.
    [25] Y. Fan, L. Haiyun, C. Jerry, L. Songwu, and Z. Lixia, "A two-tier data dissemination model for large-scale wireless sensor networks," in Proceedings of the 8th annual international conference on Mobile computing and networking Atlanta, Georgia, USA: ACM, 2002.
    [26] R. D. John, "The Sybil Attack," in Revised Papers from the First International Workshop on Peer-to-Peer Systems: Springer-Verlag, 2002.
    [27] E. Laurent and D. G. Virgil, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM conference on Computer and communications security Washington, DC, USA: ACM, 2002.
    [28] C. Haowen, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Security and Privacy, 2003. Proceedings. 2003 Symposium on, 2003, pp. 197-213.
    [29] L. Donggang and N. Peng, "Establishing pairwise keys in distributed sensor networks," in Proceedings of the 10th ACM conference on Computer and communications security Washington D.C., USA: ACM, 2003.
    [30] Y. Zhou, Y. Zhang, and Y. Fang, "Access control in wireless sensor networks," Ad Hoc Networks, vol. 5, pp. 3-13, 2007.
    [31] K. Neal, A course in number theory and cryptography: Springer-Verlag New York, Inc., 1987.
    [32] A. Fernandes, "Elliptic Curve Cryptography," Dr. Dobb's Journal, December 1999.
    [33] "Standards for Efficient Cryptography Group SEC 1: Elliptic Curve Cryptography.," Certicom Research., 1999.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE