請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/46271
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 張瑞益 | |
dc.contributor.author | Chien-Wen Chiang | en |
dc.contributor.author | 江建文 | zh_TW |
dc.date.accessioned | 2021-06-15T05:00:59Z | - |
dc.date.available | 2012-08-03 | |
dc.date.copyright | 2010-08-03 | |
dc.date.issued | 2010 | |
dc.date.submitted | 2010-07-27 | |
dc.identifier.citation | [1] F. Akyildiz, W. Su, Y. Sankarasubranmaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Communications, vol. 40, no.8, pp. 102-114, Aug. 2002.
[2] E. Fasolo, and M. Rossi, “In-Network Aggregation Techniques for Wireless Sensor Networks: a Survey,” IEEE Wireless Communications, vol.14, no.2, pp.70-87, Apr. 2007. [3] S. Palazzo, F. Cuomo, and L. Galluccio, Data Aggregation in Wireless Sensor Networks: A Multifaceted Perspective, Springer Berlin /Heidelberg, 2009. [4] R. Rajagopalan, and P. K. Varshney, “Data Aggregation Techniques in Sensor Networks: A Survey,” IEEE Communication Survey & Tutorials, vol. 8, no. 4, pp.48-63, 2006. [5] P. Mohanty, N. Sarma, S. Panigrahi, and S. S. Satapathy, “A Symmetric Key Based Secured Data Gathering Protocol for WSN,” in Proc. International Conference on Anti-Counterfeiting, Security, and Identification in Communication, Hong Kong, China, pp.138-143, 2009. [6] J. Jones, and Z. J. Haas, “Predeployed Secure Key Distribution Mechanisms in Sensor Networks: Current State-of-the-Art and a New Approach using Time Information,” IEEE Wireless Communication, vol. 15, no. 4, pp.42-51, Aug. 2008. [7] M. Dustin, J. Shankarappa, M. Petrowski, H. Weerasingha, and H. Fu, “Analysis of Key Management in Wireless Sensor Networks,” in Proc. IEEE Electro/Information Technology Conference, Chicago, USA, pp.263-271, May, 2007. [8] Y. Cheng, and D. P. Agrawal, “Efficient Pairwise Key Establishment and Management in Static Wireless Sensor Networks,” in Proc. Mobile Ad Hoc and Sensor System Conference, Washington, DC, USA, Nov. 2005. [9] L. Eschenauer ,and V. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” in Proc. conference on Computer and Communications Security, Washington, DC, USA, pp. 41-47, Nov. 2002. [10] Q. Niu, “Study and Implementation of a Improved Group Key Protocol for Mobile Ad Hoc Networks,” in Proc. International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Qingdao, China, pp.304-308, July, 2001. [11] D. Liu, P. Ning, and W. Du, “Group-Based Key Pre-distribution in Wireless Sensor Networks,” ACM Transactions on Sensor Networks, vol. 4, no. 2, Article 11, Mar. 2008. [12] C. C. Chang, S. Arafa, and S. Muftic, “Key Establishment Protocol for Wireless Sensor Networks,” in Proc. IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, Italy, Oct. 2007. [13] S. Ozdemir, and Y. Xiao, “Secure Data Aggregation in Wireless Sensor Networks: A Comprehensive Overview,” Computer Networks, vol. 53, no. 12, pp. 2022-2037, Aug. 2009. [14] Y. Sang, and H.Shen, “Secure Data Aggregation in Wireless Sensor Networks: A Survey,” in Proc. International Conference on Parallel and Distributed Computing, Applications and Technologies, Taipei, Taiwan, pp.315-320, Dec. 2007. [15] B. Przydatek, H. Chan, A. Perrig , and D. Song, “SIA: Secure information aggregation in sensor networks,” Journal of Computer Security, vol. 15, no. 1 pp. 69-102, Jan. 2007. [16] H. O. Sanli, S Ozdemir, and H. Cam,“SRDA: Secure Reference-Based Data Aggregation Protocol for Wireless Sensor Networks,” in Proc. IEEE Vehicular Technology Conference, Los Angeles, USA, pp. 4650-4654, Sep. 2004. [17] J. Girao, and D. Westhoff, “CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks,” in Proc. IEEE International Conference on Communications, Seoul, Korea, pp. 3044-3049, 2005. [18] D. Wagner, Cryptanalysis of an Algebraic Privacy Homomorphism, Springer Berlin/Heidelberg, 2003. [19] A. Parakh ,and S. Kak, “Online Data Storage using Implicit Security,” Information Science, vol. 179, no. 19, pp. 3323-3331, Sep. 2009. [20] S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong, “TAG: A Tiny Aggregation Service for Ad-Hoc Sensor Networks,” in Proc. Symposium on Operating Systems Design and Implementation, Boston, USA, pp. 131-146, Dec. 2002. [21] F. Amin, A. H. Jahangir, and H. Rasifard, “Analysis of Public-Key Cryptography for Wireless Sensor Networks Security,” in Proc. World Academy of Science, Engineering and Technology, Montreal, Canada, pp.529-534, May, 2008. [22] X. Chen, K. Makki, K. Yen, and N. Pissinou, “Sensor Network Security: A Survey,” IEEE Communication Survey & Tutorials, vol.11, no. 2, pp.52-73, 2009. [23] H. K. Kalita, and A. Kar, “Wireless Sensor Network Security Analysis,” International Journal of Next-Generation Networks, vol. 1, no.1, Dec. 2009. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/46271 | - |
dc.description.abstract | 無線感測網路(Wireless Sensor Networks)最主要的應用為監測目標環境,並將蒐集到的資料傳回基地台,以供使用者作分析或處理。由於無線感測資源的限制,在蒐集資料並同時對資料做處理,可以減少封包的傳送量,此種技術稱為資料聚合。然而在聚合的功能被執行時,攻擊者可能會針對聚合節點(Aggregator)進行攻擊,進而產生錯誤的聚合結果。近年來,許多學者提出安全資料聚合的機制,但在安全性與通訊負擔方面的考量,往往不夠周全。本論文提出三種分組演算法作比較,分別為Top-down分組演算法、Bottom-up分組演算法與以聚合節點演算法,將網路分為多個群組,其中由實驗結果可以看出以聚合節點分組演算法最有效率,與Top-down分組演算法、Bottom-up分組演算法相比,大約可以節省16%~36%的加解密次數,以減少資料傳輸時所耗費的計算時間與電力。此外我們提出一個使用隱蔽式安全技術的金鑰分配機制,其時間複雜度只要 ,使節點產生群組金鑰(Group Key),保證資料傳輸的安全性。而每個節點所儲存的金鑰只要儲存一個金鑰分割區塊(Key Partition)、一個群組金鑰參數(Group Key Parameter)與雜湊函數即可,由於只使用對稱式加密與雜湊函數,可減輕節點的計算負擔。另外,本機制符合大部分的安全需求,並可以抵擋無線感測網路上一些著名的攻擊,證明了本機制不僅資源消耗少,也可兼具安全性。 | zh_TW |
dc.description.abstract | The major application of WSN (Wireless Sensor Networks) is to monitor the environment and transmit the sensed data to the base station. Because sensor nodes are resource limitation, we need a technique called data aggregation to collect and process the sensed data in networks. The data aggregation technique can reduce the packet numbers of data transmitted. However, the attacker may attack the aggregator node to cause the wrong aggregation result. Although different secure data aggregation schemes were proposed recently, they are not complete on the considerations of security and communication overhead. This paper proposes a key distribute scheme that bases on an implicit security technology. We propose and compare 3 grouping algorithms, Top-down grouping algorithm, Bottom-up algorithm, and ABG (Aggregator Based Grouping) algorithm. Experiments show that ABG can save about 16%~ 36% computations of encrypted and decrypted data. Each node generates a group key and stores a group parameter to protect the data, and the time complexity of generating key is . Each node stores a group parameter and a hash function. Because of the scheme uses the symmetric encryption and hash function, it can reduce the computation overhead of nodes. The scheme conform most of security requirement, and it can resist some well-know attacks. So the scheme not only consumes less resource, but also safety. | en |
dc.description.provenance | Made available in DSpace on 2021-06-15T05:00:59Z (GMT). No. of bitstreams: 1 ntu-99-R97525036-1.pdf: 1764912 bytes, checksum: de847d9b6576ddb53d24354dec8c54bb (MD5) Previous issue date: 2010 | en |
dc.description.tableofcontents | 第一章 緒論 1
1.1 前言 1 1.2 研究背景與動機 1 1.3 架構 3 第二章 相關研究 4 2.1 傳統金鑰分配方式 4 2.2 安全資料聚合機制 7 2.2.1 SIA: Secure Information Aggregation 7 2.2.2 SRDA: Secure Reference-based Data Aggregation Protocol 8 2.2.3 CDA: Concealed Data Aggregation 8 2.3 隱蔽式安全技術 9 第三章 系統架構 12 3.1 系統假設 12 3.2.1 符號定義表 13 3.2 系統架構 13 第四章 系統詳細流程 17 4.1網路建構階段 17 4.2 分組演算法 17 4.2.1 Top-down分組演算法 18 4.2.2 Bottom-up分組演算法 19 4.2.3以聚合節點分組之演算法 21 4.2.4三種分組演算法之分析與比較 23 4.3 金鑰分配與資料安全聚合 25 4.3.1 群組金鑰的產生 25 4.3.2群組金鑰實例 26 4.4 動態金鑰與節點管理 28 第五章 實驗結果與分析 30 5.1 實驗結果 30 5.1.1 實驗設定 30 5.1.2加解密次數實驗分析 30 5.1.3 平均儲存群組金鑰參數個數實驗分析 38 5.2 安全與效能分析 42 5.2.1 安全性需求 42 5.2.2 抵抗攻擊 43 5.3 時間複雜度 45 5.4傳遞封包大小 45 第六章 結論 46 參考文獻 47 | |
dc.language.iso | zh-TW | |
dc.title | 在無線感測網路中使用隱蔽式安全技術之資料聚合 | zh_TW |
dc.title | A Secure Data Aggregation Scheme using Implicit Security Technology for Wireless Sensor Networks | en |
dc.type | Thesis | |
dc.date.schoolyear | 98-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 王家輝,吳文中,丁肇隆 | |
dc.subject.keyword | 無線感測網路,安全資料聚合,金鑰分配與管理,隱蔽式安全,金鑰預先分配, | zh_TW |
dc.subject.keyword | Wireless sensor networks,Secure data aggregation,Key distribution and management,Implicit security,Key pre-distribution, | en |
dc.relation.page | 49 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2010-07-28 | |
dc.contributor.author-college | 工學院 | zh_TW |
dc.contributor.author-dept | 工程科學及海洋工程學研究所 | zh_TW |
顯示於系所單位: | 工程科學及海洋工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-99-1.pdf 目前未授權公開取用 | 1.72 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。