Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊網路與多媒體研究所
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/70767
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor周承復(Cheng-Fu Chou)
dc.contributor.authorSENG-LAM KUANen
dc.contributor.author關盛林zh_TW
dc.date.accessioned2021-06-17T04:37:45Z-
dc.date.available2023-08-10
dc.date.copyright2018-08-10
dc.date.issued2018
dc.date.submitted2018-08-08
dc.identifier.citation[1] Chen, M., Hu, Q., Fisac, J., Akametalu, K., Mackin, C., & Tomlin, C. (2016). Guaranteeing safety and liveness of unmanned aerial vehicle platoons on air highways. CoRR.
[2] Trujano, G. B. R. R. F., Chan, B., Beams, G., & Rivera, R. (2016). Security analysis of dji phantom 3 standard. Massachusetts Institute of Technology.
[3] Yousefi, S., & Fathy, M. (2008). Metrics for performance evaluation of safety applications in vehicular ad hoc networks. Transport, 23(4), 291-298.
[4] Salama, D., Kader, H. A., & Hadhoud, M. (2011). Studying the effects of most common encryption algorithms. International Arab Journal of e-Technology, 2(1), 1-10.
[5] Maxa, J. A., Mahmoud, M. S. B., & Larrieu, N. (2017). Survey on uaanet routing protocols and network security challenges. Ad Hoc & Sensor Wireless Networks.
[6] www.top500.org
[7] Elminaam, D. S. A., Abdual-Kader, H. M., & Hadhoud, M. M. (2010). Evaluating the performance of symmetric encryption algorithms. IJ Network Security, 10(3), 216-222.
[8] Ralph Merkle. Secrecy, authentication and public key systems/A certified digital signature. Ph.D. dissertation, Dept. of Electrical Engineering, Stanford University, 1979.
[9] Xiangying, K., & Yanhui, C. (2017, August). Left full binary hash tree for remote attestation. In Signal and Image Processing (ICSIP), 2017 IEEE 2nd International Conference on (pp. 385-390). IEEE.
[10] Warner, J. S., & Johnston, R. G. (2003). GPS spoofing countermeasures. Homeland Security Journal, 25(2), 19-27.
[11] Hu, Y. C., Perrig, A., & Johnson, D. B. (2003, April). Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies (Vol. 3, pp. 1976-1986). IEEE.
[12] Yoon, K., Park, D., Yim, Y., Kim, K., Yang, S. K., & Robinson, M. (2017, April). Security authentication system using encrypted channel on UAV network. In Robotic Computing (IRC), IEEE International Conference on (pp. 393-398). IEEE.
[13] Schneier, B. (1994). The Blowfish encryption algorithm. Dr Dobb's Journal-Software Tools for the Professional Programmer, 19(4), 38-43.
[14] Potlapally, N. R., Ravi, S., Raghunathan, A., & Jha, N. K. (2006). A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on mobile computing, 5(2), 128-143.
[15] Rijmen, V. (1997). Cryptanalysis and design of iterated block ciphers (Doctoral dissertation, Doctoral Dissertation, October 1997, KU Leuven).
[16] https://sweet32.info/
[17] Wang, N. W., Huang, Y. M., & Chen, W. M. (2008). A novel secure communication scheme in vehicular ad hoc networks. Computer communications, 31(12), 2827-2837.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/70767-
dc.description.abstract隨著無人機(UAV)的快速發展,可以通過它們實現越來越多的服務,例如交付,自動巡邏,時間無線傳感器/通信網絡等。[1]提出了一種稱為空中高速公路的方案,分組所有無人機都遠離人類區域並形成一個自動系統,以保證人身安全。在這種無人系統中,安全性是確保在安全和授權環境下提供服務的重要問題。 VANET和MANNET中的安全協議在UAANET中效率不高,因為他們沒有考慮整個系統是自動進行的,並且大多數都無法抵禦蟲洞攻擊。在本文中,我們提出了一種安全方案UTSEC,它利用了無人機車隊的特性使其可以對抗蟲洞攻擊和加密週期時間敏感的安全應用信息的輕量型方案。我們還在一個任務中模擬了無人機交通相關消息交換的功耗去檢視UTSEC 的效能。zh_TW
dc.description.abstractWith the rapid evolution of unmanned Aerial vehicle(UAV), more and more services can be accomplished by them, such as delivery, auto patrol, temporal wireless sensor / communication network, and etc. [1] proposed a scenario called Air Highways, grouping all UAVs far away from human area and formed an automatic system in order to guarantee human safety. In such unmanned system, security is an important issue to ensure the services is provided under a safety and authorized environment. Security protocols in VANET and MANNET is not efficient in UAANET as they didn't consider the whole system is under automatic manner and most of them can’t resist wormhole attack. In this paper, we proposed a security scheme, UTSEC, which is a light-weight solution to against wormhole attack and encrypt periodic time sensitive safety application message by leverage characteristic of UAV fleets. We also give a simulation of power consumption of traffic related message exchange of UAV in one mission.en
dc.description.provenanceMade available in DSpace on 2021-06-17T04:37:45Z (GMT). No. of bitstreams: 1
ntu-107-R05944042-1.pdf: 3854352 bytes, checksum: a0deda97540d857e58f179f68c65b402 (MD5)
Previous issue date: 2018
en
dc.description.tableofcontents口試委員會審定書 i
誌謝 ii
中文摘要 iii
ABSTRACT iv
CONTENTS v
LIST OF FIGURES vii
LIST OF TABLES viii
Chapter 1 Introduction 1
1.1 Background 5
1.1.1 Difference between MANET, VANET, UAANET 5
1.1.2 Wormhole Attack 6
1.1.3 Hash Tree 6
Chapter 2 Scenario 9
Chapter 3 Relating Work 12
3.1 VANNET Security Mechanism 12
3.2 UAANET Security 12
3.3 Packet leaches 13
Chapter 4 Proposed Scheme – UTSEC 16
4.1 UTSEC 16
4.1.1 Overall Mechanism 16
4.1.2 Verification Hash Tree 18
4.1.3 Change Fleet Operation 20
4.2 Security analysis 23
4.2.1 Brute Force Attack: 23
4.2.2 Wormhole Attack: 24
4.3 Assumption and Power Consumption Estimation 25
4.3.1 Safety Application 26
4.3.2 Comparison to TIK 27
4.3.3 Change Fleet Operation 28
4.4 Limitation of UTSEC 28
4.4.1 Shifting Problem in UAV Fleet 28
4.4.2 Fleet Shape 30
Chapter 5 Evaluation and Comparison to Relating Work 31
5.1 Experiment Set Up 31
5.2 Safety Application 32
5.3 TIK Protocol and Guard Channel 33
5.4 Change Fleet Operation 34
5.5 Overall Comparison 35
5.6 UTSEC Performance under Different Parameters 36
5.6.1 Performance in change of number of neighbor 36
5.6.2 Performance in change of message frequency 37
Chapter 6 Conclusion and Future Work 38
Chapter 7 Reference 39
dc.language.isoen
dc.subject哈希樹zh_TW
dc.subject安全性zh_TW
dc.subject蟲洞攻擊zh_TW
dc.subjectUAANETzh_TW
dc.subjecthash treeen
dc.subjectwormhole attacken
dc.subjectsecurityen
dc.subjectUAANETen
dc.title低空無人機群交通的有效安全方案zh_TW
dc.titleAn efficient secure scheme for low attitude UAV trafficen
dc.typeThesis
dc.date.schoolyear106-2
dc.description.degree碩士
dc.contributor.oralexamcommittee吳曉光(Hsiao-kuang Wu),林俊宏(C.-H. Richard Lin),蔡子傑(Tzu-Chieh Tsai)
dc.subject.keywordUAANET,安全性,蟲洞攻擊,哈希樹,zh_TW
dc.subject.keywordUAANET,security,wormhole attack,hash tree,en
dc.relation.page40
dc.identifier.doi10.6342/NTU201802621
dc.rights.note有償授權
dc.date.accepted2018-08-08
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept資訊網路與多媒體研究所zh_TW
顯示於系所單位:資訊網路與多媒體研究所

文件中的檔案:
檔案 大小格式 
ntu-107-1.pdf
  未授權公開取用
3.76 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved