請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/17000完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 吳文中 | |
| dc.contributor.author | Chih-Yuan Lin | en |
| dc.contributor.author | 林智源 | zh_TW |
| dc.date.accessioned | 2021-06-07T23:52:41Z | - |
| dc.date.copyright | 2014-01-27 | |
| dc.date.issued | 2013 | |
| dc.date.submitted | 2013-12-04 | |
| dc.identifier.citation | 45
REFERENCE [1] A.-V. M. Search. Forthcoming Trends. Available: http://avmediasearch.eu/techno-socio-economic-analysis-of-mobile-search [2] J. M. Kahn, R. H. Katz, and K. S. Pister, 'Next century challenges: mobile networking for “Smart Dust”,' in Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, 1999, pp. 271-278. [3] I. F. Akyildiz and M. C. Vuran, 'Introduction,' in Wireless Sensor Networks, ed: John Wiley & Sons, Ltd, 2010, pp. 1-16. [4] H. Alzaq, 'Peer to Peer Overlay Network for Sensor Networks,' Institute of Operating Systems and Computer Networks, Technical University Braunschweig, 2007. [5] 張春紅、裘曉峰、弭偉、紀陽, 全面攔截P2P主流技術 佳魁資訊, 2012. [6] S. N. Sahar, F. K. Shaikh, S. H. Jokhio, S. A. A. Shah, W. Shah, A. S. Larik, et al., 'P2P based Data Management WSNs: Experiences and Lessons Learnt from a Real-world Deployment,' Mehran University Research Journal of Engineering & Technology, vol. 30, 2011. [7] G. Gutierrez, B. Mejias, P. Van Roy, D. Velasco, and J. Torres, 'WSN and P2P: a self-managing marriage,' in Self-Adaptive and Self-Organizing Systems Workshops, 2008. SASOW 2008. Second IEEE International Conference on, 2008, pp. 198-201. [8] K. Wehrle, S. Gotz, and S. Rieche, 'Distributed Hash Tables,' in Peer-to-Peer Systems and Applications. vol. 3485, R. Steinmetz and K. Wehrle, Eds., ed: Springer Berlin Heidelberg, 2005, pp. 79-93. [9] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, 'Chord: A scalable peer-to-peer lookup service for internet applications,' in ACM SIGCOMM Computer Communication Review, 2001, pp. 149-160. [10] A. Rowstron and P. Druschel, 'Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems,' in Middleware 2001, 2001, pp. 329-350. [11] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A scalable content-addressable network vol. 31: ACM, 2001. [12] P. Maymounkov and D. Mazieres, 'Kademlia: A peer-to-peer information system based on the xor metric,' in Peer-to-Peer Systems, ed: Springer, 2002, pp. 53-65. [13] M. Ali and Z. A. Uzmi, 'CSN: A network protocol for serving dynamic queries in large-scale wireless sensor networks,' in Communication Networks and Services Research, 2004. Proceedings. Second Annual Conference on, 2004, pp. 165-174. [14] A.-B. Al-Mamou and H. Labiod, 'ScatterPastry: An overlay routing using a DHT over wireless sensor networks,' in Intelligent Pervasive Computing, 2007. IPC. The 2007 International Conference on, 2007, pp. 274-279. [15] J. Yu, W. Liu, and J. Song, 'C2WSN: A two-tier Chord overlay serving for efficient queries in large-scale wireless sensor networks,' in Advanced Computing and Communications, 2007. ADCOM 2007. International Conference on, 2007, pp. 237-242. [16] F. Zhang, Z. J. Shi, and B. Wang, 'Chord-based key establishment schemes for 46 sensor networks,' in Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference on, 2008, pp. 731-737. [17] G. Fersi, W. Louati, and M. B. Jemaa, 'Distributed Hash table-based routing and data management in wireless sensor networks: a survey,' Wireless networks, vol. 19, pp. 219-236, 2013. [18] Y.-C. L. 連 育 正 , 'The Development of Remote Programmable Micro-Interpreter for Wireless Sensor Networks,' Graduate Institute of engineering science and ocean engineeting, National Taiwan University, 2010. [19] Crossbow. Crossbow technology. Available: http://www.xbow.com [20] Moteiv. Tmote Sky Datasheet. Available: http://www.eecs.harvard.edu/~konrad/projects/shimmer/references/tmote-sky-datasheet.pdf [21] R. Adler, M. Flanigan, J. Huang, R. Kling, N. Kushalnagar, L. Nachman, et al., 'Intel mote 2: an advanced platform for demanding sensor network applications,' in Proceedings of the 3rd international conference on Embedded networked sensor systems, 2005, pp. 298-298. [22] V. Handzisk and T. Lentsch, 'The eyesIFX platform,' TinyOS Technology Exchange II, http://www.tinyos.net/ttx-02-2005/platforms/ttx2005-eyesIFX.ppt, 2005. [23] D. Simon, C. Cifuentes, D. Cleal, J. Daniels, and D. White, 'Java™ on the bare metal of wireless sensor devices: the squawk Java virtual machine,' in Proceedings of the 2nd international conference on Virtual execution environments, 2006, pp. 78-88. [24] P. Levis, S. Madden, J. Polastre, R. Szewczyk, K. Whitehouse, A. Woo, et al., 'TinyOS: An Operating System for Sensor Networks,' in Ambient Intelligence, W. Weber, J. Rabaey, and E. Aarts, Eds., ed: Springer Berlin Heidelberg, 2005, pp. 115-148. [25] A. Dunkels, B. Gronvall, and T. Voigt, 'Contiki-a lightweight and flexible operating system for tiny networked sensors,' in Local Computer Networks, 2004. 29th Annual IEEE International Conference on, 2004, pp. 455-462. [26] S. Bhatti, J. Carlson, H. Dai, J. Deng, J. Rose, A. Sheth, et al., 'MANTIS OS: An embedded multithreaded operating system for wireless micro sensor platforms,' Mobile Networks and Applications, vol. 10, pp. 563-579, 2005. [27] A. Eswaran, A. Rowe, and R. Rajkumar, 'Nano-rk: an energy-aware resource-centric rtos for sensor networks,' in Real-Time Systems Symposium, 2005. RTSS 2005. 26th IEEE International, 2005, pp. 10 pp.-265. [28] Q. Cao, T. Abdelzaher, J. Stankovic, and T. He, 'The liteos operating system: Towards unix-like abstractions for wireless sensor networks,' in Information Processing in Sensor Networks, 2008. IPSN'08. International Conference on, 2008, pp. 233-244. [29] A. Dwivedi, M. Tiwari, and O. Vyas, 'Operating Systems for Tiny Networked Sensors: A Survey,' International Journal of Recent Trends in Engineering, vol. 1, pp. 152-157, 2009. [30] M. O. Farooq and T. Kunz, 'Operating systems for wireless sensor networks: A survey,' Sensors, vol. 11, pp. 5900-5930, 2011. [31] Contiki. Contiki official website. Available: http://www.contiki-os.org/ [32] P.-Y. C. 陳伯禹, 'Design and Implement a High Integrated Home Automation Platform with Power Saving Technology,' Graduate Institute of engineering science and ocean engineeting, National Taiwan University, 2010. [33] D. S. Milojicic, V. Kalogeraki, R. Lukose, K. Nagaraja, J. Pruyne, B. Richard, et al., 'Peer-to-peer computing,' ed: Technical Report HPL-2002-57, HP Lab, 2002. [34] C.-L. Liu, C.-Y. Wang, and H.-Y. Wei, 'Cross-layer Mobile Chord P2P protocol design for VANET,' International Journal of Ad Hoc and Ubiquitous Computing, vol. 6, pp. 150-163, 2010. [35] K. Jung-Tae, P. Hae-Kyeong, and P. Eui-Hyun, 'Security issues in peer-to-peer systems,' in Advanced Communication Technology, 2005, ICACT 2005. The 7th International Conference on, 2005, pp. 1059-1063. [36] A. K. Pathan, L. Hyung-Woo, and H. Choong-seon, 'Security in wireless sensor networks: issues and challenges,' in Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference, 2006, pp. 6 pp.-1048. [37] I. C. Ray, C. Chin-Chun, and C. Yu-Lin, 'An efficient anonymous scheme for computer and communication privacy,' in Security Technology, 2004. 38th Annual 2004 International Carnahan Conference on, 2004, pp. 199-203. [38] R.-I. Chang and C.-C. Chu, 'An Efficient Anonymous Scheme for Mutual Anonymous Communications,' in Networking - ICN 2005. vol. 3421, P. Lorenz and P. Dini, Eds., ed: Springer Berlin Heidelberg, 2005, pp. 835-843. [39] F. Osterlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt, 'Cross-level sensor network simulation with cooja,' in Local Computer Networks, Proceedings 2006 31st IEEE Conference on, 2006, pp. 641-648. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/17000 | - |
| dc.description.abstract | 近年來,物聯網這個詞已經廣為人知,身為物聯網之感知層的無線感測網路
的發展也越來越迅速,由於硬體的發展,感測器節點可以執行越來越複雜的任務。 另一方面,由於點對點技術的特性及其成熟度,此時正為將點對點技術帶入無線 感測網路的好時機。 由於點對點網路的特性,可以將各個節點的資源大幅整合,將資料有效率地 儲存與取用,並可以藉此取代掉原先中央伺服器的工作,增加無線感測網路的可 擴充性,健壯度,以及降低建置時的成本與困難度。但是點對點網路所帶來的網 路負荷與安全性問題都需要做更進一步的研究。本研究提出一種基於分散式雜湊 表的無線感測網路系統,從各個角度分析探討之,並以匿名通訊之方法做基本的 安全強化。 | zh_TW |
| dc.description.provenance | Made available in DSpace on 2021-06-07T23:52:41Z (GMT). No. of bitstreams: 1 ntu-102-R00525036-1.pdf: 3126758 bytes, checksum: be8d11701875d58567e6a5ef849a84eb (MD5) Previous issue date: 2013 | en |
| dc.description.tableofcontents | 誌謝 i
中文摘要 ii ABSTRACT iii CONTENTS iv LIST OF FIGURES vi LIST OF TABLES viii Chapter 1 Introduction 1 1.1 Background 1 1.2 Motivation 5 1.3 Thesis Organization 6 Chapter 2 Background on WSN and P2P 7 2.1 Wireless Sensor Network Overview 7 2.1.1 Hardware and Software 8 2.1.2 Network Structure 14 2.2 Peer to Peer Overview 16 2.2.1 Peer to Peer System 16 2.2.2 Peer to Peer Classification 19 Chapter 3 Proposed DHT-Based WSN System 24 3.1 Combining WSN and P2P 24 3.2 DHT-Based WSN 27 3.3 Network Security Improvement 30 Chapter 4 Implementation and Results 33 4.1 Design and architecture of simulation 33 4.2 Peer to Peer Protocol verifying Results 35 4.3 Security Improved System Test Results 40 Chapter 5 Summary and Conclusions 43 5.1 Conclusions 43 5.2 Future Works 44 REFERENCE 45 | |
| dc.language.iso | en | |
| dc.subject | 分散式雜湊表 | zh_TW |
| dc.subject | 點對點技術 | zh_TW |
| dc.subject | 無線感測網路 | zh_TW |
| dc.subject | 資料管理 | zh_TW |
| dc.subject | 匿名通訊 | zh_TW |
| dc.subject | Distributed Hash Table | en |
| dc.subject | Data Management | en |
| dc.subject | Peer to Peer Protocol | en |
| dc.subject | Wireless Sensor Network | en |
| dc.subject | Anonymous Communication | en |
| dc.title | 在無線感測網路中使用點對點協定之匿名通訊 | zh_TW |
| dc.title | Design and Implementation of Peer to Peer Protocol with Anonymous Communication in Wireless Sensor Network | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 102-1 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 張瑞益,林致廷,翟駿逸 | |
| dc.subject.keyword | 無線感測網路,點對點技術,分散式雜湊表,資料管理,匿名通訊, | zh_TW |
| dc.subject.keyword | Wireless Sensor Network,Peer to Peer Protocol,Distributed Hash Table,Data Management,Anonymous Communication, | en |
| dc.relation.page | 47 | |
| dc.rights.note | 未授權 | |
| dc.date.accepted | 2013-12-04 | |
| dc.contributor.author-college | 工學院 | zh_TW |
| dc.contributor.author-dept | 工程科學及海洋工程學研究所 | zh_TW |
| 顯示於系所單位: | 工程科學及海洋工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-102-1.pdf 未授權公開取用 | 3.05 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
