請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/40979完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 雷欽隆(Chin-Laung Lei) | |
| dc.contributor.author | I-Lun Lin | en |
| dc.contributor.author | 林逸侖 | zh_TW |
| dc.date.accessioned | 2021-06-14T17:09:55Z | - |
| dc.date.available | 2008-07-30 | |
| dc.date.copyright | 2008-07-30 | |
| dc.date.issued | 2008 | |
| dc.date.submitted | 2008-07-26 | |
| dc.identifier.citation | [1] Adrian Perrig, Robert Szewczyk, VictorWen, David Culler, and J. Doug Tygar. SPINS: Security Protocols for Sensor Networks. In MobiCom ’01: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pages 189–199, New York, NY, USA, 2001. ACM Press.
[2] Donggang Liu and Peng Ning. Multilevel μTESLA: Broadcast Authentication for Distributed Sensor Networks. Transactions on Embedded Computing System, vol. 3, no. 4, pages 800–836, 2004. ACM Press. [3] Donggang Liu, Peng Ning, Sencun Zhu, and Sushil Jajodia. Practical broadcast authentication in sensor networks. In MobiQuitous ’05: Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pages 118–132, Washington, DC, USA, 2005. IEEE Computer Society. [4] Alfred J. Menezes, Scott A. Vanstone, and Paul C. Van Oorschot. Handbook of Applied Cryptography. Boca Raton, FL, USA, 1996. CRC Press, Inc. [5] Hans Eberle, Arvinderpal Wander, Nils Gura, Sheueling Chang-Shantz, and Vipul Gupta. Architectural Extensions for Elliptic Curve Cryptography over GF(2m) on 8-bit Microprocessors. In ASAP ’05: Proceedings of the 2005 IEEE International Conference on Application-Specific Systems, Architecture Processors, pages 343–349, Washington, DC, USA, 2005. IEEE Computer Society. [6] Vipul Gupta, Matthew Millard, Stephen Fung, Yu Zhu, Nils Gura, Hans Eberle, and Sheueling Chang Shantz. Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet. In PERCOM ’05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, pages 247–256, Washington, DC, USA, 2005. IEEE Computer Society. [7] Adrian Perrig, Ran Canetti, J. Doug Tygar, and Dawn Xiaodong Song. The TESLA Broadcast Authentication Protocol. In Cryptobytes, vol. 5, no. 2, pages 2–13, 2002. RSA Laboratories. [8] Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, and Chih-Ming Hsieh. An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks. In ASIACCS ’06: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pages 311–320, New York, NY, USA, 2006. ACM Press. [9] Mark Luk, Adrian Perrig, and Bram Whillock. Seven Cardinal Properties of Sensor Network Broadcast Authentication. In SASN ’06: Proceedings of the Fourth ACM Workshop on Security of Ad-Hoc and Sensor Networks, pages 147–156, New York, NY, USA, 2006. ACM Press. [10] Mark Luk, Ghita Mezzour, Adrian Perrig, and Virgil Gligor. MiniSec: A Secure Sensor Network Communication Architecture. In IPSN ’07: Proceedings of the 6th International Conference on Information Processing in Sensor Networks, pages 479–488, New York, NY, USA, 2007. ACM Press. [11] Kui Ren, Wenjing Lou, and Yanchao Zhang. Multi-user Broadcast Authentication in Wireless Sensor Networks. In SECON ’07. 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad-Hoc Communications and Networks, pages 223–232, 2007. IEEE Computer Society. [12] Ronghua Wang, Wenliang Du, and Peng Ning. Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks. In MobiHoc ’07: Proceedings of the 8th ACM International Symposium on Mobile Ad-Hoc Networking and Computing, pages 71–79, New York, NY, USA, 2007. ACM Press. [13] Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu. Finding Collisions in the Full SHA-1. In Shoup, Victor (eds.) CRYPTO 2005. Lecture Notes in Computer Science, vol. 3621, pages 247–256, 2005. Springer, Heidelberg. [14] Michael Mitzenmacher. Compressed bloom filters. IEEE/ACM Transactions on Networking, vol. 10, no. 5, pages 604–612, 2002. [15] Li Fan, Pei Cao, Jussara Almeida, and Andrei Z. Broder. Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol. IEEE/ACM Transactions on Networking, vol. 8, no. 3, pages 281–293, 2000. [16] Ian H. Witten and Radford M. Neal and John G. Cleary. Arithmetic Coding for Data Compression. In Communications of the ACM, vol. 30, no. 6, pages 520–540, New York, NY, USA, 1987. ACM Press. [17] Jorma Rissanen and Glen G. Langdon, Jr. Arithmetic Coding. In IBM Journal of Research and Development, vol. 23, no. 2, pages 149–162, Riverton, NJ, USA, 1979. IBM Corp. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/40979 | - |
| dc.description.abstract | 本論文中,提出了兩套適用於無線感測網路的廣播驗證機制,由於構想圖形與窗簾的形狀類似,因此我們將機制命名為“Curtain”(窗簾的橫桿剛好是Bloom Bitmap),這機制具備了輕量以及可伸縮的特性。首先,我們將壓縮式布隆過濾器(Compressed Bloom Filters)應用於結合多串μTESLA 鏈,取代了前人使用Merkle 樹作為結合的方式。我們提出的機制足以持續使用夠長的時間,而且更增強了原先μTESLA 自我修復的特性。再者,藉由合適的壓縮方式,我們大量減少各個接收者的通訊負荷。另外,藉由結合公開金鑰運算(例如橢圓曲線密碼系統),我們的機制可以同時確保長久性地安全,以及減緩能量耗損。我們第二套機制,也是“Curtain”的延伸,便是改以使用計數式布隆過濾器(Counting Bloom Filters)取代原先的壓縮式布隆過濾器(Compressed Bloom Filters),如此一來便適用於多重發信端的環境,還能有效地供使用者進行刪減或增加所使用的μTESLA 鏈。 | zh_TW |
| dc.description.abstract | First of all, we propose a light-weight and scalable broadcast authentication scheme for sensor network. Because of the schema of the scheme being similar to window curtains, we choose Curtain as the name of this scheme. Instead of using Merkle tree to combine multiple μTESLA instance, we apply compressed Bloom filters to multiple μTESLA. Our scheme can support longer duration and prolong the self-healing property. We greatly reduce the communication overhead at the cost of allocating a moderate space in each receiver. Combing with PKC computation like ECC, our scheme can guarantee the long-term security and also mitigate energy consumption. Moreover, we substituted counting Bloom filters for compressed Bloom filters. The extended Curtain will be applicable for the situation of multiple senders, offering efficient user addition and revocation. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-14T17:09:55Z (GMT). No. of bitstreams: 1 ntu-97-R95921034-1.pdf: 1147707 bytes, checksum: 94d94635ff65770f8a2ed6a32a659d28 (MD5) Previous issue date: 2008 | en |
| dc.description.tableofcontents | Thesis Authorization Form i
Thesis Approval Form ii Acknowledgements iii Chinese Abstract iv English Abstract v List of Figures viii List of Tables x 1 Introduction 1 1.1 Motivation . . . . . . . . . . . . . . . . . . . 2 1.2 Brief literature review . . . . . . . . . . . . .3 1.2.1 Related Works . . . . . . . . . . . . . . .3 1.2.2 Standard μTESLA . . . . . . . . . . . . . 4 1.2.3 Tree-based μTESLA . . . . . . . . . . . . 6 1.3 Contributions . . . . . . . . . . . . . . . . . .7 1.4 Thesis organization . . . . . . . . . . . . . . .8 2 Preliminaries 9 2.1 System Model and Attack Model . . . . . . . . . .9 2.1.1 System Model . . . . . . . . . . . . . . . 9 2.1.2 Attack Model . . . . . . . . . . . . . . . 11 2.2 Bloom Filters . . . . . . . . . . . . . . . . . .12 2.2.1 Basic Bloom Filters . . . . . . . . . . . .12 2.2.2 Compressed Bloom Filters . . . . . . . . . 12 2.2.3 Counting Bloom Filters . . . . . . . . . . 13 2.3 Symbol Definition . . . . . . . . . . . . . . . .14 3 Proposed Schemes for Single Sender: Basic Curtain 15 3.1 Overview . . . . . . . . . . . . . . . . . . . . 15 3.2 Analysis . . . . . . . . . . . . . . . . . . . . 18 3.3 An Example . . . . . . . . . . . . . . . . . . . 20 4 Proposed Schemes for Multiple Sender: Extended Curtain 21 4.1 Overview . . . . . . . . . . . . . . . . . . . . 21 4.2 Analysis . . . . . . . . . . . . . . . . . . . . 23 4.3 An Example . . . . . . . . . . . . . . . . . . . 24 5 Implementation 25 5.1 Curtain on Single Sender . . . . . . . . . . . . 25 5.2 Curtain on Multiple Sender . . . . . . . . . . . 27 6 Conclusions 29 6.1 Conclusions . . . . . . . . . . . . . . . . . . .29 7 Future Works 31 7.1 Curtain with Merkle Tree . . . . . . . . . . . . 31 Bibliography 33 | |
| dc.language.iso | en | |
| dc.subject | 布隆過濾器(Bloom Filter) | zh_TW |
| dc.subject | 網路安全 | zh_TW |
| dc.subject | 廣播驗證 | zh_TW |
| dc.subject | μTESLA | zh_TW |
| dc.subject | 感測網路 | zh_TW |
| dc.subject | sensor networks | en |
| dc.subject | μTESLA | en |
| dc.subject | Bloom filters | en |
| dc.subject | network security | en |
| dc.subject | broadcast authentication | en |
| dc.title | Curtain: 使用布隆過濾器之感測器網路廣播認證機制 | zh_TW |
| dc.title | Curtain: A Broadcast Authentication Scheme in Wireless Sensor Network Using Bloom Filter | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 96-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 顏嗣鈞(Hsu-chun Yen),黃秋煌(Chua-Huang Huang),劉立(Li Liu),陳英一(Ing-Yi Chen) | |
| dc.subject.keyword | 感測網路,網路安全,廣播驗證,μTESLA,布隆過濾器(Bloom Filter), | zh_TW |
| dc.subject.keyword | sensor networks,network security,broadcast authentication,μTESLA,Bloom filters, | en |
| dc.relation.page | 35 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2008-07-29 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
| 顯示於系所單位: | 電機工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-97-1.pdf 未授權公開取用 | 1.12 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
