簡易檢索 / 詳目顯示

研究生: 蕭英助
論文名稱: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks
於無線感測網路中可還原的私密資料聚合之研究
指導教授: 孫宏民
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊系統與應用研究所
Institute of Information Systems and Applications
論文出版年: 2008
畢業學年度: 96
語文別: 英文
論文頁數: 50
中文關鍵詞: 無線感測網路資料聚合橢圓曲線密碼學同態加密
相關次數: 點閱:3下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在分群式無線感測網路中,可以透過資料聚合的技術降低資料傳輸時的負擔,然而感測器甚至是CH(cluster head)可能會被惡意攻擊者所捕獲,因此為避免資料在聚合的過程被惡意攻擊者所取得,一種名為私密資料聚合的方法被提出。在私密資料聚合的方法中,不需要先將個別的密文解密取得明文後再進行資料聚合的運算,而是可以直接對加密過的密文進行資料聚合的運算。但是我們發現現有的私密資料聚合的方法都是不可還原的特性,更精確地說,資料收集中心僅會收到CH所傳送的經過聚合運算後的結果,沒有辦法得知個別感測器所送出的資料,這種特性會有兩種缺點:第一,資料收集中心無法驗證所有資料的完整性;第二,可使用的資料聚合運算的種類被限制住了,舉例來說,私密資料加密方法只提供對密文進行加法的運算,當資料收集中心想要由加總的結果找出最大值和最小值分別是屬於哪些感測器送出時,便不適用。在此論文,我們針對同質無線感測網路以及異質無線感測網路分別提出了可還原的私密資料聚合方法,我們利用同態加密達成可還原的特性,另外我們提供了驗證所有資料完整性的機制,以及我們的方法適用於所有資料聚合的運算,在論文的最後我們針對安全性以及效率有完整的分析與評估。


    Table of Contents ................................................................................................ I List of Figures...................................................................................................... III List of Tables ....................................................................................................... IV Chapter 1 Introduction ..................................................................................... 1 1.1 Overview ............................................................................................. 1 1.2 Motivation ........................................................................................... 3 1.3 Our Contribution ................................................................................ 3 1.4 Organization........................................................................................ 3 Chapter 2 Related Work ................................................................................... 5 2.1 Network Model .................................................................................... 5 2.1.1 Cluster-based Homogeneous WSN........................................ 6 2.1.2 Cluster-based Heterogeneous WSN....................................... 6 2.1.3 Comparison Between Homogeneous and Heterogeneous WSN 8 2.2 Attack Models ..................................................................................... 8 2.3 Elliptic Curve ...................................................................................... 10 2.4 Mykletun et al.'s Concealed Data Aggregation Scheme ...................... 11 2.5 Boneh et al.'s Aggregate Signature Scheme ........................................ 13 Chapter 3 A RCDA Scheme for Homogeneous WSN........................................ 17 3.1 Scheme I .............................................................................................. 17 3.2 A Concrete Example ........................................................................... 21 3.3 Malicious Sensor Node Identi‾cation Mechanism................................ 24 Chapter 4 RCDA Schemes for Heterogeneous WSN ......................................... 25 4.1 Native Scheme..................................................................................... 25 4.2 Scheme 2 ............................................................................................. 26 4.3 Discussion............................................................................................ 31 4.3.1 Comparison between Native Scheme and Scheme 2.............. 31 4.3.2 Recoverable Property............................................................ 31 4.4 Cryptography ...................................................................................... 32 Chapter 5 Analyses ........................................................................................... 33 5.1 Performance Analysis .......................................................................... 33 5.2 Security Analysis................................................................................. 36 5.2.1 Without compromising any SN or CH ................................ 36 5.2.2 Compromising SNs............................................................... 36 5.2.3 Compromising CHs .............................................................. 37 5.3 Scalability Analysis ............................................................................. 38 Chapter 6 Evaluation and Simulation ............................................................... 40 6.1 Selection of Parameter l ...................................................................... 40 6.2 Simulation of Heterogeneous WSN...................................................... 42 Chapter 7 Conclusion........................................................................................ 44 Bibliography ........................................................................................................ 49 Chapter A Conference Paper ............................................................................ 50

    [1] I.F. Akyildiz, Weilian Su, Y. Sankarasubramaniam, and E. Cayirci. A Survey
    on Sensor Networks. IEEE Commun. Mag., 40:102{114, Aug. 2002.
    [2] Seema Bandyopadhyay and E.J. Coyle. An Energy E±cient Hierarchical Clus-
    tering Algorithm for Wireless Sensor Networks. In Proc. IEEE 22nd Annual
    Joint Conference on Computer and Communications Societies (INFOCOM'03),
    volume 3, pages 1713{1723, April 2003.
    [3] E.O. Bla¼ and M. Zitterbart. Towards Acceptable Public-Key Encryption in
    Sensor Networks. In Proc. 2nd International Workshop on Ubiquitous Comput-
    ing., 2005.
    [4] D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and Veri‾ably
    Encrypted Signatures from Bilinear Maps. In Proc. Eurocrypt, volume 2656,
    pages 416{32. Springer, 2003.
    [5] H. C» am, S. Ä Ozdemir, P. Nair, D. Muthuavinashiappan, and H. Ozgur Sanli.
    Energy-E±cient Secure Pattern Based Data Aggregation for Wireless Sen-
    sor Networks. Jurnal of Computer Communications, ELSEVIER, 29:446{455,
    2006.
    [6] C. Castelluccia, E. Mykletun, and G. Tsudik. E±cient Aggregation of En-
    crypted Data in Wireless Sensor Networks. In Proc. 2nd Annual International
    Conference on Mobile and Ubiquitous Systems, pages 109{117, July 2005.
    [7] R. Cristescu and B. Beferull-Lozano. Lossy Network Correlated Data Gathering
    with High-Resolution Coding. IEEE Trans. Inf. Theory, 52:2817{2824, June
    2006.
    [8] S.R. Das, C.E. Perkins, and E.M. Royer. Performance comparison of two on-
    demand routing protocols for ad hoc networks. In Proc. IEEE 19th Annual
    Joint Conference on IEEE Computer and Communications Societies (INFO-
    COM'00), volume 1, pages 3{12, 2000.
    [9] X. Du and Y. Xiao. Energy e±cient Chessboard Clustering and Routing in
    Heterogeneous Sensor Networks. International Journal of Wireless and Mobile
    Computing, 1:121{130, 2006.
    [10] Xiaojiang Du, M. Guizani, Yang Xiao, and Hsiao-Hwa Chen. Two Tier Secure
    Routing Protocol for Heterogeneous Sensor Networks. IEEE Trans. Wireless
    Commun., 6:3395{3401, Sept. 2007.
    [11] E.J. Duarte-Melo and Mingyan Liu. Analysis of Energy Consumption and Life-
    time of Heterogeneous Wireless Sensor Networks. In Proc. IEEE International
    Conference on Global Telecommunications (GLOBECOM'02), volume 1, pages
    21{25, Nov. 2002.
    [12] G. Gaubatz, J.-P. Kaps, E. Ozturk, and B. Sunar. State of The Art in Ultra-Low
    Power Public Key Cryptography for Wireless Sensor Networks. In Proc. IEEE
    3rd International Workshops on Pervasive Computing and Communications
    (PerCom'05), pages 146{150, March 2005.
    [13] J. Girao, D. Westho®, M. Schneider, N.E.C.E. Ltd, and G. Heidelberg. CDA:
    Concealed Data Aggregation for Reverse Multicast Tra±c in Wireless Sen-
    sor Networks. In Proc. IEEE International Conference on Communications
    (ICC'05), volume 5, 2005.
    [14] P. Gupta and P.R. Kumar. The capacity of wireless networks. IEEE Trans.
    Inf. Theory, 46:388{404, March 2000.
    [15] N. Gura, A. Patel, A. Wander, H. Eberle, and S.C. Shantz. Comparing Elliptic
    Curve Cryptography and RSA on 8-bit CPUs. In Proc. International Workshop
    on Cryptographic Hardware and Embedded Systems (CHES'04). Springer, 2004.
    [16] W.R. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-E±cient
    Communication Protocol for Wireless Microsensor Networks. In Proc. IEEE
    33rd Annual Hawaii International Conference on System Sciences, Jan. 2000.
    [17] Lingxuan Hu and D. Evans. Secure Aggregation for Wireless Networks. In
    Proc. IEEE International Symposium on Applications and the Internet, pages
    384{391, Jan. 2003.
    [18] Crossbow Technology Inc. http://www.xbow.com. Technical report.
    [19] C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed Di®usion: A scal-
    able and Robust Communication Paradigm for Sensor Networks. In Proc.
    ACM/IEEE International Conference on Mobile Computing and Networking,
    pages 56{67, 2000.
    [20] C. Karlof, N. Sastry, and D. Wagner. TinySec: a link layer security architecture
    for wireless sensor networks. In Proc. ACM 2nd international conference on
    Embedded networked sensor systems, pages 162{175, 2004.
    [21] C. Karlof and D.Wagner. Secure Routing in Wireless Sensor Networks: Attacks
    and Countermeasures. In Proc. IEEE 1st International Workshop on Sensor
    Network Protocols and Applications, pages 113{127, May 2003.
    [22] N. Koblitz, A. Menezes, and S. Vanstone. The State of Elliptic Curve Cryptog-
    raphy. Jurnal of Designs, Codes and Cryptography, SPRINGER, 19:173{193,
    2000.
