請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/51898
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 林宗男(Tsung-Nan Lin) | |
dc.contributor.author | Andrea Agiollo | en |
dc.contributor.author | 安迪亞 | zh_TW |
dc.date.accessioned | 2021-06-15T13:56:06Z | - |
dc.date.available | 2020-09-02 | |
dc.date.copyright | 2020-09-02 | |
dc.date.issued | 2020 | |
dc.date.submitted | 2020-08-11 | |
dc.identifier.citation | [1] Kleinrock,Leonard. “An earlyhistoryofthe internet [HistoryofCommunications]”.In: IEEE CommunicationsMagazine 48.8 (2010),pp.26–36. [2] Mainetti,Luca,Patrono,Luigi,andVilei,Antonio.“Evolutionofwireless sensor networkstowardstheinternetofthings:Asurvey”.In: SoftCOM 2011, 19th internationalconferenceonsoftware,telecommunicationsandcomputer networks. IEEE.2011,pp.1–6. [3] Gaikwad,PranayP,Gabhane,JyotsnaP,andGolait,SnehalS. “A surveybasedonSmartHomessystemusingInternet-of-Things”.In: 2015 International ConferenceonComputationofPower,Energy,Informationand Communication (ICCPEIC). IEEE.2015,pp.0330–0335. [4] Stojkoska,BiljanaLRisteskaandTrivodaliev,KireV.“AreviewofInternet of Thingsforsmarthome:Challengesandsolutions”.In: Journal ofCleaner Production 140 (2017),pp.1454–1464. [5] Breivold,HongyuPeiandSandström,Kristian.“Internetofthingsforindustrial automation–challenges andtechnicalsolutions”.In: 2015 IEEEInternational Conference onDataScienceandDataIntensiveSystems. IEEE.2015,pp.532– 539. [6] DaXu,Li,He,Wu,andLi,Shancang.“Internetofthingsinindustries:Asurvey”. In: IEEE Transactionsonindustrialinformatics 10.4 (2014),pp.2233–2243. [7] Islam,SMRiazul,Kwak,Daehan,Kabir,MDHumaun,Hossain,Mahmud,and Kwak, Kyung-Sup.“Theinternetofthingsforhealthcare:acomprehensive survey”. In: IEEE Access 3 (2015),pp.678–708. [8] Zanella,Andrea, Bui, Nicola,Castellani,Angelo,Vangelista,Lorenzo,andZorzi, Michele. “Internetofthingsforsmartcities”.In: IEEE InternetofThings journal 1.1 (2014),pp.22–32. [9] Kolias,Constantinos,Kambourakis,Georgios,Stavrou,Angelos,andVoas, Jeffrey. “DDoSintheIoT:Miraiandotherbotnets”.In: Computer 50.7 (2017), pp. 80–84. [10] CNN,SelenaLarson. FDA confirmsthatSt.Jude’scardiacdevicescanbe hacked. url: https ://money.cnn.com/2017/01/09/technology/fda-st- jude-cardiac-hack/. [11] NetSim byTetcos. https://www.tetcos.com/netsim-std.html. [12] Raza,Shahid,Wallgren,Linus,andVoigt,Thiemo.“SVELTE:Real-time intrusion detectionintheInternetofThings”.In: Ad hocnetworks 11.8 (2013), pp. 2661–2674. [13] Pongle,PavanandChavan,Gurunath.“Realtimeintrusionandwormhole attack detectionininternetofthings”.In: International JournalofComputer Applications 121.9 (2015). [14] Gara,Fatma,Saad,LeilaBen,andAyed,RahmaBen.“Anintrusiondetection system forselectiveforwardingattackinIPv6-basedmobileWSNs”.In: 2017 13thInternationalWirelessCommunicationsandMobileComputing Conference (IWCMC). IEEE.2017,pp.276–281. [15] Cervantes,Christian,Poplade,Diego,Nogueira,Michele,andSantos,Aldri. “Detection ofsinkholeattacksforsupportingsecureroutingon6LoWPAN for InternetofThings”.In: 2015 IFIP/IEEEInternationalSymposiumon Integrated NetworkManagement(IM). IEEE.2015,pp.606–611. [16] Surendar,MandUmamakeswari,A.“InDReS:AnIntrusionDetectionand response systemforInternetofThingswith6LoWPAN”.In: 2016 International Conference onWirelessCommunications,SignalProcessingandNetworking (WiSPNET). IEEE.2016,pp.1903–1908. [17] Sedjelmaci,Hichem,Senouci,SidiMohamed,andTaleb,Tarik.“Anaccurate security gameforlow-resourceIoTdevices”.In: IEEE Transactionson Vehicular Technology 66.10 (2017),pp.9381–9393. [18] Airehrour,David, Gutierrez, JairoA,andRay,SayanKumar.“SecTrust-RPL: A securetrust-awareRPLroutingprotocolforInternetofThings”.In: Future Generation ComputerSystems 93 (2019),pp.860–876. [19] Patel,KeyurK,Patel,SunilM,etal.“Internetofthings-IOT:definition, characteristics, architecture,enablingtechnologies,application future challenges”. In: International journalofengineeringscienceandcomputing 6.5 (2016). [20] Bandyopadhyay,DebasisandSen,Jaydip.“Internetofthings:Applications and challengesintechnologyandstandardization”.In: Wireless personal communications 58.1 (2011),pp.49–69. [21] Li,Bo,Sainath,TaraN,Narayanan,Arun,Caroselli,Joe,Bacchiani,Michiel, Misra, Ananya,Shafran,Izhak,Sak,Hasim,Pundak,Golan,Chin,KeanK,etal. “Acoustic ModelingforGoogleHome.”In: Interspeech. 2017,pp.399–403. [22] Faria,Ricardo,Brito,Lina,Baras,Karolina,andSilva,José.“Smartmobility:A survey”. In: 2017 InternationalConferenceonInternetofThingsfortheGlobal Community (IoTGC). IEEE.2017,pp.1–8. [23] Buntz,Brian. The Top20IndustrialIoTApplications. url: https ://www. iotworldtoday.com/2017/09/20/top-20-industrial-iot-applications/. [24] Statista. Statista dossierabouttheInternetofThings(IoT). url: https://www. statista.com/study/27915/internet-of-things-iot-statista-dossier/. [25] Statista. Statista DossierabouttheInternetofThings(IoT)inEurope. url: https://www.statista.com/study/42750/internet-of-things-iot-in- europe/. [26] Al-Fuqaha,Ala,Guizani,Mohsen,Mohammadi,Mehdi,Aledhari,Mohammed, and Ayyash,Moussa.“Internetofthings:Asurveyonenablingtechnologies, protocols, andapplications”.In: IEEE communicationssurveys tutorials 17.4 (2015), pp.2347–2376. [27] Lin,Jie,Yu,Wei,Zhang,Nan,Yang,Xinyu,Zhang,Hanlin,andZhao,Wei. “A surveyoninternetofthings:Architecture,enablingtechnologies,security and privacy,andapplications”.In: IEEE InternetofThingsJournal 4.5 (2017), pp. 1125–1142. [28] Mahmoud,Rwan, Yousuf, Tasneem,Aloul,Fadi,andZualkernan,Imran. “Internet ofthings(IoT)security:Currentstatus,challengesandprospective measures”. In: 2015 10thInternationalConferenceforInternetTechnology and SecuredTransactions(ICITST). IEEE.2015,pp.336–341. [29] Li,Li,Xiaoguang,Hu,Ke,Chen,andKetai,He.“Theapplicationsofwifi-based wireless sensornetworkininternetofthingsandsmartgrid”.In: 2011 6thIEEE Conference onIndustrialElectronicsandApplications. IEEE.2011,pp.789– 793. [30] Montenegro,Gabriel,Kushalnagar,Nandakishore,Hui,Jonathan,andCuller, David. “RFC4944:TransmissionofIPv6packetsoverIEEE802.15.4 networks”. In: Request forComments (2007). [31] Welbourne,Evan,Battle,Leilani,Cole,Garret,Gould,Kayla,Rector,Kyle, Raymer, Samuel,Balazinska,Magdalena,andBorriello,Gaetano.“Building the internetofthingsusingRFID:theRFIDecosystemexperience”.In: IEEE Internet computing 13.3 (2009),pp.48–55. [32] Raza,Shahid,Misra,Prasant,He,Zhitao,andVoigt,Thiemo.“Buildingthe Internet ofThingswithbluetoothsmart”.In: Ad HocNetworks 57 (2017), pp. 19–31. [33] Ramachandran,Bhuvana. Internet ofThings–Unravelingtechnology demands developments. url: https://connectedtechnbiz.wordpress.com/ 2014/10/17/iot-unraveling-technology-demands-developments/. [34] Zhang,Zhi-Kai,Cho,MichaelChengYi,Wang,Chia-Wei,Hsu,Chia-Wei,Chen, Chong-Kuan, andShieh,Shiuhpyng.“IoTsecurity:ongoingchallengesand research opportunities”.In: 2014 IEEE7thinternationalconferenceonservice- oriented computingandapplications. IEEE.2014,pp.230–234. [35] Khan,MinhajAhmadandSalah,Khaled.“IoTsecurity:Review,blockchain solutions, andopenchallenges”.In: Future GenerationComputerSystems 82 (2018), pp.395–411. [36] Mendez,DiegoM,Papapanagiotou,Ioannis,andYang,Baijian.“Internetof things: Surveyonsecurityandprivacy”.In: arXiv preprintarXiv:1707.01879 (2017). [37] RahimiMoosavi, Sanaz, NguyenGia,Tuan,Rahmani,Amir-Mohammad, Nigussie, Ethiopia,Virtanen,Seppo,Isoaho,Jouni,andTenhunen,Hannu. “SEA: asecureandefficientauthenticationandauthorizationarchitecturefor IoT-based healthcareusingsmartgateways”.In: Procedia ComputerScience. Vol. 52.Elsevier.2015,pp.452–459. [38] Cirani,Simone,Picone,Marco,Gonizzi,Pietro,Veltri,Luca,andFerrari, Gianluigi. “Iot-oas:Anoauth-basedauthorizationservicearchitectureforsecure services iniotscenarios”.In: IEEE sensorsjournal 15.2 (2014),pp.1224–1234. [39] Lee, Jun-Ya, Lin, Wei-Cheng,andHuang,Yu-Hung.“Alightweightauthenticationprotocol for internetofthings”.In: 2014 InternationalSymposiumonNext-Generation Electronics (ISNE). IEEE.2014,pp.1–2. [40] Shakhov,Vladimir,Koo,Insoo,andRodionov,Alexey.“Energyexhaustion attacks inwirelessnetworks”.In: 2017 InternationalMulti-Conferenceon Engineering, ComputerandInformationSciences(SIBIRCON). IEEE.2017, pp. 1–3. [41] DeDonno,Michele,Dragoni,Nicola,Giaretta,Alberto,andSpognardi,Angelo. “DDoS-capable IoTmalwares:ComparativeanalysisandMiraiinvestigation”. In: Security andCommunicationNetworks 2018 (2018). [42] Costin,AndreiandZaddach,Jonas.“Iotmalware:Comprehensivesurvey, analysis frameworkandcasestudies”.In: BlackHat USA (2018). [43] Pister,Kris,Thubert,Pascal,Dwars,Sicco,andPhinney,Tom.“Industrial routing requirementsinlow-powerandlossynetworks”.In:(2009). [44] Brandt,A,Buron,Jakob,andPorcu,G.“Homeautomationrouting requirements inlow-powerandlossynetworks”.In:(2010). [45] Martocci,Jerry,DeMil,Pieter,Riou,Nicolas,andVermeylen,Wouter. “Building automationroutingrequirementsinlow-powerandlossynetworks”. In: Internet EngineeringTaskForce(IETF). 2010,27–pages. [46] Dohler,Mischa,Watteyne,Thomas,Winter,Tim,andBarthel,Dominique. “Routing requirementsforurbanlow-powerandlossynetworks”.In: RFC 5548. 2009. [47] Tsao,Tzeta, Alexander, R,Dohler,Mischa,Daza,Vanesa,Lozano,Angel,and Richardson, M.“Asecuritythreatanalysisfortheroutingprotocolforlow-power and lossynetworks(RPLs)”.In: RFC7416 (2015), p.131. [48] Winter,Tim,Thubert,Pascal,Brandt,Anders,Hui,J,Kelsey,Richard,Levis, Philip, Pister,Kris,Struik,Rene,Vasseur,JP,Alexander,R,etal.“RPL:Ipv6 routing protocolforlow-powerandlossynetworks.RFC6550”.In:(2012). [49] Nam,Choon-Sung,Jeong,Hee-Jin,and Shin, Dong-Ryeol.“Extendedhierarchicalroutingover6LoWPAN”.In: 2008 Fourth InternationalConferenceonNetworkedComputingandAdvanced Information Management. Vol.1.IEEE.2008,pp.403–405. [50] Yu,HongandHe,Jingsha.“Improvedhierarchicalroutingover6LoWPAN”. In: 2011 IEEE3rdInternationalConferenceonCommunicationSoftwareand Networks. IEEE.2011,pp.377–380. [51] Dawson-Haggerty,Stephen,Tavakoli,Arsalan,andCuller,David.“Hydro:A hybrid routingprotocolforlow-powerandlossynetworks”.In: 2010 First IEEE InternationalConferenceonSmartGridCommunications. IEEE.2010, pp. 268–273. [52] Gaddour,OlfaandKoubâa,Anis.“RPLinanutshell:Asurvey”.In: Computer Networks 56.14 (2012),pp.3163–3178. [53] Qasem,Mamoun,Altawssi,Hussien,Yassien,MuneerBani,andAl-Dubai, Ahmed. “PerformanceevaluationofRPLobjectivefunctions”.In: 2015 IEEE InternationalConferenceonComputerandInformationTechnology; Ubiquitous ComputingandCommunications;Dependable,Autonomicand Secure Computing;PervasiveIntelligenceandComputing. IEEE.2015, pp. 1606–1613. [54] Brachman,Agnieszka.“RPLobjectivefunctionimpactonLLNstopologyand performance”. In: Internet ofthings,smartspaces,andnextgeneration networking. Springer,2013,pp.340–351. [55] Conta,Alex,Deering,Stephen,andGupta,Mukesh. Internet controlmessage protocol (icmpv6)fortheinternetprotocolversion6(ipv6)specification. Tech. rep. RFC2463,december,1998. [56] Ko,Jeonggil, Jeong, Jongsoo,Park,Jongjun,Jun,JongArm,Gnawali, Omprakash, andPaek,Jeongyeup.“DualMOP-RPL:Supportingmultiplemodes of downwardroutinginasingleRPLnetwork”.In: ACM TransactionsonSensor Networks (TOSN) 11.2 (2015),pp.1–20. [57] Yassein,MuneerBani,Aljawarneh,Shadi,etal.“Anewelastictrickletimer algorithm forInternetofThings”.In: Journal ofNetworkandComputer Applications 89 (2017),pp.38–47. [58] Gara,Fatma,Saad,LeilaBen,Hamida,ElyesBen,Tourancheau,Bernard,and Ayed, RahmaBen.“AnadaptivetimerforRPLtohandlemobilityinwireless sensor networks”.In: 2016 Internationalwirelesscommunicationsandmobile computing conference(IWCMC). IEEE.2016,pp.678–683. [59] Korte,KevinDominik,Sehgal,Anuj,andSchönwälder,Jürgen.“Astudyof the RPLrepairprocessusingContikiRPL”.In: IFIP InternationalConference on AutonomousInfrastructure,ManagementandSecurity. Springer.2012, pp. 50–61. [60] Alemdar,HandeandErsoy,Cem.“Wirelesssensornetworksforhealthcare:A survey”. In: Computer networks 54.15 (2010),pp.2688–2710. [61] Jiang,Joe-Air,Tseng,Chwan-Lu,Lu,Fu-Ming,Yang,En-Cheng,Wu,Zong- Siou, Chen,Chia-Pang,Lin,Shih-Hsiang,Lin,Kuang-Chang,andLiao,Chih- Sheng. “AGSM-basedremotewirelessautomaticmonitoringsystemforfield information: Acasestudyforecologicalmonitoringoftheorientalfruitfly, Bactrocera dorsalis(Hendel)”.In: Computers andelectronicsinagriculture 62.2 (2008),pp.243–259. [62] Zand,Pouria,Chatterjea,Supriyo,Das,Kallol,andHavinga,Paul.“Wireless industrial monitoringandcontrolnetworks:Thejourneysofarandtheroad ahead”. In: Journal ofsensorandactuatornetworks 1.2 (2012),pp.123–152. [63] Raza,Shahid,Duquennoy,Simon,Chung,Tony,Yazar,Dogan,Voigt,Thiemo, and Roedig,Utz.“Securingcommunicationin6LoWPANwithcompressed IPsec”. In: 2011 InternationalConferenceonDistributedComputinginSensor Systems andWorkshops(DCOSS). IEEE.2011,pp.1–8. [64] Jung,Wooyoung, Hong, Sungmin,Ha,Minkeun,Kim,Young-Joo,and Kim, Daeyoung.“SSL-basedlightweightsecurityofIP-basedwirelesssensor networks”. In: 2009 InternationalConferenceonAdvancedInformation Networking andApplicationsWorkshops. IEEE.2009,pp.1112–1117. [65] Wallgren,Linus,Raza,Shahid,andVoigt,Thiemo.“Routingattacksand countermeasures intheRPL-basedinternetofthings”.In: International Journal ofDistributedSensorNetworks 9.8 (2013),p.794326. [66] Pongle,PavanandChavan,Gurunath.“Asurvey:AttacksonRPLand6LoWPAN in IoT”.In: 2015 Internationalconferenceonpervasivecomputing(ICPC). IEEE. 2015,pp.1–6. [67] Raoof,Ahmed,Matrawy,Ashraf,and Lung, Chung-Horng.“RoutingattacksandmitigationmethodsforRPL-based internet ofthings”.In: IEEE CommunicationsSurveys Tutorials 21.2 (2018), pp. 1582–1606. [68] Mohammadi,Shahriar,Atani,RezaEbrahimi,andJadidoleslamy,Hossein.“A comparison ofroutingattacksonwirelesssensornetworks”.In: organization 4 (2011), p.21. [69] Sharmila,SandUmamaheswari,G.“DefensiveMechanismsofSelective Forward AttackinWirelessSensorNetworks”.In: International Journalof Computer Applications 39.4 (2012),pp.43–49. [70] Hui,JonathanandVasseur,JP. The routingprotocolforlow-powerandlossy networks (rpl)optionforcarryingrplinformationindata-planedatagrams. Tech. rep.RFC6553,March,2012. [71] Kent,StephenandAtkinson,Randall. Security architecturefortheinternet protocol. 1998. [72] Rescorla,EricandModadugu,Nagendra.“RFC6347:Datagramtransportlayer security version1.2”.In: Internet EngineeringTaskForce 13 (2012),p.101. [73] Dunkels,Adam,Gronvall,Bjorn,andVoigt,Thiemo.“Contiki-alightweightand flexible operatingsystemfortinynetworkedsensors”.In: 29th annualIEEE international conferenceonlocalcomputernetworks. IEEE.2004,pp.455– 462. [74] Luo,Gao Feng, Shi,ZiJuan,andXu,YouQuan.“SimulationandVisualization of WirelessSensorNetworksbasedonNS2”.In: Applied Mechanicsand Materials. Vol.687.TransTechPubl.2014,pp.1766–1769. [75] Wald,AbrahamandWolfowitz,Jacob.“Optimumcharacterofthesequential probability ratiotest”.In: The AnnalsofMathematicalStatistics (1948), pp. 326–339. [76] Levis,PhilipandLee,Nelson.“Tossim:Asimulatorfortinyosnetworks”.In: UC Berkeley, September 24 (2003). [77] Ji,Yiming,Biaz,Saad,Wu,Shaoen,andQi,Bing.“Optimalsniffersdeployment on wirelessindoorlocalization”.In: 2007 16thInternationalConferenceon Computer CommunicationsandNetworks. IEEE.2007,pp.251–256. [78] Biaz,Saad,Ji,Yiming,andAgrawal,Prathima.“Impactofsnifferdeployment on indoorlocalization”.In: 2005 InternationalConferenceonCollaborative Computing: Networking,ApplicationsandWorksharing. IEEE.2005,10–pp. [79] Hyndman,RobandAthanasopoulos,George. Forecasting: Principlesand Practice. MonashUniversity,Australia,2013. [80] Conejo,AntonioJ,Plazas,MiguelA,Espinola,Rosa,andMolina,AnaB.“Day- ahead electricitypriceforecastingusingthewavelettransformandARIMA models”. In: IEEE transactionsonpowersystems 20.2 (2005),pp.1035–1042. [81] Yaacob,AsrulH,Tan,IanKT,Chien,SuFong,andTan,HonKhi.“Arima based networkanomalydetection”.In: 2010 SecondInternationalConference on CommunicationSoftwareandNetworks. IEEE.2010,pp.205–209. [82] Gallager,RobertG. Stochastic Processes:TheoryforApplications. Cambridge University Press,2013. [83] Papoulis,AthanasiosandPillai,S.Unnikrishna. Probability, Random Variables, andStochasticProcesses. Fourth.McGrawHill,2002. [84] Iordanova,Tzveta. An IntroductiontoStationaryandNon-Stationary Processes. url: https ://www.investopedia.com/articles/trading/07/ stationary.asp. [85] Lane,David,Scott,David,Hebl,Mikki,Guerra,Rudy,Osherson,Dan,and Zimmer, Heidi. Introduction toStatistics. RiceUniversity Universityof Houston, 2014. 117 | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/51898 | - |
dc.description.abstract | 物联网通信范式正在改变着互联网世界。物联网正在引入无限的应用可能性。智能城市,工业自动化,智能家居和智能医疗保健只是可能的物联网应用的一些示例。物联网革命也带来了安全隐患。特别是,受限设备与互联网世界的连接给人类用户的安全和隐私以及其数据的保密性带来了新的威胁。在这种情况下,开发可靠的网络安全机制以完全保护IoT至关重要。此外,物联网网络的子集可能会引入通信功率约束和有损链路。在这些情况下,必须考虑其他注意事项以保护设备之间的通信。 拟议的工作旨在保护RPL(物联网的标准化路由协议)。我们提出CSI,它是一种新颖的入侵检测系统(IDS),可以克服大多数最新IDS的缺点。特别是,CSI引入了一种新颖的嗅探方法,以实现零开销,消除任何计算问题并检测针对RPL的14种不同的攻击。此外,CSI依赖于基于异常的检测和基于签名的分类技术的组合。这两个范例在一个两阶段系统中组合在一起,可以执行可靠的攻击检测,同时保持较小的误报率。为了测试CSI的性能,我们使用NetSim模拟了14种不同类型的攻击。在不同情况下考虑每种攻击,以正确测试CSI的检测能力。结果表明,CSI能够可靠地检测到这些攻击,其性能优于最新的IDS。我们还研究了所提出系统的计算性能,显示了其在现实世界中的适用性。 | zh_TW |
dc.description.abstract | The Internet of Things paradigm of communication is changing the internet world. IoT is introducing endless possibility of application. Smart cities, Industrial automation, Smart homes and Intelligent healthcare are just some examples of possible IoT applications. The IoT revolution brings also security concerns. In particular, the connection of constrained devices to the internet world produces new threats for human users safety and privacy, as well as to the secrecy of their data. In this scenario it is fundamental to develop reliable cybersecurity mechanisms to protect completely IoT. Moreover, subsets of IoT networks may introduce communication power constrains and lossy links. In these scenarios, additional considerations must be taken into account to secure communication between devices. The proposed work aims at securing RPL, the standardized routing protocol for IoT. We propose CSI, a novel Intrusion Detection System (IDS) that overcomes most of state-of-the-art IDSs' drawbacks. In particular, CSI introduces a novel sniffing approach to reach zero overhead, remove any computational issue and detect 14 different attacks against RPL. Moreover, CSI relies on the combination of anomaly-based detection and signature-based classification techniques. The two paradigms are combined in a two-stages system to perform reliable attack detection, while maintaining small false positives rate. To test CSI's performances we simulate 14 different classes of attacks using NetSim. Each attack is considered in different scenarios to test properly CSI's detection ability. Results show that CSI reliably detects these attacks, outperforming state-of-the-art IDSs. We study also the computational performances of the proposed system, showing its applicability to real world scenarios. | en |
dc.description.provenance | Made available in DSpace on 2021-06-15T13:56:06Z (GMT). No. of bitstreams: 1 U0001-0808202000204300.pdf: 7319822 bytes, checksum: ef01824448501934b010a55c630e366c (MD5) Previous issue date: 2020 | en |
dc.description.tableofcontents | Contents 1 Introduction 1 2 Internet of Things and LLNs 5 2.1 Internet of Things . ............................. 5 2.1.1 IoT concept and applications . ................... 6 2.1.2 IoT architecture . .......................... 7 2.1.3 IoT communication . ........................ 9 2.1.4 IoT security . ............................. 10 2.2 Low Power and Lossy Networks (LLNs) . ................. 14 2.2.1 Securing LLNs . ........................... 15 3 Routing Protocol for Low Power and Lossy Networks (RPL) 17 3.1 Overview . .................................. 18 3.2 Protocol Specifications . .......................... 20 3.2.1 RPL control packets . ........................ 20 3.2.2 DODAG construction . ....................... 24 3.2.3 Network management . ....................... 25 3.2.4 Communication paradigms . .................... 28 3.2.5 Security mechanisms . ....................... 29 3.3 RPL Applications . .............................. 30 4 Attacks against RPL 33 4.1 Attacks classification . ............................ 33 4.2 WSN inherited attacks . ........................... 34 4.3 RPL specific attacks . ............................ 41 4.4 Attacks table sum-up . ........................... 48 5 Intrusion Detection Systems-State of the art 51 5.1 SVELTE . ................................... 51 5.2 Real Time Intrusion and Wormhole Attack Detection in Internet of Things (IDSW) . ................................... 54 5.3 Detection of Sinkhole Attacks for Supporting Secure Routing on 6LoWPAN for Internet of Things (INTI) . .................. 56 5.4 InDReS: An Intrusion Detection and Response System for Internet of Things with6LoWPAN . ........................... 59 5.5 IDS for Selective Forward in Mobile WSNs (IDSSF) . .......... 60 5.6 An Accurate Security Game for Low-Resource IoT Devices (GameIDS)63 5.7 SecTrust . .................................. 65 5.8 IDSs sum-up tables . ............................ 67 6 CSI:Centralized Sniffing-based IDS 71 6.1 Introduction . ................................. 72 6.2 Traffic Collection . .............................. 74 6.3 Features Extraction . ............................ 74 6.3.1 Traffic parsing . ........................... 75 6.3.2 Device’s Features Extraction . ................... 76 6.4 Anomalies Detection . ............................ 78 6.4.1 AutoRegressiveIntegratedMovingAverage-ARIMA . ..... 79 6.4.2 ARIMA in CSI . ........................... 81 6.5 Attack Classification . ............................ 83 6.5.1 Classification Flow . ......................... 86 6.5.2 Attacker Identification . ....................... 89 7 Results 91 7.1 Experiment Setup . ............................. 91 7.2 Tuning Parameters . ............................. 97 7.3 Performances . ............................... 100 7.3.1 False Positives Performances . .................. 100 7.3.2 Detection and Identification Performances . ........... 101 7.3.3 Time Performances . ........................ 102 8 Conclusions 105 8.1 Discussion . ................................. 105 8.2 Future Work . ................................ 106 8.3 Final Considerations . ............................ 108 References 109 | |
dc.language.iso | en | |
dc.title | 低功率且易失封包的物聯網環境中之網路攻擊行為偵測 | zh_TW |
dc.title | DNA: Detection of Networking Attacks in RPL based IoT Networks via Traffic Analysis | en |
dc.type | Thesis | |
dc.date.schoolyear | 108-2 | |
dc.description.degree | 碩士 | |
dc.subject.keyword | 低功率且易失封包的物聯網環境中之網路攻擊行為偵測, | zh_TW |
dc.subject.keyword | Internet of Things,Intrusion Detection System,Networking attacks,Routing Protocol,Low Power Lossy Networks,AutoRegressive Integrated Moving Average, | en |
dc.relation.page | 117 | |
dc.identifier.doi | 10.6342/NTU202002674 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2020-08-12 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 電信工程學研究所 | zh_TW |
顯示於系所單位: | 電信工程學研究所 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
U0001-0808202000204300.pdf 目前未授權公開取用 | 7.15 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。