Skip navigation

DSpace JSPUI

DSpace preserves and enables easy and open access to all types of digital content including text, images, moving images, mpegs and data sets

Learn More
DSpace logo
English
中文
  • Browse
    • Communities
      & Collections
    • Publication Year
    • Author
    • Title
    • Subject
    • Advisor
  • Search TDR
  • Rights Q&A
    • My Page
    • Receive email
      updates
    • Edit Profile
  1. NTU Theses and Dissertations Repository
  2. 工學院
  3. 工程科學及海洋工程學系
Please use this identifier to cite or link to this item: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/17000
Full metadata record
???org.dspace.app.webui.jsptag.ItemTag.dcfield???ValueLanguage
dc.contributor.advisor吳文中
dc.contributor.authorChih-Yuan Linen
dc.contributor.author林智源zh_TW
dc.date.accessioned2021-06-07T23:52:41Z-
dc.date.copyright2014-01-27
dc.date.issued2013
dc.date.submitted2013-12-04
dc.identifier.citation45
REFERENCE
[1] A.-V. M. Search. Forthcoming Trends. Available:
http://avmediasearch.eu/techno-socio-economic-analysis-of-mobile-search
[2] J. M. Kahn, R. H. Katz, and K. S. Pister, 'Next century challenges: mobile networking for “Smart Dust”,' in Proceedings of the 5th annual ACM/IEEE
international conference on Mobile computing and networking, 1999, pp. 271-278.
[3] I. F. Akyildiz and M. C. Vuran, 'Introduction,' in Wireless Sensor Networks, ed: John Wiley & Sons, Ltd, 2010, pp. 1-16.
[4] H. Alzaq, 'Peer to Peer Overlay Network for Sensor Networks,' Institute of Operating Systems and Computer Networks, Technical University
Braunschweig, 2007.
[5] 張春紅、裘曉峰、弭偉、紀陽, 全面攔截P2P主流技術 佳魁資訊, 2012.
[6] S. N. Sahar, F. K. Shaikh, S. H. Jokhio, S. A. A. Shah, W. Shah, A. S. Larik, et al., 'P2P based Data Management WSNs: Experiences and Lessons Learnt from a Real-world Deployment,' Mehran University Research Journal of Engineering & Technology, vol. 30, 2011.
[7] G. Gutierrez, B. Mejias, P. Van Roy, D. Velasco, and J. Torres, 'WSN and P2P: a self-managing marriage,' in Self-Adaptive and Self-Organizing Systems Workshops, 2008. SASOW 2008. Second IEEE International Conference on, 2008, pp. 198-201.
[8] K. Wehrle, S. Gotz, and S. Rieche, 'Distributed Hash Tables,' in Peer-to-Peer Systems and Applications. vol. 3485, R. Steinmetz and K. Wehrle, Eds., ed:
Springer Berlin Heidelberg, 2005, pp. 79-93.
[9] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, 'Chord: A scalable peer-to-peer lookup service for internet applications,' in ACM
SIGCOMM Computer Communication Review, 2001, pp. 149-160.
[10] A. Rowstron and P. Druschel, 'Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems,' in Middleware 2001, 2001, pp.
329-350.
[11] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A scalable content-addressable network vol. 31: ACM, 2001.
[12] P. Maymounkov and D. Mazieres, 'Kademlia: A peer-to-peer information system based on the xor metric,' in Peer-to-Peer Systems, ed: Springer, 2002, pp.
53-65.
[13] M. Ali and Z. A. Uzmi, 'CSN: A network protocol for serving dynamic queries in large-scale wireless sensor networks,' in Communication Networks and Services Research, 2004. Proceedings. Second Annual Conference on, 2004, pp. 165-174.
[14] A.-B. Al-Mamou and H. Labiod, 'ScatterPastry: An overlay routing using a DHT over wireless sensor networks,' in Intelligent Pervasive Computing, 2007.
IPC. The 2007 International Conference on, 2007, pp. 274-279.
[15] J. Yu, W. Liu, and J. Song, 'C2WSN: A two-tier Chord overlay serving for efficient queries in large-scale wireless sensor networks,' in Advanced
Computing and Communications, 2007. ADCOM 2007. International Conference on, 2007, pp. 237-242.
[16] F. Zhang, Z. J. Shi, and B. Wang, 'Chord-based key establishment schemes for 46 sensor networks,' in Information Technology: New Generations, 2008. ITNG
2008. Fifth International Conference on, 2008, pp. 731-737.
[17] G. Fersi, W. Louati, and M. B. Jemaa, 'Distributed Hash table-based routing and data management in wireless sensor networks: a survey,' Wireless networks, vol.
19, pp. 219-236, 2013.
[18] Y.-C. L. 連 育 正 , 'The Development of Remote Programmable Micro-Interpreter for Wireless Sensor Networks,' Graduate Institute of engineering science and ocean engineeting, National Taiwan University, 2010.
[19] Crossbow. Crossbow technology. Available: http://www.xbow.com
[20] Moteiv. Tmote Sky Datasheet. Available:
http://www.eecs.harvard.edu/~konrad/projects/shimmer/references/tmote-sky-datasheet.pdf
[21] R. Adler, M. Flanigan, J. Huang, R. Kling, N. Kushalnagar, L. Nachman, et al., 'Intel mote 2: an advanced platform for demanding sensor network
applications,' in Proceedings of the 3rd international conference on Embedded networked sensor systems, 2005, pp. 298-298.
[22] V. Handzisk and T. Lentsch, 'The eyesIFX platform,' TinyOS Technology Exchange II, http://www.tinyos.net/ttx-02-2005/platforms/ttx2005-eyesIFX.ppt, 2005.
[23] D. Simon, C. Cifuentes, D. Cleal, J. Daniels, and D. White, 'Java™ on the bare metal of wireless sensor devices: the squawk Java virtual machine,' in
Proceedings of the 2nd international conference on Virtual execution environments, 2006, pp. 78-88.
[24] P. Levis, S. Madden, J. Polastre, R. Szewczyk, K. Whitehouse, A. Woo, et al., 'TinyOS: An Operating System for Sensor Networks,' in Ambient Intelligence,
W. Weber, J. Rabaey, and E. Aarts, Eds., ed: Springer Berlin Heidelberg, 2005, pp. 115-148.
[25] A. Dunkels, B. Gronvall, and T. Voigt, 'Contiki-a lightweight and flexible operating system for tiny networked sensors,' in Local Computer Networks, 2004. 29th Annual IEEE International Conference on, 2004, pp. 455-462.
[26] S. Bhatti, J. Carlson, H. Dai, J. Deng, J. Rose, A. Sheth, et al., 'MANTIS OS: An embedded multithreaded operating system for wireless micro sensor
platforms,' Mobile Networks and Applications, vol. 10, pp. 563-579, 2005.
[27] A. Eswaran, A. Rowe, and R. Rajkumar, 'Nano-rk: an energy-aware resource-centric rtos for sensor networks,' in Real-Time Systems Symposium,
2005. RTSS 2005. 26th IEEE International, 2005, pp. 10 pp.-265.
[28] Q. Cao, T. Abdelzaher, J. Stankovic, and T. He, 'The liteos operating system: Towards unix-like abstractions for wireless sensor networks,' in Information
Processing in Sensor Networks, 2008. IPSN'08. International Conference on, 2008, pp. 233-244.
[29] A. Dwivedi, M. Tiwari, and O. Vyas, 'Operating Systems for Tiny Networked Sensors: A Survey,' International Journal of Recent Trends in Engineering, vol. 1, pp. 152-157, 2009.
[30] M. O. Farooq and T. Kunz, 'Operating systems for wireless sensor networks: A survey,' Sensors, vol. 11, pp. 5900-5930, 2011.
[31] Contiki. Contiki official website. Available: http://www.contiki-os.org/
[32] P.-Y. C. 陳伯禹, 'Design and Implement a High Integrated Home Automation Platform with Power Saving Technology,' Graduate Institute of engineering
science and ocean engineeting, National Taiwan University, 2010.
[33] D. S. Milojicic, V. Kalogeraki, R. Lukose, K. Nagaraja, J. Pruyne, B. Richard, et al., 'Peer-to-peer computing,' ed: Technical Report HPL-2002-57, HP Lab,
2002.
[34] C.-L. Liu, C.-Y. Wang, and H.-Y. Wei, 'Cross-layer Mobile Chord P2P protocol design for VANET,' International Journal of Ad Hoc and Ubiquitous Computing, vol. 6, pp. 150-163, 2010.
[35] K. Jung-Tae, P. Hae-Kyeong, and P. Eui-Hyun, 'Security issues in peer-to-peer systems,' in Advanced Communication Technology, 2005, ICACT 2005. The 7th International Conference on, 2005, pp. 1059-1063.
[36] A. K. Pathan, L. Hyung-Woo, and H. Choong-seon, 'Security in wireless sensor networks: issues and challenges,' in Advanced Communication Technology,
2006. ICACT 2006. The 8th International Conference, 2006, pp. 6 pp.-1048.
[37] I. C. Ray, C. Chin-Chun, and C. Yu-Lin, 'An efficient anonymous scheme for computer and communication privacy,' in Security Technology, 2004. 38th Annual 2004 International Carnahan Conference on, 2004, pp. 199-203.
[38] R.-I. Chang and C.-C. Chu, 'An Efficient Anonymous Scheme for Mutual Anonymous Communications,' in Networking - ICN 2005. vol. 3421, P. Lorenz
and P. Dini, Eds., ed: Springer Berlin Heidelberg, 2005, pp. 835-843.
[39] F. Osterlind, A. Dunkels, J. Eriksson, N. Finne, and T. Voigt, 'Cross-level sensor network simulation with cooja,' in Local Computer Networks, Proceedings 2006
31st IEEE Conference on, 2006, pp. 641-648.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/17000-
dc.description.abstract近年來,物聯網這個詞已經廣為人知,身為物聯網之感知層的無線感測網路
的發展也越來越迅速,由於硬體的發展,感測器節點可以執行越來越複雜的任務。
另一方面,由於點對點技術的特性及其成熟度,此時正為將點對點技術帶入無線
感測網路的好時機。
由於點對點網路的特性,可以將各個節點的資源大幅整合,將資料有效率地
儲存與取用,並可以藉此取代掉原先中央伺服器的工作,增加無線感測網路的可
擴充性,健壯度,以及降低建置時的成本與困難度。但是點對點網路所帶來的網
路負荷與安全性問題都需要做更進一步的研究。本研究提出一種基於分散式雜湊
表的無線感測網路系統,從各個角度分析探討之,並以匿名通訊之方法做基本的
安全強化。
zh_TW
dc.description.provenanceMade available in DSpace on 2021-06-07T23:52:41Z (GMT). No. of bitstreams: 1
ntu-102-R00525036-1.pdf: 3126758 bytes, checksum: be8d11701875d58567e6a5ef849a84eb (MD5)
Previous issue date: 2013
en
dc.description.tableofcontents誌謝 i
中文摘要 ii
ABSTRACT iii
CONTENTS iv
LIST OF FIGURES vi
LIST OF TABLES viii
Chapter 1 Introduction 1
1.1 Background 1
1.2 Motivation 5
1.3 Thesis Organization 6
Chapter 2 Background on WSN and P2P 7
2.1 Wireless Sensor Network Overview 7
2.1.1 Hardware and Software 8
2.1.2 Network Structure 14
2.2 Peer to Peer Overview 16
2.2.1 Peer to Peer System 16
2.2.2 Peer to Peer Classification 19
Chapter 3 Proposed DHT-Based WSN System 24
3.1 Combining WSN and P2P 24
3.2 DHT-Based WSN 27
3.3 Network Security Improvement 30
Chapter 4 Implementation and Results 33
4.1 Design and architecture of simulation 33
4.2 Peer to Peer Protocol verifying Results 35
4.3 Security Improved System Test Results 40
Chapter 5 Summary and Conclusions 43
5.1 Conclusions 43
5.2 Future Works 44
REFERENCE 45
dc.language.isoen
dc.subject分散式雜湊表zh_TW
dc.subject點對點技術zh_TW
dc.subject無線感測網路zh_TW
dc.subject資料管理zh_TW
dc.subject匿名通訊zh_TW
dc.subjectDistributed Hash Tableen
dc.subjectData Managementen
dc.subjectPeer to Peer Protocolen
dc.subjectWireless Sensor Networken
dc.subjectAnonymous Communicationen
dc.title在無線感測網路中使用點對點協定之匿名通訊zh_TW
dc.titleDesign and Implementation of Peer to Peer Protocol with Anonymous Communication in Wireless Sensor Networken
dc.typeThesis
dc.date.schoolyear102-1
dc.description.degree碩士
dc.contributor.oralexamcommittee張瑞益,林致廷,翟駿逸
dc.subject.keyword無線感測網路,點對點技術,分散式雜湊表,資料管理,匿名通訊,zh_TW
dc.subject.keywordWireless Sensor Network,Peer to Peer Protocol,Distributed Hash Table,Data Management,Anonymous Communication,en
dc.relation.page47
dc.rights.note未授權
dc.date.accepted2013-12-04
dc.contributor.author-college工學院zh_TW
dc.contributor.author-dept工程科學及海洋工程學研究所zh_TW
Appears in Collections:工程科學及海洋工程學系

Files in This Item:
File SizeFormat 
ntu-102-1.pdf
  Restricted Access
3.05 MBAdobe PDF
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved