請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/7484
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 施吉昇 | |
dc.contributor.author | Kai-Wei Yang | en |
dc.contributor.author | 楊凱崴 | zh_TW |
dc.date.accessioned | 2021-05-19T17:44:40Z | - |
dc.date.available | 2021-08-14 | |
dc.date.available | 2021-05-19T17:44:40Z | - |
dc.date.copyright | 2018-08-14 | |
dc.date.issued | 2018 | |
dc.date.submitted | 2018-08-12 | |
dc.identifier.citation | [1] “Ntt security, global threat intelligence center (gtic) 2017 q2 threat intelligence report,” 2017. [Online]. Available: https://www.nttsecurity.com/en-us/gtic-2017- q2-threat-intelligence-report
[2] “Fujitsu: These are the advantages of iota over blockchain,” 2018. [Online]. Available: https://iota-news.com/fujitsu-these-are-the-advantages-of-iota- over-blockchain [3] S.. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. [4] P. Serguei, “The tangle,” 2017 [5] “Iota introduction,” [Online]. Available: https://iota.readme.io/docs/what-is-iota [6] L. Lamport, “Constructing digital signatures from a one-way function,” Technical Report CSL-98, SRI International Palo Alto, Tech. Rep., 1979. [7] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for iot security and privacy: The case study of a smart home,” in 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), March 2017, pp. 618-623. [8] Z. Wu, Z. Meng, and J. Gray, “Iot-based techniques for online m2m-interactive itemized data registration and of ine information traceability in a digital manufacturing system,” IEEE Transactions on Industrial Informatics, vol. 13, no. 5, pp. 2397-2405, Oct 2017. [9] “How addresses are used in iota.” [Online]. Available: https://iotasupport.com/how- addresses-are-used-in-IOTA.shtm [10] “Very basic estimates on the risk of reusing the winternitz signatures.”[Online]. Available: https://public.tangle.works/winternitz.pdf [11] Y. Shin, J. H. Hayes, and J. Cleland-Huang, “A framework for evaluating traceability benchmark metrics,” 2012. [12] N. Komninos, E. Philippou, and A. Pitsillides, “Survey in smart grid and smart home security: Issues, challenges and countermeasures,” IEEE Communications Surveys Tutorials, vol. 16, no. 4, pp. 1933-1954, Fourthquarter 2014. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/7484 | - |
dc.description.abstract | 在競爭激烈的市場中,如何提高生產效率、產品品質管理都是現今開發商和工廠所面臨的挑戰,由於缺乏機台資料整合及生產回溯追蹤,要找出問題根源並不容易。在現代的工廠中,生產流程上可能會有生產線合併或是分支等情形,每台生產線上的機台都會紀錄大量的傳感器數據以及機台資訊,但現今的工廠管理系統未必能有效地運用及負荷如此龐大的數據。
在這份研究中,我們設計一套基於區塊鏈的分散式生產流程追溯系統,並且在輕量級裝置的物聯網上實作,目的是提升工廠生產線的穩定性,降低生產不良率,最佳化工廠生產效能。去中心化的架構擁有部份容錯性以及可擴性,並且能夠更穩定的運作,發揮分散式系統的潛能。有了較佳的可擴性以及資料整合性,分散式帳本網路能夠在蒐集資料的同時確保資料安全並且有實力建造公開生產追溯系統,允許多家工廠在不用互相信任的前提下一同打造公開透明的生產追溯生態系統。 | zh_TW |
dc.description.abstract | In today's competitive business environment, manufacturing enterprises are facing the challenges of productivity improvement, product and process quality management due to the lack of data interaction and manufacturing process traceability. In modern factory, number of machineries are pipelined into assembly/production lines which may merge and branch to meet the procedure requirements. Each machine on the assembly line produce huge amount of sensing data and manufacturing data. However, many manufacturing system are not ready to manage big data.
This thesis aims on developing the distributed traceability system with Blockchain technology on IoT devices in order to improve the stability of the factory production line, to reduce defect rate and to bring the operational performance to a new level. Without depending on centralized storage, it is a robust, truly distributed peer-to-peer system and capable of node failure tolerance. With better scalability and data interaction, this distributed ledger network enables the use of data collection with security and potential of public traceability system protocol which allows multiple factories to participate, build an ecosystem of traceability together. | en |
dc.description.provenance | Made available in DSpace on 2021-05-19T17:44:40Z (GMT). No. of bitstreams: 1 ntu-107-R05922138-1.pdf: 1445620 bytes, checksum: e5e5ae2f88f891e8ff9eb580e1d2c579 (MD5) Previous issue date: 2018 | en |
dc.description.tableofcontents | 1 Introduction 1
1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Contribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3 Thesis Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 Background and Related Work 5 2.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.1.1 Blockchain Technology . . . . . . . . . . . . . . . . . . . . . . 5 2.1.2 IOTA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.1.3 Masked Authenticated Messaging . . . . . . . . . . . . . . . . . 7 2.2 Related works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 3 System Architecture and Problem Denition 10 3.1 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.1.1 Communication protocol . . . . . . . . . . . . . . . . . . . . . . 10 3.2 Problem Denition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.3 Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 4 Design and Implementation 15 4.1 Message creation ow . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 4.2 Channel management . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 4.3 Back trace path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 5 Performance Evaluation 21 5.1 Traceability Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 5.2 Storage Overhead . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 5.3 Time Overhead . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 5.4 Security Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 5.4.1 Non reusable addresses . . . . . . . . . . . . . . . . . . . . . . . 26 5.4.2 Seed must be securely stored . . . . . . . . . . . . . . . . . . . . 27 5.4.3 Forward secrecy of message chain . . . . . . . . . . . . . . . . . 27 5.5 Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 6 Conclusion 28 Bibliography 29 | |
dc.language.iso | en | |
dc.title | 基於區塊鏈之工廠生產紀錄與產品履歷技術設計與實作 | zh_TW |
dc.title | Design and Implementation of Distributed Traceability System for Smart Factories based on Blockchain Technology | en |
dc.type | Thesis | |
dc.date.schoolyear | 106-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 楊佳玲,徐慰中 | |
dc.subject.keyword | 工業4.0,智慧工廠,生產回溯追蹤系統,區塊鏈,分散式帳本網路,機器對機器, | zh_TW |
dc.subject.keyword | Industry 4.0,Smart factory,Traceability system,Blockchain, Distributed ledger network,Machine-To-Machine (M2M), | en |
dc.relation.page | 31 | |
dc.identifier.doi | 10.6342/NTU201802852 | |
dc.rights.note | 同意授權(全球公開) | |
dc.date.accepted | 2018-08-13 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
顯示於系所單位: | 資訊工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-107-1.pdf | 1.41 MB | Adobe PDF | 檢視/開啟 |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。