研究生: |
吳佳勳 Wu, Chia Hsun |
---|---|
論文名稱: |
權限管理與近距離認證機制的分散式智慧能源系統 A Decentralized Smart Energy System With Access Control and NFB Authentication |
指導教授: |
周百祥
Chou, Pai H |
口試委員: |
蔡明哲
Tsai, Ming Jer 周志遠 Chou, Jerry |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2016 |
畢業學年度: | 104 |
語文別: | 英文 |
論文頁數: | 58 |
中文關鍵詞: | 藍芽4.0 、權限管理 、近距離認證 、分散式系統 、智慧家庭 |
外文關鍵詞: | BLE, Access Control, Near Field Authentication, Distributed system, Smart home |
相關次數: | 點閱:4 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
我們提出一項具有近距離認證的低功耗藍牙燈光控制系統, 近距離認證可以透過更動 低功耗電磁波強弱來達成NFC(Near Field Communication)的效果, 而且是具有主動式認證 仿NFC的低功耗藍牙功能。
我們以燈光權限管理系統為基礎,加上近距離認證後的加密演算法加密訊息, 可以有效 預防外部人員的藍芽偷錄攻擊而取得權限, 相較於現在低功耗藍牙硬體上支援的AES128加 密, 我們多了一層M2M軟體的加密, 實驗方法顯示我們可以對未來的智慧家電能夠提供更 高的安全性保護。
We propose a lighting control system based on a near-field version of Bluetooth Low Energy (BLE) Technology, called NFB, and an access control protocol to enhance security. At the hardware level, we reduce the RF power of the BLE transceiver to that comparable to Near Field Communi- cation (NFC) so that it can mimic the convenient contactless-style authentication in NFC ID cards. While the reduced RF power of NFB makes it more difficult for attackers to snoop compared to stan- dard BLE, we add another encryption layer to further strengthen the security of NFB beyond AES128 crypto co-processor built into BLE today. Experimental results show that our proposed scheme to provide strong security for protecting future smart home systems.
[1] KISI secure smartphone keys homepage. https://getkisi.com/.
[2] August smart lock hompage. http://august.com/.
[3] BlueZ. https://www.bluez.org.
[4] Danalock smart lock hompage. https://danalock.com/.
[5] Lockitron smart lock hompage. https://lockitron.com/.
[6] Elisa Bertino, Piero Andrea Bonatti, and Elena Ferrari. Trbac: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur., 4(3):191–233, August 2001. ISSN 1094-9224. doi: 10.1145/501978.501979. URL http://doi.acm.org/10.1145/501978.501979.
[7] bluepy. Python interface to Bluetooth LE on Linux. https://github.com/IanHarvey/bluepy.
[8] David F. Ferraiolo and D. Richard Kuhn. Role-based access controls. CoRR, abs/0903.2171,
2009. URL http://arxiv.org/abs/0903.2171.
[9] David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn, and Ramaswamy Chan- dramouli. Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Se- cur., 4(3):224–274, August 2001. ISSN 1094-9224. doi: 10.1145/501978.501980. URL http://doi.acm.org/10.1145/501978.501980.
[10] GOOGLE. Two-step verification. https://www.google.com/landing/2step/.
[11] James BD Joshi, Elisa Bertino, Usman Latif, and Arif Ghafoor. A generalized temporal role- based access control model. IEEE Transactions on Knowledge and Data Engineering, 17(1): 4–23, 2005.
47[12] Cheng-Ting Lee, Cheng-Hsun Yang, Chun-Min Chang, Chung-Yi Kao, Hua-Min Tseng, Hen- pai Hsu, and Pai H Chou. A smart energy system with distributed access control. In Internet of Things (iThings), 2014 IEEE International Conference on, and Green Computing and Com- munications (GreenCom), IEEE and Cyber, Physical and Social Computing (CPSCom), IEEE, pages 53–60. IEEE, 2014.
[13] RaviSSandhu,EdwardJCoynek,HalLFeinsteink,andCharlesEYoumank.Role-basedaccess control models yz. IEEE computer, 29(2):38–47, 1996.
[14] Jonathan Shahen, Jianwei Niu, and Mahesh Tripunitara. Mohawk+ t: Efficient analysis of ad- ministrative temporal role-based access control (atrbac) policies. In Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, pages 15–26. ACM, 2015.
[15] TechCity Technology Co., Ltd. E2-live. http://e2-live.com/.
[16] Peng-Loon Teh, Huo-Chong Ling, and Soon-Nyean Cheong. NFC smartphone based access control system using information hiding. In Open Systems (ICOS), 2013 IEEE Conference on, pages 13–17. IEEE, 2013.
[17] Texas Instruments. CC2541 2.4 GHz Bluetooth Low Energy system-on-chip. http://www.ti. com/product/cc2541/.