請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/70003完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 蕭旭君(Hsu-Chun Hsiao) | |
| dc.contributor.author | Shao-Chuan Lee | en |
| dc.contributor.author | 李紹詮 | zh_TW |
| dc.date.accessioned | 2021-06-17T03:38:20Z | - |
| dc.date.available | 2019-02-23 | |
| dc.date.copyright | 2018-02-23 | |
| dc.date.issued | 2018 | |
| dc.date.submitted | 2018-02-09 | |
| dc.identifier.citation | [1] August Smart Lock Pro + Connect - Apple. https://web.archive.org/web/20180113082033/https://www.apple.com/shop/product/HLRU2LL/A/august-smart-lock-pro-connect. Retrieved 2018-01-13.
[2] Breaking Down Mirai: An IoT DDoS Botnet Analysis. https://web.archive.org/web/20180120073957/https://www.incapsula.com/blog/malware-analysis-mirai-ddos-botnet.html. Retrieved 2018-01-20. [3] Digital Signature Standard (DSS). National Institute of Standards and Technology, July 2013. [4] M. M. A. Allah. Strengths and Weaknesses of Near Field Communication (NFC) Technology. Global Journal of Computer Science and Technology, 11(3), 2011. [5] Bluetooth SIG. Security Manager Specification. In Bluetooth Specification Version 4.2 [Vol 3, Part H], pages 587–702. 2014. [6] D. Chaves-Diéguez, A. Pellitero-Rivero, D. García-Coego, F. J. González-Castaño, P. S. Rodríguez-Hernández, Ó. Piñeiro-Gómez, F. Gil-Castiñeira, and E. CostaMontenegro. Providing IoT Services in Smart Cities through Dynamic Augmented Reality Markers. Sensors (Basel, Switzerland), 15(7):16083–104, 2015. [7] Y.-S. Chen, C.-Y. Lin, H.-C. Hsiao, Y.-H. Lin, and H.-M. Tsai. Poster: VLC-based Authenticated Key Exchange. In IEEE Symposium on Security and Privacy, 2016. [8] C. Cremers. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In Computer Aided Verification, 20th International Conference, CAV 2008, Princeton, USA, Proc., volume 5123/2008 of Lecture Notes in Computer Science, pages 414–418. Springer, 2008. [9] W. Diffie and M. E. Hellman. New Directions in Cryptography. IEEE Transactions on Information Theory, 22(6):644–654, 1976. [10] D. Dolev and A. C. Yao. On the Security of Public Key Protocols. IEEE Transactions on Information Theory, 29(2):198–208, 1983. [11] P. J. Grabner and H. Prodinger. Maximum Statistics of N Random Variables Distributed by the Negative Binomial Distribution. Combinatorics Probability and Computing, 6(2):179–183, 1997. [12] M. Hermann, T. Pentek, and B. Otto. Design Principles for Industrie 4.0 Scenarios. In Proceedings of the Annual Hawaii International Conference on System Sciences, volume 2016-March, pages 3928–3937, 2016. [13] R. Jin, L. Shi, K. Zeng, A. Pande, and P. Mohapatra. MagPairing: Pairing Smartphones in Close Proximity Using Magnetometers. IEEE Transactions on Information Forensics and Security, 11(6):1306–1320, 2016. [14] A. Jovicic, J. Li, and T. Richardson. Visible light communication: Opportunities, challenges and the path to market. IEEE Communications Magazine, 51(12):26–32, 2013. [15] H.-Y. Lee, H.-M. Lin, Y.-L. Wei, H.-I. Wu, H.-M. Tsai, and K. C.-J. Lin. RollingLight: Enabling Line-of-Sight Light-to-Camera Communications. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services - MobiSys ’15, pages 167–180, 2015. [16] J. McCune, A. Perrig, and M. Reiter. Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. In IEEE Symposium on Security and Privacy, pages 110–124. IEEE, 2005. [17] I. S. Reed and G. Solomon. Polynomial Codes Over Certain Finite Fields. Journal of the Society for Industrial and Applied Mathematics, 8(2):300–304, 1960. [18] R. D. Roberts. Undersampled Frequency Shift ON-OFF Keying (UFSOOK) for Camera Communications (CamCom). In 22nd Wireless and Optical Communication Conference. IEEE, 2013. [19] T. Rosa. Bypassing Passkey Authentication in Bluetooth Low Energy. IACR Cryptology ePrint Archive, pages 2–4, 2013. [20] K. Sato, N. Sakamoto, and H. Shimada. Visualization and Management Platform with Augmented Reality for Wireless Sensor Networks. Wireless Sensor Network, 07(01):1–11, 2015. [21] N. Saxena, J. E. Ekberg, K. Kostiainen, and N. Asokan. Secure Device Pairing Based on a Visual Channel: Design and Usability Study. IEEE Transactions on Information Forensics and Security, 6(1):28–38, 2011. [22] S. Viehböck. Brute forcing Wi-Fi Protected Setup. http://web.archive.org/web/20180120075456/https://packetstorm.foofus.com/papers/wireless/viehboeck_wps.pdf, 2011. [23] J. S. Warner and R. G. Johnston. GPS Spoofing Countermeasures. Los Alamos National Laboratory, pages 13–16, 2003. [24] Y.-L. Wei, C.-J. Huang, H.-M. Tsai, and K. C.-J. Lin. CELLI: Indoor Positioning Using Polarized Sweeping Light Beams. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services - MobiSys ’17, pages 136–147, 2017. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/70003 | - |
| dc.description.abstract | 在智慧型工廠的應用情境中,物聯網設備的管理是一項巨大的挑戰。常見的金鑰建立機制並未注重安全性,或者有設計上的缺陷並證實可以被攻擊,抑或是因為預算以及裝置本身規格而難以實際運用。此外,在基於位置的裝置管理中,使用者可以迅速找到裝置的物理位置,並且可以直覺地跟周遭的裝置互動,然而過往的管理方案也並不重視安全性。另一項問題是對已經建立金鑰的裝置進行持續驗證,因為可能會被攻擊者替換為惡意的裝置以干擾工廠正常運作。在這篇論文中,我們提出一個既實務又安全的設備管理方案。這個方案利用了可見光通訊的性質,達成與設備間安全的金鑰交換、從物理上認證裝置的位置以供基於擴增實境的管理介面使用、以及利用已交換的金鑰進行持續驗證及位置更新。我們透過基於藍牙低功耗標準的實作來顯示本文提出方案的可行性,同時對此方案就安全性、可部署性以及可用性進行評估。實驗結果顯示,當同時與多台裝置進行配對時,相較於藍牙低功耗的配對碼輸入驗證,使用我們的實作可以加速達兩倍以上。 | zh_TW |
| dc.description.abstract | In smart factory applications, management of IoT devices is a challenging task. Common bootstrapping practices are either not aware of security, have design flaws and shown vulnerable to attacks, or have deployment difficulties due to budget and form factor constraints. On the other hand, location-based management of devices, in which the user may rapidly locate devices and interact with devices at proximity in an intuitive manner, has not been done securely in previous proposals. Another problem is continuous authentication of bootstrapped devices, as devices might be replaced with malicious ones by attackers in order to disrupt normal operations. In this thesis, we propose a practical yet secure device management solution based on various properties of visible light communication (VLC). VLC enables secure key exchange with peripherals, provide physically authenticated location information for peripheral management in an augmented reality (AR) view, as well as continuous authentication and location update using exchanged keys. We demonstrate the feasibility of proposed scheme with an implementation based on Bluetooth Low Energy (BLE) and evaluate in terms of security, deployability and usability. Experiment results show that when pairing with multiple devices at once, more that 2x speedup is achieved using our implementation compared to BLE Passkey Entry. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-17T03:38:20Z (GMT). No. of bitstreams: 1 ntu-107-R05922001-1.pdf: 5671958 bytes, checksum: 66122039a9399a2acc001ef2349a9a0e (MD5) Previous issue date: 2018 | en |
| dc.description.tableofcontents | 口試委員會審定書 i
誌謝 ii Acknowledgements iii 摘要 iv Abstract v 1 Introduction 1 2 Background 4 2.1 Authentication in RF-based Bootstrapping . . . . . . . . . . . . . . . . . 4 2.2 Security of Bluetooth Low Energy (BLE) . . . . . . . . . . . . . . . . . 6 2.3 Visible Light Communication (VLC) . . . . . . . . . . . . . . . . . . . . 8 2.4 Augmented Reality (AR)-assisted Device Management . . . . . . . . . . 9 3 Problem Definition 11 3.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.2 Attacker Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.3 Desired Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 4 Proposed Solution 14 4.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 4.2 Secure Key Exchange with Mutual Authentication . . . . . . . . . . . . . 16 4.3 Peripheral Positioning and Interaction in Augmented Reality . . . . . . . 17 4.4 Continuous Authentication and Location Tracking . . . . . . . . . . . . . 20 5 Implementation 22 6 Evaluation 24 6.1 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 6.2 Deployability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 6.3 Usability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 6.3.1 Experiment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 6.3.2 Results and Analysis . . . . . . . . . . . . . . . . . . . . . . . . 28 6.4 Comparison of Pairing Schemes . . . . . . . . . . . . . . . . . . . . . . 30 7 Conclusion 32 Bibliography 33 | |
| dc.language.iso | en | |
| dc.subject | 工業 4.0 | zh_TW |
| dc.subject | 物聯網 | zh_TW |
| dc.subject | 金鑰建立機制 | zh_TW |
| dc.subject | 基於位置的裝置管理 | zh_TW |
| dc.subject | 可見光通訊 | zh_TW |
| dc.subject | 擴增實境 | zh_TW |
| dc.subject | 藍牙低功耗 | zh_TW |
| dc.subject | Visible Light Communication | en |
| dc.subject | Industry 4.0 | en |
| dc.subject | Device Bootstrapping | en |
| dc.subject | Location-based Device Management | en |
| dc.subject | Bluetooth Low Energy | en |
| dc.subject | Augmented Reality | en |
| dc.subject | Internet of Things | en |
| dc.title | 利用可見光通訊之實用且安全的物聯網設備管理方案 | zh_TW |
| dc.title | Practical and Secure IoT Device Management using Visible Light | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 106-1 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 吳家麟(Ja-Ling Wu),施吉昇(Chi-Sheng Shih),蔡欣穆(Hsin-Mu Tsai) | |
| dc.subject.keyword | 物聯網,工業 4.0,金鑰建立機制,基於位置的裝置管理,可見光通訊,擴增實境,藍牙低功耗, | zh_TW |
| dc.subject.keyword | Internet of Things,Industry 4.0,Device Bootstrapping,Location-based Device Management,Visible Light Communication,Augmented Reality,Bluetooth Low Energy, | en |
| dc.relation.page | 35 | |
| dc.identifier.doi | 10.6342/NTU201800065 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2018-02-10 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
| 顯示於系所單位: | 資訊工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-107-1.pdf 未授權公開取用 | 5.54 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
