Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊網路與多媒體研究所
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/37221
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor雷欽隆
dc.contributor.authorLi Chenen
dc.contributor.author陳立zh_TW
dc.date.accessioned2021-06-13T15:21:45Z-
dc.date.available2008-07-30
dc.date.copyright2008-07-30
dc.date.issued2008
dc.date.submitted2008-07-21
dc.identifier.citation1. R. Anderson and M. Kuhn, “Tamper Resistance—A Cautionary Note,” Proceedings of Second USENIX Workshop Electronic Commerce, pp. 1-11, November, 1996.
2. S. Basagni, K. Herrin, E. Rosti, and D. Bruschi, “Secure Pebblenets,“ Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 156-163, 2001.
3. M. Bellare, R. Canetti, and H. Krawczyk, “Message Authentication using Hash Functions- The HMAC Construction,” Appears in RSA Laboratories’ Crypto Bytes, Vol. 2, No, 1, 1996.
4. C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, “Perfectly Secure Key Distribution for Dynamic Conferences,” Proceedings of CRYPTO’92, Advances in Cryptology, Lecture Notes in Computer Science, vol. 740, pp.471–486, 1993.
5. R. Blom, “An Optimal Class of Symmetric Key Generation Systems,” Proceedings of EUROCRYPT’84, Advances in Cryptology, Lecture Notes in Computer Science, vol. 209, pp. 335–338, 1984.
6. C. Boyd, “On Key Agreement and Conference Key Agreement,” Proceedings of the Second Australasian Conference on Information Security and Privacy, Lecture Notes In Computer Science, Vol. 1270, 1997.
7. B. Brisco, “MARKS: Multicast Key Management Using Arbitrarily Revealed Key Sequences,” Proceedings of First Int’l Workshop Networked Group Communications, November. 1999.
8. R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrishnan and M. T. Kandemir, “On The Detection of Clones In Sensor Networks Using Random Key Predistribution,” IEEE Transactions On Systems, Man, And Cybernetics, vol. 37, issue: 8, pp.1246-1258, November 2007.
9. R. Canetti, T. Malkin, and K. Nissim, “Efficient Communication-Storage Tradeoffs for Multicast Encryption,” Proceedings of Conference: Advances in Cryptology (EUROCRYPT ’99), pp. 459-474, 1999.
10. D. Carman, P. Kruus, and B. Matt, “Constraints and Approaches for Distributed Sensor Network Security,” Tech. Rep., NAI Labs, No. 00010, 2000.
11. H. Chan and A. Perrig, “PIKE: Peer Intermediaries for Key Establishment in Sensor Networks,” Proceeding of IEEE INFOCOM, March, 2005.
12. H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” In Preceedings of IEEE Infocom, pp. 197-213, May, 2003.
13. W. Diffie and M. E. Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, vol.22, pp. 644-654, November, 1976.
14. W. L. Du, J. Deng, Y. S. Han, P. K. Varshney, “A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks,” Proceedings of the 10th ACM
15. L. Eschenauer, and V. D. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proceedings of the 9th ACM conference on Computer and communications security, pp. 41-47, 2002.
16. D. Estrin, M. Srivastava, and A. Sayeed, “Wireless Sensors Networks, “ MobiCOM Tutorial, no. 5. http://nesl.ee.ucla.edu/tutorials/mobicom02. 2002.
17. O. Goldreich, S. Goldwasser, S. Micali, 'How to Construct Random Functions,” Journal of the ACM, vol.33, no.4, p.792-807, 1986.
18. H. Harney and C. Muckenhirn, “Group Key Management Protocol (GKMP) Specification,” The InternetSoc. (ISOC), Report # RFC 2093, 1997.
19. D. Huang, D. Medhi, “Secure Key Establishment in Large-Scale Sensor Networks: An Area Partitioning and Multigroup Key Predistribution Approach,' ACM Transaction On Sensor Networks, vol. 3, No. 3, Article 16, August 2007.
20. D. Huang, M. Mehta, D. Medhi, and L. Harn, “Location-Aware Key Management Scheme for Wireless Sensor Networks,” Proceedings of Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN ’04), October, 2004.
21. C. Karlof and D. Wanger, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113-127, May, 2003.
22. B. Karp, and H.T. Kung, “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks,” Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 243-254, 2000.
23. Y. W. Law, R. Corin S. Etalle, and P. Hartel, “A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks,” PWC 2003 Lecture Notes of Computer Science, vol. 2775, September, 2003.
24. J. C. Lee, K. H. Wong, J. Cao, H. C. B. Chan and V. C. M. Leung, “Key Management Issues in Wireless Sensor Networks, Current Proposals and Future Developments,” IEEE Wireless Communications, April, 2007.
25. D. Liu and P. Ning, “Location-based Pairwise Key Establishments for Static Sensor Networks,” Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 72-82. 2003.
26. D. Liu, P. Ning, and R. Li, “Establishing Pairwise Keys in Distributed Sensor Networks,” ACM Transactions on Information and System Security, vol. 8, no. 1, pp. 41-77, Febuary, 2005.
27. F. Liu, and X. Cheng, “Insider Attacker Dection in Wireless Sensor Networks,” IEEE INFOCOM, pp.1937-1945, May 2007.
28. M. Luk, A. Perrig, and B. Whillock, “Seven Cardinal Properties of Sensor Network Broadcast Authentication,” SASN '06: Proceedings of the fourth ACM workshop on Security of Ad Hoc and Sensor Networks, pp, 147-156, 2006.
29. B. Panja, S. K. Madria, and B. Bhargava, “Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks,” Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computation, SUTC ’06, pp. 384–393, 2006.
30. A. Perrig, D. Song, and J. D. Tygar, “ELK, a New Protocol for Efficient Large-Group Key Distribution,” Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 247, 2001.
31. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, “SPINS: Security Protocols for Sensor Networks,” In Proceedings of ACM Wireless Networks, vol. 8, pp. 521–534, September, 2002.
32. S. Rafaeli and D. Hutchison, “A Survey of Key Management for Secure Group Communication,” ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, September, 2003.
33. R. L. Rivest, A. Shamir, and L. M. Adleman, ”A Method for Obtaining Digital Signatures and Public-key Cryptosystems,” Communications of the ACM, vol. 21, no, 2, pp. 120-126, 1978.
34. O. Rodeh, K. Birman, and D. Dolev, “Optimized Group Rekey for Group Communication Systems,” Proceedings of the ACM Network and Distributed System Security Symposium, 2000.
35. E. Sabbah, A. Majeed, K.-D. Kang, Ke Liu and Nael Abu-Ghazaleh, “An Application-Driven Perspective on Wireless Sensor Network Security,” Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks Q2SWinet, pp. 1-8, 2006.
36. E. Sabbah, K. D. Kang, A. Majeed, K. Liu, and N. Abu-Ghazaleh, 'An Application-Driven Perspective on Wireless Sensor Network Security,” In Proceedings of the 2nd ACM Workshop on QoS and Security for Wireless and Mobile Networks, pp. 1-8, October, 2006.
37. S. Setia, S. Koussih, and S. Jajodia, “Kronos: A Scalable Group Rekeying Approach for Secure Multicast,” Proceedings of IEEE Symposium on Security and Privacy, May, 2001.
38. K. Wong, M. Gouda, and S. Lam, “Secure Group Communications Using Key Graphs,” IEEE/ACM Transactions in Networking, vol. 8, no. 1, pp. 16-30, February, 2000.
39. Anthony D. Wood, and John A. Stankovic, “A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks,” Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, CRC Press, 2004.
40. M. F. Younis, and M. Eltoweissy, “Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks,' IEEE Transaction On Parallel and Distributed Systems, vol. 17, issue: 8, pp. 865-882, August 2006.
41. Y. Zhou, Y. Zhang, and Y. Fang, “Key Establishment in Sensor Networks Based on Triangle Grid Deployment Model,” Proceedings of IEEE Military Communication Conference (MILCOM ’05), October, 2005.
42. Y. Zhou, and Y. Fang, “A Two-Layer Key Establishment Scheme for Wireless Sensor Networks,” IEEE Transactions On Mobile Computing, Vol. 6, No. 9, pp. 1009-1020, September, 2007.
43. S. Zhu, and S. Setia, “LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,' ACM Transaction On Sensor Networks, vol. 2, No. 9, pp. 500-528, November 2006.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/37221-
dc.description.abstract無線感測網路一般都由數千個資源受限的節點所組成,並部屬在不具網路基礎架構的地點上。目前對於無線感測網路的主要研究都集中在如何安全建立兩兩節點之間的金鑰機制,但許多利用路由資訊,資源消耗,和竊取節點中秘密的攻擊行為可以很快的欺騙或癱瘓整個網路,攻擊者也不需使用太多的技術與機器。我們以LEAP+為基礎架構之下,提出一個結合LEAP+與節點位置資訊的金鑰建立機制,利用驗證節點身分與節點位置的真實性,我們有效的抑制了身分詐欺攻擊,節點複製攻擊的影響範圍。我們進一步提出一個認證節點的機制來防止可能的竊聽重送攻擊,以實作在NS2 的系統證明我們的機制與LEAP+相比能夠更防止惡意攻擊對網路所造成的影響。zh_TW
dc.description.abstractSensor networks usually consist of thousands of resource-limited nodes and are deployed in a designated area without any fixed infrastructure. While the establishment of the pairwise keys between any pair of adjacent nodes to build a secure link remains the main concern in the design of key management protocols, malicious attacks aim at routing information, exhaust node’s resource, and compromised secrets can misdirect the data flow or denial the network service with relatively small effort. Many mission-critic sensor network applications demand an effective, light, and flexible algorithm yet robust under attacks. Based on the LEAP+ scheme, we propose an improved LEAP+ by adding location information into the key establishment phase. By identifying the correctness of the id-location pair, our scheme effectively limits the Sybil attack and mitigates the damage of HELLO flood attack and node cloning attack. We furthermore propose an authentication phase in our scheme to defend possible replay attacks. The analysis shows that our scheme is more robust than LEAP+ with only minor increase of computation overhead.en
dc.description.provenanceMade available in DSpace on 2021-06-13T15:21:45Z (GMT). No. of bitstreams: 1
ntu-97-R95944017-1.pdf: 312451 bytes, checksum: abb7203921ad63eaa4a9598a8f4d518d (MD5)
Previous issue date: 2008
en
dc.description.tableofcontentsChapter 1 Introduction 1
Chapter 2 Related Work 4
Chapter 3 System Description 7
3.1. LEAP+ 7
3.2. Security Analysis 9
Chapter 4 Protocol Description 11
4.1. Network Model 11
4.2. Adversary Model 12
4.3. Key Establishment 13
4.3.1. Establishing Individual Keys 13
4.3.2. Establishing Pairwise Keys 14
4.3.3. Establishing Cluster Keys 16
Chapter 5 Security Analysis 17
5.1. Replay Attack 17
5.2. HELLO Flood Attack 18
5.3. Sybil Attack 20
5.4. Node Cloning Attack 21
Chapter 6 Performance Analysis 24
6.1. Memory Storage 25
6.2. Computation Overhead 27
Chapter 7 Conclusion 29
References 30
dc.language.isoen
dc.subject感測網路zh_TW
dc.subject身分詐欺攻擊zh_TW
dc.subject路由攻擊zh_TW
dc.subject金鑰建立機制zh_TW
dc.subjectsensor networken
dc.subjectsybil attacken
dc.subjectnode cloningen
dc.subjectHELLO flood attacken
dc.subjectlocation-based key establishmenten
dc.title用於靜態無線感測網路之金鑰建立協定zh_TW
dc.titleA Location-Id Sensitive Key Establishment Scheme in Static Wireless Sensor Networken
dc.typeThesis
dc.date.schoolyear96-2
dc.description.degree碩士
dc.contributor.oralexamcommittee黃秋煌,劉立,陳英一
dc.subject.keyword感測網路,金鑰建立機制,路由攻擊,身分詐欺攻擊,zh_TW
dc.subject.keywordsensor network,location-based key establishment,HELLO flood attack,node cloning,sybil attack,en
dc.relation.page32
dc.rights.note有償授權
dc.date.accepted2008-07-23
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept資訊網路與多媒體研究所zh_TW
顯示於系所單位:資訊網路與多媒體研究所

文件中的檔案:
檔案 大小格式 
ntu-97-1.pdf
  未授權公開取用
305.13 kBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved