請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/74955
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 施吉昇 | |
dc.contributor.author | Wei-Yu Hsieh | en |
dc.contributor.author | 謝崴宇 | zh_TW |
dc.date.accessioned | 2021-06-17T09:11:11Z | - |
dc.date.available | 2019-09-03 | |
dc.date.copyright | 2019-09-03 | |
dc.date.issued | 2019 | |
dc.date.submitted | 2019-08-30 | |
dc.identifier.citation | [1] S. Popov, “The tangle,” 2018. [Online]. Available: https://iota.org/IOTA_ Whitepaper.pdf
[2] H. Guo, E. Meamari, and C.-C. Shen, “Blockchain-inspired Event Recording System for Autonomous Vehicles,” 2018. [3] J. Kenney, “Dedicated short-range communications (dsrc) standards in the united states,” Proceedings of the IEEE, vol. 99, pp. 1162 – 1182, 08 2011. [4] R. Accorsi, “Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?” IEEE International Computer Software and Applications Conference, 2009. [5] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf [6] C. Chinchilla, “A next-generation smart contract and decentralized application platform,” 2014. [Online]. Available: https://github.com/ethereum/wiki/wiki/ White-Paper [7] G. Becker, “Merkle signature schemes, merkle trees and their cryptanalysis,” 2011. [Online]. Available: https://www.emsec.ruhr-uni-bochum.de/media/crypto/ attachments/files/2011/04/becker_1.pdf [8] “Event data recorder,” 2017. [Online]. Available: https://en.wikipedia.org/wiki/ Event_data_recorder [9] S. Vogt, “Is a double spending attack possible with iota?” 2017. [Online]. Available: http://www.tangleblog.com/2017/07/10/is-double-spending-possible-with-iota/ [10] N. Koblitz, “Elliptic curve cryptosystems,” Math. Comp. 48, pp. 203–209, 1987. [11] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no. 2, pp. 120–126, Feb. 1978. [12] “Secure hash algorithm 2.” [Online]. Available: https://en.wikipedia.org/wiki/ SHA-2 [13] S. Gueron, S. Johnson, and J. Walker, “Sha-512/256,” in 2011 Eighth International Conference on Information Technology: New Generations, April 2011, pp. 354–358. [14] J.-P. Aumasson, S. Neves, Z. Wilcox-O’Hearn, and C. Winnerlein, “Blake2: Simpler, smaller, fast as md5,” in Proceedings of the 11th International Conference on Applied Cryptography and Network Security, ser. ACNS’13. Berlin, Heidelberg: Springer-Verlag, 2013, pp. 119–135. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-38980-1_8 [15] M. Stevens, E. Bursztein, P. Karpman, A. Albertini, and Y. Markov, “The first collision for full sha-1,” 2017. [Online]. Available: https://shattered.io/static/ shattered.pdf [16] “Nvidia jetson tx2 module.” [Online]. Available: https://developer.nvidia.com/ embedded/jetson-tx2 [17] Y.Shin,J.H.Hayes,andJ.Cleland-Huang,“Aframeworkforevaluatingtraceability benchmark metrics,” 03 2012. [18] S.-J. Chang, R. Perlner, W. E Burr, M. Sönmez Turan, J. Kelsey, S. Paul, and L. Bassham, “Third-round report of the sha-3 cryptographic hash algorithm competition,” 07 2019. [19] Y. Hao, “The boomerang attacks on blake and blake2,” Cryptology ePrint Archive, Report 2014/1012, 2014, https://eprint.iacr.org/2014/1012. [20] T. Espitau, P.-A. Fouque, and P. Karpman, “Higher-order differential meet-in-the- middle preimage attacks on sha-1 and blake,” Cryptology ePrint Archive, Report 2015/515, 2015, https://eprint.iacr.org/2015/515. [21] D. Khovratovich, I. Nikolic, J. Pieprzyk, P. Sokolowski, and R. Steinfeld, “Rotational cryptanalysis of arx revisited,” Cryptology ePrint Archive, Report 2015/095, 2015, https://eprint.iacr.org/2015/095. [22] “Merkle–damgård construction.” [Online]. Available: https://en.wikipedia.org/wiki/ Merkle%E2%80%93Damg%C3%A5rd_construction [23] C. Dobraunig, M. Eichlseder, and F. Mendel, “Analysis of sha-512/224 and sha- 512/256,” Cryptology ePrint Archive, Report 2016/374, 2016, https://eprint.iacr.org/ 2016/374. [24] R.C.Merkle,“Acertifieddigitalsignature,”inAdvancesinCryptology—CRYPTO’ 89 Proceedings, G. Brassard, Ed. Springer New York, 1990, pp. 218–238. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/74955 | - |
dc.description.abstract | 自駕車能夠根據感測器的資料以及車輛間互相傳遞的資料在不需要人介入的情況下自動駕駛,但是當其發生事故時,自駕車過去收到的資料就會成為事故檢定和責任歸屬的重要依據。若沒有那些資料或是儲存的資料有誤我們便無法正確地還原事故發生時的情境,進而導致事故檢定的結果不正確,因此我們需要一個安全且即時的資料記錄系統來把車輛接觸過的資料紀錄下來。
本篇論文基於區塊鏈的技術提出了一個安全、即時且分散式的資料紀錄系統,使自駕車能夠在收到任何資料後即時地把資料記錄下來,並確保這些被紀錄的資料不會被任何人竄改,而去中心化的架構使得本系統有較高的容錯率和可擴展性。除了區塊鏈的技術以外,本篇論文提出的系統也加入了數位簽章以及密碼雜湊函數,以確保資料從發送端開始一直到進入我們的記錄系統都是一致的,若發生資料被竄改的情形也能夠得知資料是何時被竄改的。有了這些性質,我們提出的系統才能有效地在車聯網中部署,且其紀錄的資料也是安全且可回溯的。 | zh_TW |
dc.description.abstract | Autonomous vehicles are capable of nevigating without any intervention of human based on onboard sensor data and wayside sensor data. However, when an incident occurs, responsibility and liability must be indubitably decided based on those data received by vehicle in the past. Without those data or if the stored data is incorrect, one cannot reproduce the accident's scene correctly which will lead to incorrect result of accident forensic process. Therefore, we need a secure and real-time data logging system to record the data received by each vehicle.
In this work, we propose a secure, real-time, and distributed data logging system with higher fault tolerance and scalability based on Blockchain technology, which enables autonomous vehicles log every data they received in real-time and ensure data integrity. In addition to Blockchain technology, digital signature and cryptography hash function are also included in our proposed system in order to detect if the stored data has been tampered. If the data is tampered, the system is able to detect the time period during which the data is tampered. With these properties, our system is capable of deploying in VANET and the stored data will be secure and reliable. | en |
dc.description.provenance | Made available in DSpace on 2021-06-17T09:11:11Z (GMT). No. of bitstreams: 1 ntu-108-R06922125-1.pdf: 1900937 bytes, checksum: 1b87f07df58f48e8c498797bf69e6e43 (MD5) Previous issue date: 2019 | en |
dc.description.tableofcontents | Acknowledgments ii
摘要 iii Abstract iv 1 Introduction 1 1.1 Motivation.................................. 1 1.2 Contribution................................. 3 1.3 Thesis Organization............................. 3 2 Background and Related Work 5 2.1 Background................................. 5 2.1.1 Cryptographic Hash Function ................... 5 2.1.2 Digital Signature .......................... 6 2.1.3 IOTA ................................ 7 2.1.4 Masked Authenticated Messaging ................. 8 2.2 Related Works................................ 10 3 System Architecture and Problem Definition 12 3.1 System Architecture............................. 12 3.2 Problem Definition ............................. 13 3.3 Challenges.................................. 14 4 Design and Implementation 16 4.1 Deploying Network and Packing Data ................... 17 4.2 Roaming................................... 19 4.2.1 Head Transaction.......................... 20 4.2.2 Link Transaction .......................... 20 4.3 Secure Data Storing............................. 21 4.3.1 Non-repudiation .......................... 23 4.3.2 Enhanced Tamper-Evident ..................... 23 4.4 Summary .................................. 25 5 Performance Evaluation 28 5.1 Simulation Environment .......................... 28 5.2 Simulation Results ............................. 29 5.3 Scalability Evaluation............................ 30 5.4 Traceability Evaluation........................... 31 5.5 Data Efficiency ............................... 32 5.6 SecurityAnalysis .............................. 33 6 Conclusion 36 Bibliography 37 | |
dc.language.iso | en | |
dc.title | 基於區塊鏈之車聯網自駕車資料紀錄系統 | zh_TW |
dc.title | Traceability for Vehicular Network Real-Time Messaging Based on Blockchain Technology | en |
dc.type | Thesis | |
dc.date.schoolyear | 107-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 林忠緯,林風 | |
dc.subject.keyword | 自駕車,區塊鏈,車聯網,掩碼認證訊息,資料記錄, | zh_TW |
dc.subject.keyword | Autonomous vehicle,Blockchian,VANET,Masked Authenticated Message,Data logging, | en |
dc.relation.page | 39 | |
dc.identifier.doi | 10.6342/NTU201904004 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2019-08-30 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
顯示於系所單位: | 資訊工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-108-1.pdf 目前未授權公開取用 | 1.86 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。