請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/43163完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 郭斯彥 | |
| dc.contributor.author | Yu-De Lin | en |
| dc.contributor.author | 林育德 | zh_TW |
| dc.date.accessioned | 2021-06-15T01:40:14Z | - |
| dc.date.available | 2012-07-23 | |
| dc.date.copyright | 2009-07-23 | |
| dc.date.issued | 2009 | |
| dc.date.submitted | 2009-07-14 | |
| dc.identifier.citation | [1] J. Deng, R. Han, S. Mishra. Defending against Path-based DoS Attacks in Wireless Sensor Networks. Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2005.
[2] D. Liu, P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” Proceedings of the ACM Computer and Communications Security Conference (CCS), 2003. [3] D. Liu and P. Ning, “Multi-Level _TESLA: Broadcast Authentication for Distributed Sensor Networks,” ACM Transactions in Embedded Computing Systems (TECS), Vol. 3, No. 4, pages 800-836, November 2004. [4] D. J. Malan, M. Walsh, and M. D. Smith, “Implementaing Public-Key Infrastructure for Sensor Networks,” ACM Trans. on Sensor Networks (TOSN), 2008. [5] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and Doug Tygar, “SPINS: Security Protocols for Sensor Networks,” Proceedings of the ACM The Annual International Conference on Mobile Computing and Networking (MobiCom), 2001. [6] K. Ren, W. Lou, and Y. Zhang, “LEDS: providing location-aware end-to-end data security in wireless sensor networks,” Proceedings of the IEEE Conference on Computer Communications (INFOCOM), 2006. [7] C. M. Yu, C. S. Lu, and S. Y. Kuo, “A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks,” Proceedings of the IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2009 [8] F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical En-route Filtering of Injected False Data in Sensor Networks,” Proceedings of the IEEE Conference on Computer Communications (INFOCOM), 2004. [9] H. Yang, F. Ye, Y. Yuam, S. Lu, and W. Arbaugh, “Toward Resilient Security in Wireless Sensor Networks,” Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2005. [10] S. Zhu, S.Setia, and S.Jajodia. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. Proceedings of the ACM Computer and Communications Security Conference (CCS), 2003. [11] S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks,” Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2004. [12] W. Zhang, N. Subramanian, and G. Wang, “Lightweight and Compromise-Resilient Message Authentication in Sensor Networks,” Proceedings of the IEEE Conference on Computer Communications (INFOCOM), 2008. [13] W. Zhang, H. Song, S. Zhu, and G. Cao, “Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks,” Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2005 [14] B. Schneier, Applied Cryptography, John Wiley & Sons, 1996. [15] L. Eschenauer and V. Gligor, ``A Key-management Scheme for Distributed sensor networks,’’ Proceedings of the ACM Computer and Communications Security Conference (CCS), 2002. [16] H. Chan, A. Perrig, and D. Song, ``Random Key Predistribution Schemes for sensor networks,’’ Proceedings of the IEEE Symposium on Security and Privacy (Oakland), 2003. [17] W. Du, J. Deng, Y. S. Han, and P. Varshney, ``A Pairwise Key Pre-Distriubtion Scheme for Wireless Sensor Networks,’’ Proceedings of the ACM Computer and Communications Security Conference (CCS), 2003. [18] D. Liu and P. Ning, Establishing Pairwise Keys in Distributed Sensor Networks, Proceedings of the ACM Computer and Communications Security Conference (CCS), 2003. [19] C. KrauB, M. Schneider, K. Bayarou, and C. Eckert, ``STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks,’’ Proceedings of the IEEE International Conference on Availability, Reliability and Security (ARES), 2007. [20] Z. Yu and Y. Guan, ``A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks,’’ Proceedings of the IEEE Conference on Computer Communications (INFOCOM), 2006. [21] T. Yuan, S. Zhang, Y. Zhong, and J. Ma, ``KAEF: An En-route Scheme of Filtering False Data inWireless Sensor Networks,’’ Proceedings of the IEEE International Performance Computing and Communications Conference (IPCCC), 2008. [22] H. Yang and S. Lu, ``Commutative cipher based en-route filtering in wireless sensor networks,' Proceedings of the IEEE 60th Vehicular Technology Conference (VTC), 2004. [23] Z. Yu and Y. Guan, ``A dynamic en-route scheme for filtering false data injection in wireless sensor networks,' Proceedings of the 3rd international ACM Conference on Embedded Networked Sensor Systems (SenSys), 2005. [24] H. Y. Lee and T. H. Cho, ``Fuzzy based Security Threshold Determining for the Statistical En-Route Filtering in Sensor Networks,' Proceedings of the International Journal of Applied Mathematics and Computer Sciences, 2005. [25] M. S. Kim and T. H. Cho, ``A Fuzzy-Based En-Route Filtering Scheme in Sensor Networks,' Proceedings of the Advanced Intelligent Computing Theories and Applications With Aspects of Theoretical and Methodological Issues (ICIC), 2007. [26] M. S. Kim and T. H. Cho, ``A Multipath En-Route Filtering Method for Dropping Reports in Sensor Networks,' IEICE Transactions on Information and Systems, 2007. [27] R. Hwang, and Y. H. Liu, C. Wang, ``An Energy-Efficient En-route Filtering False Data Scheme in Wireless Sensor Networks,' Proceedings of the International Computer Symposium (ICS), 2008. [28] F. Delgosha and F. Fekri, ``A Multivariate Key-Establishment Scheme for Wireless Sensor Networks,' IEEE Transactions on Wireless Communications, vol. 8, no. 4, April, 2009. [29] P. Tague and R. Poovendran, ``A canonical seed assignment model for key predistribution in wireless sensor networks,' ACM Transactions on Sensor Networks (TOSN), vol. 3, no. 4, 2007. [30] D. Huang and D. Medhi, ``Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach,' ACM Transactions on Sensor Networks (TOSN), vol. 3, no. 3, 2007. [31] Fang Liu and Xiuzhen Cheng, 'LKE: A Self-configuring Scheme for Location-aware Key Establishment in Wireless Sensor Networks', IEEE Transactions on Wireless Communications (TWC), Vol. 7, No. 1, pp. 224-232, January 2008. [32] Liran Ma, Xiuzhen Cheng, Fang Liu, Jose Rivera, and Fengguang An, 'iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks,' IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 18 (8), pp.1174-1184, August 2007. [33] Fang Liu, Xiuzhen Cheng, Liran Ma, and Kai Xing, ``SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks,' IEEE Transactions on Mobile Computing, pp. 858-868, Vol. 7, No. 7, July 2008. [34] Y. Hu, A. Perrig, and D. Johnson, ``Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks,' Proceedings of the IEEE Conference on Computer Communications (INFOCOM), 2003. [35] Y. Hu, A. Perrig, and D. Johnson, ``Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,' Proceedings of the ACM Workshop on Wireless Security (ACM WiSe), 2003. [36] B. Parno, A. Perrig, and V. Gligor, ``Distributed Detection of Node Replication Attacks in Sensor Networks,' Proceedings of the IEEE Symposium on Security and Privacy (S&P), Oakland, CA, May, 2005. [37] E. C. H. Nqai, J. Liu, and M. R. Lyu, ``On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks,' Proceedings of the IEEE International Conference on Communications (ICC), 2006. [38] J. Newsome, E. Shi, D. Song, and A. Perrig, ``The Sybil Attack in Sensor Networks: Analysis and Defenses' Proceedings of the ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), 2004 [39] C. Krauß, M. Schneider, and C. Eckert, ``Defending against False-Endorsement-based DoS Attacks in Wireless Sensor Networks,’’ Proceedings of the first ACM conference on Wireless network security (WiSec), 2008. [40] C. Krauß, M. Schneider, C. Eckert, ``An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs,' Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2008. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/43163 | - |
| dc.description.abstract | 無線感測網路是由具有限資源的sensor node 所組成的分散式系統,其可被應用於危險地區環境的觀測,例如:高山,沙漠,戰場的環境,並將傳回的觀測報告以幫助後端伺服器作出有效的結論以及正確的判斷,假如在這一網路中有數個sensor node被某不善人士(簡稱敵方)所占據,並且發送出錯誤的報告,則會擾亂後端伺服器的判斷而作出不正確的決定. 目前已有學者在提出傳遞訊息時過濾錯誤訊息的機制以避免錯誤的訊息傳回後端伺服器,而本論文則提出新的訊息認證的方法以助於過濾錯誤訊息.
這篇論文提出在無線感測網路系統下受限函數為基礎的訊息認證機制(以下簡稱CFA),此訊息認證機制可達到無線感測網路的訊息認證標準(目前現有的訊息認證機制只能達到訊息認證標準的部分要求),並且此認證機制可幫助在傳遞訊息時的錯誤訊息過濾. 在這篇論文中,我們從理論及實驗中驗證CFA機制的安全性及對系統資源的消耗,我們使用TelosB硬體架構做為實驗的硬體平台,以TinyOS系統開發環境實做CFA,並測量實驗的結果 | zh_TW |
| dc.description.abstract | This thesis presents a Constrained Function based message Authentication (CFA) scheme for wireless sensor networks, which meets all the requirements of the so-called sensor authentication criteria, while most of the existing schemes only achieve partial requirements. In particular, to the best of our knowledge, CFA is the first authentication scheme supporting en-route filtering with only a single packet overhead. We examine the CFA scheme from the theoretical analysis to demonstrate the efficiency and security. Our method has also been practically implemented on the TelosB compatible mote for evaluating performance and resource overhead. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-15T01:40:14Z (GMT). No. of bitstreams: 1 ntu-98-R96921067-1.pdf: 661745 bytes, checksum: 772295869725b55d12944a374e9b1d21 (MD5) Previous issue date: 2009 | en |
| dc.description.tableofcontents | 口試委員會審定書 #
誌謝 i 摘要 ii Abstract iii CONTENTS iv LIST OF FIGURES vi LIST OF TABLES vii Chapter 1 Introduction 1 1.1 Background 1 1.2 Securing Data Forwarding in Sensor Networks 2 1.3 Evaluation Metrics 5 1.4 Our Contributions 7 Chapter 2 Related Works 9 2.1 SEF [8] 11 2.2 IHA [11] 12 2.3 LBRS [9] 14 2.4 LEDS [6] 15 Chapter 3 The CFA Scheme 19 3.1 System Model 19 3.1.1 Network model 19 3.1.2 Threat model 20 3.2 Review of the CRPV+ Scheme [7] 20 3.3 Basic Idea 22 3.4 Off-line Step of CFA scheme 24 3.5 On-line Step of CFA scheme 25 3.5.1 Source node (Message transmission) 26 3.5.2 Destination node (Message verification) 26 3.6 Intermediate node (Message verification) 27 3.7 Constructing the Constrained Function Set 32 Chapter 4 Performance Evaluation 38 4.1 Storage Overhead 38 4.2 Computation Overhead 38 4.3 Communication Overhead (Packet Overhead) 39 4.4 Security 39 4.5 Comparison 40 Chapter 5 Experiment 43 5.1 Introduction to TinyOS 43 5.2 Introduction to NesC 45 5.3 Implementation Result 45 Chapter 6 CONCLUSION 47 REFERENCE 48 | |
| dc.language.iso | en | |
| dc.subject | 資料認證 | zh_TW |
| dc.subject | 安全 | zh_TW |
| dc.subject | 無線感測網路 | zh_TW |
| dc.subject | wireless sensor network | en |
| dc.subject | data authentication | en |
| dc.subject | security | en |
| dc.title | 無線感測網路上的資料認證機制 | zh_TW |
| dc.title | Data Authentication Scheme for Wireless Sensor Networks | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 97-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 雷欽隆,呂毓隆,呂學坤,王思齊 | |
| dc.subject.keyword | 無線感測網路,安全,資料認證, | zh_TW |
| dc.subject.keyword | wireless sensor network,security,data authentication, | en |
| dc.relation.page | 54 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2009-07-15 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
| 顯示於系所單位: | 電機工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-98-1.pdf 未授權公開取用 | 646.24 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