    [23] L. Krishnamachari, D. Estrin, and S. Wicker. The Impact of Data Aggregation
    in Wireless Sensor Networks. In Proc. IEEE 22nd International Workshops on
    Distributed Computing Systems, pages 575{578, July 2002.
    [24] An Liu and Peng Ning. TinyECC: A Con‾gurable Library for Elliptic Curve
    Cryptography in Wireless Sensor Networks. In Proc. IEEE International Con-
    ference on Information Processing in Sensor Networks (IPSN'08), pages 245{
    256, April 2008.
    [25] S. Madden, M.J. Franklin, J.M. Hellerstein, and W. Hong. TAG: A Tiny AGgre-
    gation Service for Ad-Hoc Sensor Networks. In Proc. USENIX 5th Symposium
    on Operating Systems Design and implementation, 2002.
    [26] A. Manjeshwar and D.P. Agrawal. TEEN: A Routing Protocol for Enhanced
    E±ciency in Wireless Sensor Networks. In Proc. IEEE 15th International Sym-
    posium on Parallel and Distributed Processing, pages 2009{2015, April 2001.
    [27] K. Mccusker, N. O'Connor, and D. Diamond. Low-Energy Finite Field Arith-
    metic Primitives for Implementing Security in Wireless Sensor Networks. In
    Proc. IEEE International Conference on Communications, Circuits and Sys-
    tems, volume 3, pages 1537{1541, June. 2006.
    [28] V.P. Mhatre, C. Rosenberg, D. Kofman, R. Mazumdar, and N. Shro®. A Min-
    imum Cost Heterogeneous Sensor Network with A Lifetime Constraint. IEEE
    Trans. Mobile Comput., 4:4{15, Feb. 2005.
    [29] E. Mykletun, J. Girao, and D. Westho®. Public Key Based Cryptoschemes for
    Data Concealment in Wireless Sensor Networks. In Proc. IEEE International
    Conference on Communications, volume 5, pages 2288{2295, June. 2006.
    [30] A. Perrig, J. Stankovic, and D. Wagner. Security in Wireless Sensor Networks.
    Communications of the ACM, 47:53{57, 2004.
    [31] JM Pollard. Monte Carlo Methods for Index Computation (modp). Mathemat-
    ics of Computation, 32:918{924, 1978.
    [32] B. Przydatek, D. Song, and A. Perrig. SIA: Secure Information Aggregation
    in Sensor Networks. In Proc. ACM 1st international conference on Embedded
    Networked Sensor Systems, pages 255{265, 2003.
    [33] H.O. Sanli, S. Ozdemir, and H. Cam. SRDA: Secure Reference-Based Data
    Aggregation Protocol for Wireless Sensor Networks. In Proc. IEEE 60th Inter-
    national Conference on Vehicular Technology (VTC'04-Fall), volume 7, pages
    4650{4654, Sept. 2004.
    [34] O. Ugus, D. Westho®, R. Laue, A. Shoufan, and S. Huss. Optimized Implemen-
    tation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless
    Sensor Networks. In Proc. ACM 2nd International Workshop on Embedded
    Systems Security (WESS'07), 2007.
    [35] A.S. Wander, N. Gura, H. Eberle, V. Gupta, and S.C. Shantz. Energy Anal-
    ysis of Public-Key Cryptography for Wireless Sensor Networks. In Proc. 3rd
    IEEE International Conference on Pervasive Computing and Communications
    (PerCom'05), pages 324{328, March 2005.
    [36] D. Westho®, J. Girao, and M. Acharya. Concealed Data Aggregation for Re-
    verse Multicast Tra±c in Sensor Networks: Encryption, Key Distribution, and
    Routing Adaptation. IEEE Trans. Mobile Comput., 5:1417{1431, Oct. 2006.
    [37] Yongdong Wu, Di Ma, Tieyan Li, and R.H. Deng. Classify Encrypted Data
    in Wireless Sensor Networks. In Proc. IEEE 60th International Conference on
    Vehicular Technology (VTC'04), volume 5, pages 3236{3239, Sept. 2004.
    [38] Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway. A Survey of
    Key Management Schemes in Wireless Sensor Networks. Jurnal of Computer
    Communications, ELSEVIER, 30:2314{2341, 2007.
    [39] Bo Yu and Bin Xiao. Detecting Selective Forwarding Attacks in Wireless Sen-
    sor Networks. In Proc. IEEE 20th International Symposium on Parallel and
    Distributed Processing (IPDPS'06), April 2006.
    [40] S. Zhu, S. Setia, and S. Jajodia. LEAP: E±cient security mechanisms for large-
    scale distributed sensor networks. ACM Trans. on Sensor Networks (TOSN),
    2:500{528, 2006.
    49

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE