Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電機工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/44432
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor雷欽隆(Chin-Laung Lei)
dc.contributor.authorYing-I Koen
dc.contributor.author柯英毅zh_TW
dc.date.accessioned2021-06-15T02:57:16Z-
dc.date.available2009-08-20
dc.date.copyright2009-08-20
dc.date.issued2009
dc.date.submitted2009-07-31
dc.identifier.citation[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
[2] L. Ho, M. Moh, Z. Walker, T. Hamada, and C.F. Su, “A Prototype on RFID and Sensor Networks for Elder Healthcare: Progress Report,” SIGCOMM’05 Workshops, Aug. 2005.
[3] T. H. Kim, S. I. Lee, Y. D. Lee, W. K. Hong, “Design and Evaluation of In-vehicle Sensor Network for Web based Control,” Proc. 13th IEEE Int’l Symp. and Workshop on Engineering of Computer Based Systems (ECBS’06), Mar. 2006
[4] The Cricket Indoor Location System an NMS Project @ MIT CSAIL.htm
[5] L. Krishnamurthy, R. Adler, P. Buonadonna, J. Chhabra, M. Flanigan, N. Kushalnagar, L. Nachman, M. Yarvis, “Design and Deployment of Industrial Sensor Networks: Experiences from a Semiconductor Plant and the North Sea,” 3rd ACM Conf. Embedded Network Sensor Systems (SenSys), Nov. 2005.
[6] Crossbow Technology, http://www.xbow.com/, 2008.
[7] L. Eschenauer and V. Gligor, “A Key Management Scheme for Distributed Sensor Networks,” Proc. Ninth ACM Conf. Computer and Comm. Security (CCS ’02), Nov. 2002.
[8] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proc. IEEE Symp. Security and Privacy, pp. 197-213, May 2003.
[9] R.D. Pietro, L.V. Mancini, and A. Mei, “Random Key-Assignment for Secure Wireless Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS ’03), Oct. 2003.
[10] W. Du, J. Deng, Y.S. Han, and P.K. Varshney, “A Pairwise Key Predistribution Scheme for Wireless Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS ’03), Oct. 2003.
[11] W. Du, J. Deng, Y.S. Han, S. Chen, and P.K. Varshney, “A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge,” Proc. INFOCOM, Mar. 2004.
[12] D. Liu and P. Ning, “Establishing Pairwise Keys in Distributied Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS ’03), Oct. 2003.
[13] D. Liu and P. Ning, “Location-Based Pairwise Key Establishments for Relatively Static Sensor Networks,” Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (SASN ’03), Oct. 2003.
[14] D. Liu, P. Ning, and R. Li, “Establishing Pairwise Keys in Distributed Sensor Networks,” ACM Trans. Information and System Security, vol. 8, no. 1, pp. 41-77, Feb. 2005.
[15] D. Huang, M. Mehta, D. Medhi, and L. Harn, “Location-Aware Key Management Scheme for Wireless Sensor Networks,” Proc. Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN ’04), Oct. 2004.
[16] H. Chan and A. Perrig, “Pike: Peer Intermediaries for Key Establishment in Sensor Networks,” Proc. INFOCOM, Mar. 2005.
[17] Y. Zhou, Y. Zhang, and Y. Fang, “LLK: A Link-Layer Key Establishment Scheme in Wireless Sensor Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC ’05), Mar. 2005.
[18] Y. Zhou, Y. Zhang, and Y. Fang, “Key Establishment in Sensor Networks Based on Triangle Grid Deployment Model,” Proc. IEEE Military Comm. Conf. (MILCOM ’05), Oct. 2005.
[19] J. Hwang and Y. Kim, “Revisiting Random Key Predistibution Schemes for Wireless Sensor Networks,” Proc. Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN ’04), Oct. 2004.
[20] P. Traynor, H. Choi, G. Cao, S. Zhu, and T. LaPorta, “Establishing Pair-Wise Keys in Heterogeneous Sensor Networks,” Proc. INFOCOM, Apr. 2006.
[21] S. Zhu, S. Setia, and S. Jajodia, “LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,” ACM Trans. Sensor Networks, vol. 2, no. 4, pp. 500–528, Nov. 2006.
[22] C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, “Perfectly-Secure Key Distribution for Dynamic Conferences,”Proc. Conf. Advances in Cryptology (CRYPTO ’92), vol. 740, pp. 471-486, 1992.
[23] R. Blom, “An optimal class of symmetric key generation systems,” Proc. EUROCRYPT'84, 1985.
[24] T. Ito, H. Ohta, N. Matsuda, and T. Yoneda, “A Key Pre-Distribution Scheme for Secure Sensor Networks Using Probability Density Function of Node Deployment,” SASN’05, Nov. 2005.
[25] D. Liu, and P. Ning, “Improving key pre-distribution with deployment knowledge in static sensor networks,” ACM Trans. Sensor Networks, vol. 1, no. 2, pp. 204-239, Nov. 2005.
[26] A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D.E. Culler, “SPINS: Security Protocols for Sensor Networks,” Wireless Networks, vol. 8, pp. 521-534, Sept. 2002.
[27] A. Perrig, R. Canetti, D. Tygar, and D. Song, “The Tesla Broadcast Authentication Protocol,” RSA CryptoBytes, vol. 5, no. 2, pp. 2-13, 2002.
[28] P.J. Chuang, T.H. Chao, and B.Y. Li, “A Scalable Grouping Random Key Predistribution Scheme for Large Scale Distributed Sensor Networks,” Proc. 3rd Int’l Conf. Information Technology and Applications (ICITA’05), Jul. 2005.
[29] S. Zhu, S. Setia, S. Jajodia, and P. Andning, “An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks,” Proc. IEEE Symp. Security and Privacy, pp. 259–271, 2004.
[30] B.C. C. Lai, D.D. Hwang, S.P. Kim, and I. Verbauwhede1, “Reducing Radio Energy Consumption of Key Management Protocols for Wireless Sensor Networks,” Int’l Symp. Low Power Electronics and Design (ISLPED’04), Aug. 2004.
[31] M.J. Miller and N.H. Vaidya, “Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks,”Proc. INFOCOM, Apr. 2006.
[32] Y.W. Law, J. Doumen, and P. Hartel, “ Survey and Benchmark of Block Ciphers for Wireless Sensor Networks,” ACM Trans. Sensor Networks, vol. 2, no. 1, pp. 65-93, Feb. 2006.
[33] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Proc. First IEEE Int’l Workshop Sensor Network Protocols and Applications (SNPA ’03), May 2003.
[34] N. SASTRY, U. SHANKAR, D. ANDWAGNER, “Secure verification of location claims,”Proc. 2nd ACM Workshop on Wireless Security, Sep. 2003.
[35] L. Hu and D. Evans, “Using directional antennas to prevent wormhole attacks,”Proc. 11th Network and Distributed System Security Symp., Feb. 2004.
[36] F. Ye, H. Luo, S. Lu, and L. ZHANG, “Statistical en-route detection and filtering of injected false data in sensor networks,” Proc. INFOCOM, Mar. 2004.
[37] J. Newsome, R. Shi, D. Song, and A. Perrig, “The sybil attack in sensor networks: Analysis and defenses,” Proc. IEEE Int’l Conf. Information Processing in Sensor Networks (IPSN’04), Apr. 2004.
[38] B. Parno, A. Perrig, and V. Gligor, “Distributed detection of node replication attacks in sensor networks,” Proc. IEEE Symp. Security and Privacy, May 2005.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/44432-
dc.description.abstract在感測網路上所有感測器之間建立配對金鑰是個重要的課題以及嚴峻的挑戰,因為公開金鑰加密法不適用在資源有限的感測節點上。為了提升效能,一些已經提出來的機制多半會採用搭配感測節點的佈置資訊來做配對金鑰的分配。然而,實際的應用上,感測節點的佈置資訊是不容易取得的。在本篇論文裡,我們首先提出了一個建立在異質感測網路以及多項式金鑰基礎的機來建立配對金鑰,並說明此機制可適用在無任何感測節點的佈置資訊下。在我們的分析及模擬下,我們證明我們的機制,除了更有效率外,且在安全性上也有更好的提升。然後我們再把我們的機制延伸成跨叢集的分配配對金鑰機制。一樣地,在效能以及安全性上都比以往的方法好。zh_TW
dc.description.abstractPairwise key establishment in sensor networks is a challenging task because public key cryptography is not desirable on resource-limited sensor nodes. In order to improve performance, some of existing key management schemes proposed to cooperate with deployment information for key distribution. However, in some applications, deployment information of sensor nodes may not be available. In this thesis, we first propose a scheme which leverages heterogeneous sensor network and polynomial-based approach to do pairwise key establishment if there is no deployment information available. The analysis demonstrates that the proposed scheme is not only more efficient, but can also achieve better resilience against node compromises. We then extend our proposed scheme to a cluster-based key predistribution scheme. In addition to its efficiency, the extended scheme can offer perfect security for protecting sensor networks.en
dc.description.provenanceMade available in DSpace on 2021-06-15T02:57:16Z (GMT). No. of bitstreams: 1
ntu-98-R96921061-1.pdf: 533736 bytes, checksum: ba4766b1421ad93404042f3ea766e441 (MD5)
Previous issue date: 2009
en
dc.description.tableofcontentsContents
Chapter 1 Introduction 1
Chapter2 Related Work 4
Chapter3. Overview of Polynomial Pool-Based Key Pre-Distribution 7
3.1 Overview of Polynomial-Based Key Predistribution 7
3.2 Overview of Polynomial Pool-Based key Predistribution 9
Chapter4 THE PROPOSED SCHEME 11
4.1 Deployment model 11
4.2 The proposed scheme 13
4.3 Analysis 15
4.3.1 Connectivity 15
4.3.2 Resilience Against Node Compromises 17
4.3.3 Network Initialization Results 20
4.3.3.1 Simulation Model 20
4.3.3.2 Parameter Setting 23
4.3.3.3 Results: Initialization Time 24
4.3.3.4 Results: Message Overhead 24
Chapter5 The Extended Scheme 26
5.1 The Extended Scheme 26
5.2 Analysis 30
5.2.1 Connectivity 30
5.2.2 Communication Overhead 34
5.2.2.1 Simulation Model 34
5.2.2.2 Results: Communication Cost 36
Chapter6 Conclusion 38
References 39
dc.language.isoen
dc.subject感測網路zh_TW
dc.subject配對金鑰zh_TW
dc.subjectpairwise key establishmenten
dc.subjectsensor networken
dc.title在異質感測網路上建立配對金鑰的方法zh_TW
dc.titlePairwise Key Establishmentin Heterogeneous Sensor Networksen
dc.typeThesis
dc.date.schoolyear97-2
dc.description.degree碩士
dc.contributor.oralexamcommittee莊文勝,顏嗣鈞,郭斯彥,黃秋煌
dc.subject.keyword配對金鑰,感測網路,zh_TW
dc.subject.keywordpairwise key establishment,sensor network,en
dc.relation.page43
dc.rights.note有償授權
dc.date.accepted2009-08-03
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept電機工程學研究所zh_TW
顯示於系所單位:電機工程學系

文件中的檔案:
檔案 大小格式 
ntu-98-1.pdf
  未授權公開取用
521.23 kBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved