請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/44432完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 雷欽隆(Chin-Laung Lei) | |
| dc.contributor.author | Ying-I Ko | en |
| dc.contributor.author | 柯英毅 | zh_TW |
| dc.date.accessioned | 2021-06-15T02:57:16Z | - |
| dc.date.available | 2009-08-20 | |
| dc.date.copyright | 2009-08-20 | |
| dc.date.issued | 2009 | |
| dc.date.submitted | 2009-07-31 | |
| dc.identifier.citation | [1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
[2] L. Ho, M. Moh, Z. Walker, T. Hamada, and C.F. Su, “A Prototype on RFID and Sensor Networks for Elder Healthcare: Progress Report,” SIGCOMM’05 Workshops, Aug. 2005. [3] T. H. Kim, S. I. Lee, Y. D. Lee, W. K. Hong, “Design and Evaluation of In-vehicle Sensor Network for Web based Control,” Proc. 13th IEEE Int’l Symp. and Workshop on Engineering of Computer Based Systems (ECBS’06), Mar. 2006 [4] The Cricket Indoor Location System an NMS Project @ MIT CSAIL.htm [5] L. Krishnamurthy, R. Adler, P. Buonadonna, J. Chhabra, M. Flanigan, N. Kushalnagar, L. Nachman, M. Yarvis, “Design and Deployment of Industrial Sensor Networks: Experiences from a Semiconductor Plant and the North Sea,” 3rd ACM Conf. Embedded Network Sensor Systems (SenSys), Nov. 2005. [6] Crossbow Technology, http://www.xbow.com/, 2008. [7] L. Eschenauer and V. Gligor, “A Key Management Scheme for Distributed Sensor Networks,” Proc. Ninth ACM Conf. Computer and Comm. Security (CCS ’02), Nov. 2002. [8] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proc. IEEE Symp. Security and Privacy, pp. 197-213, May 2003. [9] R.D. Pietro, L.V. Mancini, and A. Mei, “Random Key-Assignment for Secure Wireless Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS ’03), Oct. 2003. [10] W. Du, J. Deng, Y.S. Han, and P.K. Varshney, “A Pairwise Key Predistribution Scheme for Wireless Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS ’03), Oct. 2003. [11] W. Du, J. Deng, Y.S. Han, S. Chen, and P.K. Varshney, “A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge,” Proc. INFOCOM, Mar. 2004. [12] D. Liu and P. Ning, “Establishing Pairwise Keys in Distributied Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS ’03), Oct. 2003. [13] D. Liu and P. Ning, “Location-Based Pairwise Key Establishments for Relatively Static Sensor Networks,” Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (SASN ’03), Oct. 2003. [14] D. Liu, P. Ning, and R. Li, “Establishing Pairwise Keys in Distributed Sensor Networks,” ACM Trans. Information and System Security, vol. 8, no. 1, pp. 41-77, Feb. 2005. [15] D. Huang, M. Mehta, D. Medhi, and L. Harn, “Location-Aware Key Management Scheme for Wireless Sensor Networks,” Proc. Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN ’04), Oct. 2004. [16] H. Chan and A. Perrig, “Pike: Peer Intermediaries for Key Establishment in Sensor Networks,” Proc. INFOCOM, Mar. 2005. [17] Y. Zhou, Y. Zhang, and Y. Fang, “LLK: A Link-Layer Key Establishment Scheme in Wireless Sensor Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC ’05), Mar. 2005. [18] Y. Zhou, Y. Zhang, and Y. Fang, “Key Establishment in Sensor Networks Based on Triangle Grid Deployment Model,” Proc. IEEE Military Comm. Conf. (MILCOM ’05), Oct. 2005. [19] J. Hwang and Y. Kim, “Revisiting Random Key Predistibution Schemes for Wireless Sensor Networks,” Proc. Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN ’04), Oct. 2004. [20] P. Traynor, H. Choi, G. Cao, S. Zhu, and T. LaPorta, “Establishing Pair-Wise Keys in Heterogeneous Sensor Networks,” Proc. INFOCOM, Apr. 2006. [21] S. Zhu, S. Setia, and S. Jajodia, “LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,” ACM Trans. Sensor Networks, vol. 2, no. 4, pp. 500–528, Nov. 2006. [22] C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, “Perfectly-Secure Key Distribution for Dynamic Conferences,”Proc. Conf. Advances in Cryptology (CRYPTO ’92), vol. 740, pp. 471-486, 1992. [23] R. Blom, “An optimal class of symmetric key generation systems,” Proc. EUROCRYPT'84, 1985. [24] T. Ito, H. Ohta, N. Matsuda, and T. Yoneda, “A Key Pre-Distribution Scheme for Secure Sensor Networks Using Probability Density Function of Node Deployment,” SASN’05, Nov. 2005. [25] D. Liu, and P. Ning, “Improving key pre-distribution with deployment knowledge in static sensor networks,” ACM Trans. Sensor Networks, vol. 1, no. 2, pp. 204-239, Nov. 2005. [26] A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D.E. Culler, “SPINS: Security Protocols for Sensor Networks,” Wireless Networks, vol. 8, pp. 521-534, Sept. 2002. [27] A. Perrig, R. Canetti, D. Tygar, and D. Song, “The Tesla Broadcast Authentication Protocol,” RSA CryptoBytes, vol. 5, no. 2, pp. 2-13, 2002. [28] P.J. Chuang, T.H. Chao, and B.Y. Li, “A Scalable Grouping Random Key Predistribution Scheme for Large Scale Distributed Sensor Networks,” Proc. 3rd Int’l Conf. Information Technology and Applications (ICITA’05), Jul. 2005. [29] S. Zhu, S. Setia, S. Jajodia, and P. Andning, “An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks,” Proc. IEEE Symp. Security and Privacy, pp. 259–271, 2004. [30] B.C. C. Lai, D.D. Hwang, S.P. Kim, and I. Verbauwhede1, “Reducing Radio Energy Consumption of Key Management Protocols for Wireless Sensor Networks,” Int’l Symp. Low Power Electronics and Design (ISLPED’04), Aug. 2004. [31] M.J. Miller and N.H. Vaidya, “Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks,”Proc. INFOCOM, Apr. 2006. [32] Y.W. Law, J. Doumen, and P. Hartel, “ Survey and Benchmark of Block Ciphers for Wireless Sensor Networks,” ACM Trans. Sensor Networks, vol. 2, no. 1, pp. 65-93, Feb. 2006. [33] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Proc. First IEEE Int’l Workshop Sensor Network Protocols and Applications (SNPA ’03), May 2003. [34] N. SASTRY, U. SHANKAR, D. ANDWAGNER, “Secure verification of location claims,”Proc. 2nd ACM Workshop on Wireless Security, Sep. 2003. [35] L. Hu and D. Evans, “Using directional antennas to prevent wormhole attacks,”Proc. 11th Network and Distributed System Security Symp., Feb. 2004. [36] F. Ye, H. Luo, S. Lu, and L. ZHANG, “Statistical en-route detection and filtering of injected false data in sensor networks,” Proc. INFOCOM, Mar. 2004. [37] J. Newsome, R. Shi, D. Song, and A. Perrig, “The sybil attack in sensor networks: Analysis and defenses,” Proc. IEEE Int’l Conf. Information Processing in Sensor Networks (IPSN’04), Apr. 2004. [38] B. Parno, A. Perrig, and V. Gligor, “Distributed detection of node replication attacks in sensor networks,” Proc. IEEE Symp. Security and Privacy, May 2005. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/44432 | - |
| dc.description.abstract | 在感測網路上所有感測器之間建立配對金鑰是個重要的課題以及嚴峻的挑戰,因為公開金鑰加密法不適用在資源有限的感測節點上。為了提升效能,一些已經提出來的機制多半會採用搭配感測節點的佈置資訊來做配對金鑰的分配。然而,實際的應用上,感測節點的佈置資訊是不容易取得的。在本篇論文裡,我們首先提出了一個建立在異質感測網路以及多項式金鑰基礎的機來建立配對金鑰,並說明此機制可適用在無任何感測節點的佈置資訊下。在我們的分析及模擬下,我們證明我們的機制,除了更有效率外,且在安全性上也有更好的提升。然後我們再把我們的機制延伸成跨叢集的分配配對金鑰機制。一樣地,在效能以及安全性上都比以往的方法好。 | zh_TW |
| dc.description.abstract | Pairwise key establishment in sensor networks is a challenging task because public key cryptography is not desirable on resource-limited sensor nodes. In order to improve performance, some of existing key management schemes proposed to cooperate with deployment information for key distribution. However, in some applications, deployment information of sensor nodes may not be available. In this thesis, we first propose a scheme which leverages heterogeneous sensor network and polynomial-based approach to do pairwise key establishment if there is no deployment information available. The analysis demonstrates that the proposed scheme is not only more efficient, but can also achieve better resilience against node compromises. We then extend our proposed scheme to a cluster-based key predistribution scheme. In addition to its efficiency, the extended scheme can offer perfect security for protecting sensor networks. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-15T02:57:16Z (GMT). No. of bitstreams: 1 ntu-98-R96921061-1.pdf: 533736 bytes, checksum: ba4766b1421ad93404042f3ea766e441 (MD5) Previous issue date: 2009 | en |
| dc.description.tableofcontents | Contents
Chapter 1 Introduction 1 Chapter2 Related Work 4 Chapter3. Overview of Polynomial Pool-Based Key Pre-Distribution 7 3.1 Overview of Polynomial-Based Key Predistribution 7 3.2 Overview of Polynomial Pool-Based key Predistribution 9 Chapter4 THE PROPOSED SCHEME 11 4.1 Deployment model 11 4.2 The proposed scheme 13 4.3 Analysis 15 4.3.1 Connectivity 15 4.3.2 Resilience Against Node Compromises 17 4.3.3 Network Initialization Results 20 4.3.3.1 Simulation Model 20 4.3.3.2 Parameter Setting 23 4.3.3.3 Results: Initialization Time 24 4.3.3.4 Results: Message Overhead 24 Chapter5 The Extended Scheme 26 5.1 The Extended Scheme 26 5.2 Analysis 30 5.2.1 Connectivity 30 5.2.2 Communication Overhead 34 5.2.2.1 Simulation Model 34 5.2.2.2 Results: Communication Cost 36 Chapter6 Conclusion 38 References 39 | |
| dc.language.iso | en | |
| dc.subject | 感測網路 | zh_TW |
| dc.subject | 配對金鑰 | zh_TW |
| dc.subject | pairwise key establishment | en |
| dc.subject | sensor network | en |
| dc.title | 在異質感測網路上建立配對金鑰的方法 | zh_TW |
| dc.title | Pairwise Key Establishmentin Heterogeneous Sensor Networks | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 97-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 莊文勝,顏嗣鈞,郭斯彥,黃秋煌 | |
| dc.subject.keyword | 配對金鑰,感測網路, | zh_TW |
| dc.subject.keyword | pairwise key establishment,sensor network, | en |
| dc.relation.page | 43 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2009-08-03 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
| 顯示於系所單位: | 電機工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-98-1.pdf 未授權公開取用 | 521.23 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
