Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電機工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/43163
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor郭斯彥
dc.contributor.authorYu-De Linen
dc.contributor.author林育德zh_TW
dc.date.accessioned2021-06-15T01:40:14Z-
dc.date.available2012-07-23
dc.date.copyright2009-07-23
dc.date.issued2009
dc.date.submitted2009-07-14
dc.identifier.citation[1] J. Deng, R. Han, S. Mishra. Defending against Path-based DoS Attacks in Wireless Sensor Networks. Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2005.
[2] D. Liu, P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” Proceedings of the ACM Computer and Communications Security Conference (CCS), 2003.
[3] D. Liu and P. Ning, “Multi-Level _TESLA: Broadcast Authentication for Distributed Sensor Networks,” ACM Transactions in Embedded Computing Systems (TECS), Vol. 3, No. 4, pages 800-836, November 2004.
[4] D. J. Malan, M. Walsh, and M. D. Smith, “Implementaing Public-Key Infrastructure for Sensor Networks,” ACM Trans. on Sensor Networks (TOSN), 2008.
[5] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and Doug Tygar, “SPINS: Security Protocols for Sensor Networks,” Proceedings of the ACM The Annual International Conference on Mobile Computing and Networking (MobiCom), 2001.
[6] K. Ren, W. Lou, and Y. Zhang, “LEDS: providing location-aware end-to-end data security in wireless sensor networks,” Proceedings of the IEEE Conference on Computer Communications (INFOCOM), 2006.
[7] C. M. Yu, C. S. Lu, and S. Y. Kuo, “A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks,” Proceedings of the IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2009
[8] F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical En-route Filtering of Injected False Data in Sensor Networks,” Proceedings of the IEEE Conference on Computer Communications (INFOCOM), 2004.
[9] H. Yang, F. Ye, Y. Yuam, S. Lu, and W. Arbaugh, “Toward Resilient Security in Wireless Sensor Networks,” Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2005.
[10] S. Zhu, S.Setia, and S.Jajodia. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. Proceedings of the ACM Computer and Communications Security Conference (CCS), 2003.
[11] S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks,” Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2004.
[12] W. Zhang, N. Subramanian, and G. Wang, “Lightweight and Compromise-Resilient Message Authentication in Sensor Networks,” Proceedings of the IEEE Conference on Computer Communications (INFOCOM), 2008.
[13] W. Zhang, H. Song, S. Zhu, and G. Cao, “Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks,” Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2005
[14] B. Schneier, Applied Cryptography, John Wiley & Sons, 1996.
[15] L. Eschenauer and V. Gligor, ``A Key-management Scheme for Distributed sensor networks,’’ Proceedings of the ACM Computer and Communications Security Conference (CCS), 2002.
[16] H. Chan, A. Perrig, and D. Song, ``Random Key Predistribution Schemes for sensor networks,’’ Proceedings of the IEEE Symposium on Security and Privacy (Oakland), 2003.
[17] W. Du, J. Deng, Y. S. Han, and P. Varshney, ``A Pairwise Key Pre-Distriubtion Scheme for Wireless Sensor Networks,’’ Proceedings of the ACM Computer and Communications Security Conference (CCS), 2003.
[18] D. Liu and P. Ning, Establishing Pairwise Keys in Distributed Sensor Networks, Proceedings of the ACM Computer and Communications Security Conference (CCS), 2003.
[19] C. KrauB, M. Schneider, K. Bayarou, and C. Eckert, ``STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks,’’ Proceedings of the IEEE International Conference on Availability, Reliability and Security (ARES), 2007.
[20] Z. Yu and Y. Guan, ``A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks,’’ Proceedings of the IEEE Conference on Computer Communications (INFOCOM), 2006.
[21] T. Yuan, S. Zhang, Y. Zhong, and J. Ma, ``KAEF: An En-route Scheme of Filtering False Data inWireless Sensor Networks,’’ Proceedings of the IEEE International Performance Computing and Communications Conference (IPCCC), 2008.
[22] H. Yang and S. Lu, ``Commutative cipher based en-route filtering in wireless sensor networks,' Proceedings of the IEEE 60th Vehicular Technology Conference (VTC), 2004.
[23] Z. Yu and Y. Guan, ``A dynamic en-route scheme for filtering false data injection in wireless sensor networks,' Proceedings of the 3rd international ACM Conference on Embedded Networked Sensor Systems (SenSys), 2005.
[24] H. Y. Lee and T. H. Cho, ``Fuzzy based Security Threshold Determining for the Statistical En-Route Filtering in Sensor Networks,' Proceedings of the International Journal of Applied Mathematics and Computer Sciences, 2005.
[25] M. S. Kim and T. H. Cho, ``A Fuzzy-Based En-Route Filtering Scheme in Sensor Networks,' Proceedings of the Advanced Intelligent Computing Theories and Applications With Aspects of Theoretical and Methodological Issues (ICIC), 2007.
[26] M. S. Kim and T. H. Cho, ``A Multipath En-Route Filtering Method for Dropping Reports in Sensor Networks,' IEICE Transactions on Information and Systems, 2007.
[27] R. Hwang, and Y. H. Liu, C. Wang, ``An Energy-Efficient En-route Filtering False Data Scheme in Wireless Sensor Networks,' Proceedings of the International Computer Symposium (ICS), 2008.
[28] F. Delgosha and F. Fekri, ``A Multivariate Key-Establishment Scheme for Wireless Sensor Networks,' IEEE Transactions on Wireless Communications, vol. 8, no. 4, April, 2009.
[29] P. Tague and R. Poovendran, ``A canonical seed assignment model for key predistribution in wireless sensor networks,' ACM Transactions on Sensor Networks (TOSN), vol. 3, no. 4, 2007.
[30] D. Huang and D. Medhi, ``Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach,' ACM Transactions on Sensor Networks (TOSN), vol. 3, no. 3, 2007.
[31] Fang Liu and Xiuzhen Cheng, 'LKE: A Self-configuring Scheme for Location-aware Key Establishment in Wireless Sensor Networks', IEEE Transactions on Wireless Communications (TWC), Vol. 7, No. 1, pp. 224-232, January 2008.
[32] Liran Ma, Xiuzhen Cheng, Fang Liu, Jose Rivera, and Fengguang An, 'iPAK: An In-Situ Pairwise Key Bootstrapping Scheme for Wireless Sensor Networks,' IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 18 (8), pp.1174-1184, August 2007.
[33] Fang Liu, Xiuzhen Cheng, Liran Ma, and Kai Xing, ``SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks,' IEEE Transactions on Mobile Computing, pp. 858-868, Vol. 7, No. 7, July 2008.
[34] Y. Hu, A. Perrig, and D. Johnson, ``Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks,' Proceedings of the IEEE Conference on Computer Communications (INFOCOM), 2003.
[35] Y. Hu, A. Perrig, and D. Johnson, ``Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,' Proceedings of the ACM Workshop on Wireless Security (ACM WiSe), 2003.
[36] B. Parno, A. Perrig, and V. Gligor, ``Distributed Detection of Node Replication Attacks in Sensor Networks,' Proceedings of the IEEE Symposium on Security and Privacy (S&P), Oakland, CA, May, 2005.
[37] E. C. H. Nqai, J. Liu, and M. R. Lyu, ``On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks,' Proceedings of the IEEE International Conference on Communications (ICC), 2006.
[38] J. Newsome, E. Shi, D. Song, and A. Perrig, ``The Sybil Attack in Sensor Networks: Analysis and Defenses' Proceedings of the ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), 2004
[39] C. Krauß, M. Schneider, and C. Eckert, ``Defending against False-Endorsement-based DoS Attacks in Wireless Sensor Networks,’’ Proceedings of the first ACM conference on Wireless network security (WiSec), 2008.
[40] C. Krauß, M. Schneider, C. Eckert, ``An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs,' Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2008.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/43163-
dc.description.abstract無線感測網路是由具有限資源的sensor node 所組成的分散式系統,其可被應用於危險地區環境的觀測,例如:高山,沙漠,戰場的環境,並將傳回的觀測報告以幫助後端伺服器作出有效的結論以及正確的判斷,假如在這一網路中有數個sensor node被某不善人士(簡稱敵方)所占據,並且發送出錯誤的報告,則會擾亂後端伺服器的判斷而作出不正確的決定. 目前已有學者在提出傳遞訊息時過濾錯誤訊息的機制以避免錯誤的訊息傳回後端伺服器,而本論文則提出新的訊息認證的方法以助於過濾錯誤訊息.
這篇論文提出在無線感測網路系統下受限函數為基礎的訊息認證機制(以下簡稱CFA),此訊息認證機制可達到無線感測網路的訊息認證標準(目前現有的訊息認證機制只能達到訊息認證標準的部分要求),並且此認證機制可幫助在傳遞訊息時的錯誤訊息過濾.
在這篇論文中,我們從理論及實驗中驗證CFA機制的安全性及對系統資源的消耗,我們使用TelosB硬體架構做為實驗的硬體平台,以TinyOS系統開發環境實做CFA,並測量實驗的結果
zh_TW
dc.description.abstractThis thesis presents a Constrained Function based message Authentication (CFA) scheme for wireless sensor networks, which meets all the requirements of the so-called sensor authentication criteria, while most of the existing schemes only achieve partial requirements. In particular, to the best of our knowledge, CFA is the first authentication scheme supporting en-route filtering with only a single packet overhead. We examine the CFA scheme from the theoretical analysis to demonstrate the efficiency and security. Our method has also been practically implemented on the TelosB compatible mote for evaluating performance and resource overhead.en
dc.description.provenanceMade available in DSpace on 2021-06-15T01:40:14Z (GMT). No. of bitstreams: 1
ntu-98-R96921067-1.pdf: 661745 bytes, checksum: 772295869725b55d12944a374e9b1d21 (MD5)
Previous issue date: 2009
en
dc.description.tableofcontents口試委員會審定書 #
誌謝 i
摘要 ii
Abstract iii
CONTENTS iv
LIST OF FIGURES vi
LIST OF TABLES vii
Chapter 1 Introduction 1
1.1 Background 1
1.2 Securing Data Forwarding in Sensor Networks 2
1.3 Evaluation Metrics 5
1.4 Our Contributions 7
Chapter 2 Related Works 9
2.1 SEF [8] 11
2.2 IHA [11] 12
2.3 LBRS [9] 14
2.4 LEDS [6] 15
Chapter 3 The CFA Scheme 19
3.1 System Model 19
3.1.1 Network model 19
3.1.2 Threat model 20
3.2 Review of the CRPV+ Scheme [7] 20
3.3 Basic Idea 22
3.4 Off-line Step of CFA scheme 24
3.5 On-line Step of CFA scheme 25
3.5.1 Source node (Message transmission) 26
3.5.2 Destination node (Message verification) 26
3.6 Intermediate node (Message verification) 27
3.7 Constructing the Constrained Function Set 32
Chapter 4 Performance Evaluation 38
4.1 Storage Overhead 38
4.2 Computation Overhead 38
4.3 Communication Overhead (Packet Overhead) 39
4.4 Security 39
4.5 Comparison 40
Chapter 5 Experiment 43
5.1 Introduction to TinyOS 43
5.2 Introduction to NesC 45
5.3 Implementation Result 45
Chapter 6 CONCLUSION 47
REFERENCE 48
dc.language.isoen
dc.subject資料認證zh_TW
dc.subject安全zh_TW
dc.subject無線感測網路zh_TW
dc.subjectwireless sensor networken
dc.subjectdata authenticationen
dc.subjectsecurityen
dc.title無線感測網路上的資料認證機制zh_TW
dc.titleData Authentication Scheme for Wireless Sensor Networksen
dc.typeThesis
dc.date.schoolyear97-2
dc.description.degree碩士
dc.contributor.oralexamcommittee雷欽隆,呂毓隆,呂學坤,王思齊
dc.subject.keyword無線感測網路,安全,資料認證,zh_TW
dc.subject.keywordwireless sensor network,security,data authentication,en
dc.relation.page54
dc.rights.note有償授權
dc.date.accepted2009-07-15
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept電機工程學研究所zh_TW
顯示於系所單位:電機工程學系

文件中的檔案:
檔案 大小格式 
ntu-98-1.pdf
  未授權公開取用
646.24 kBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved