請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/70767完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 周承復(Cheng-Fu Chou) | |
| dc.contributor.author | SENG-LAM KUAN | en |
| dc.contributor.author | 關盛林 | zh_TW |
| dc.date.accessioned | 2021-06-17T04:37:45Z | - |
| dc.date.available | 2023-08-10 | |
| dc.date.copyright | 2018-08-10 | |
| dc.date.issued | 2018 | |
| dc.date.submitted | 2018-08-08 | |
| dc.identifier.citation | [1] Chen, M., Hu, Q., Fisac, J., Akametalu, K., Mackin, C., & Tomlin, C. (2016). Guaranteeing safety and liveness of unmanned aerial vehicle platoons on air highways. CoRR.
[2] Trujano, G. B. R. R. F., Chan, B., Beams, G., & Rivera, R. (2016). Security analysis of dji phantom 3 standard. Massachusetts Institute of Technology. [3] Yousefi, S., & Fathy, M. (2008). Metrics for performance evaluation of safety applications in vehicular ad hoc networks. Transport, 23(4), 291-298. [4] Salama, D., Kader, H. A., & Hadhoud, M. (2011). Studying the effects of most common encryption algorithms. International Arab Journal of e-Technology, 2(1), 1-10. [5] Maxa, J. A., Mahmoud, M. S. B., & Larrieu, N. (2017). Survey on uaanet routing protocols and network security challenges. Ad Hoc & Sensor Wireless Networks. [6] www.top500.org [7] Elminaam, D. S. A., Abdual-Kader, H. M., & Hadhoud, M. M. (2010). Evaluating the performance of symmetric encryption algorithms. IJ Network Security, 10(3), 216-222. [8] Ralph Merkle. Secrecy, authentication and public key systems/A certified digital signature. Ph.D. dissertation, Dept. of Electrical Engineering, Stanford University, 1979. [9] Xiangying, K., & Yanhui, C. (2017, August). Left full binary hash tree for remote attestation. In Signal and Image Processing (ICSIP), 2017 IEEE 2nd International Conference on (pp. 385-390). IEEE. [10] Warner, J. S., & Johnston, R. G. (2003). GPS spoofing countermeasures. Homeland Security Journal, 25(2), 19-27. [11] Hu, Y. C., Perrig, A., & Johnson, D. B. (2003, April). Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies (Vol. 3, pp. 1976-1986). IEEE. [12] Yoon, K., Park, D., Yim, Y., Kim, K., Yang, S. K., & Robinson, M. (2017, April). Security authentication system using encrypted channel on UAV network. In Robotic Computing (IRC), IEEE International Conference on (pp. 393-398). IEEE. [13] Schneier, B. (1994). The Blowfish encryption algorithm. Dr Dobb's Journal-Software Tools for the Professional Programmer, 19(4), 38-43. [14] Potlapally, N. R., Ravi, S., Raghunathan, A., & Jha, N. K. (2006). A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on mobile computing, 5(2), 128-143. [15] Rijmen, V. (1997). Cryptanalysis and design of iterated block ciphers (Doctoral dissertation, Doctoral Dissertation, October 1997, KU Leuven). [16] https://sweet32.info/ [17] Wang, N. W., Huang, Y. M., & Chen, W. M. (2008). A novel secure communication scheme in vehicular ad hoc networks. Computer communications, 31(12), 2827-2837. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/70767 | - |
| dc.description.abstract | 隨著無人機(UAV)的快速發展,可以通過它們實現越來越多的服務,例如交付,自動巡邏,時間無線傳感器/通信網絡等。[1]提出了一種稱為空中高速公路的方案,分組所有無人機都遠離人類區域並形成一個自動系統,以保證人身安全。在這種無人系統中,安全性是確保在安全和授權環境下提供服務的重要問題。 VANET和MANNET中的安全協議在UAANET中效率不高,因為他們沒有考慮整個系統是自動進行的,並且大多數都無法抵禦蟲洞攻擊。在本文中,我們提出了一種安全方案UTSEC,它利用了無人機車隊的特性使其可以對抗蟲洞攻擊和加密週期時間敏感的安全應用信息的輕量型方案。我們還在一個任務中模擬了無人機交通相關消息交換的功耗去檢視UTSEC 的效能。 | zh_TW |
| dc.description.abstract | With the rapid evolution of unmanned Aerial vehicle(UAV), more and more services can be accomplished by them, such as delivery, auto patrol, temporal wireless sensor / communication network, and etc. [1] proposed a scenario called Air Highways, grouping all UAVs far away from human area and formed an automatic system in order to guarantee human safety. In such unmanned system, security is an important issue to ensure the services is provided under a safety and authorized environment. Security protocols in VANET and MANNET is not efficient in UAANET as they didn't consider the whole system is under automatic manner and most of them can’t resist wormhole attack. In this paper, we proposed a security scheme, UTSEC, which is a light-weight solution to against wormhole attack and encrypt periodic time sensitive safety application message by leverage characteristic of UAV fleets. We also give a simulation of power consumption of traffic related message exchange of UAV in one mission. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-17T04:37:45Z (GMT). No. of bitstreams: 1 ntu-107-R05944042-1.pdf: 3854352 bytes, checksum: a0deda97540d857e58f179f68c65b402 (MD5) Previous issue date: 2018 | en |
| dc.description.tableofcontents | 口試委員會審定書 i
誌謝 ii 中文摘要 iii ABSTRACT iv CONTENTS v LIST OF FIGURES vii LIST OF TABLES viii Chapter 1 Introduction 1 1.1 Background 5 1.1.1 Difference between MANET, VANET, UAANET 5 1.1.2 Wormhole Attack 6 1.1.3 Hash Tree 6 Chapter 2 Scenario 9 Chapter 3 Relating Work 12 3.1 VANNET Security Mechanism 12 3.2 UAANET Security 12 3.3 Packet leaches 13 Chapter 4 Proposed Scheme – UTSEC 16 4.1 UTSEC 16 4.1.1 Overall Mechanism 16 4.1.2 Verification Hash Tree 18 4.1.3 Change Fleet Operation 20 4.2 Security analysis 23 4.2.1 Brute Force Attack: 23 4.2.2 Wormhole Attack: 24 4.3 Assumption and Power Consumption Estimation 25 4.3.1 Safety Application 26 4.3.2 Comparison to TIK 27 4.3.3 Change Fleet Operation 28 4.4 Limitation of UTSEC 28 4.4.1 Shifting Problem in UAV Fleet 28 4.4.2 Fleet Shape 30 Chapter 5 Evaluation and Comparison to Relating Work 31 5.1 Experiment Set Up 31 5.2 Safety Application 32 5.3 TIK Protocol and Guard Channel 33 5.4 Change Fleet Operation 34 5.5 Overall Comparison 35 5.6 UTSEC Performance under Different Parameters 36 5.6.1 Performance in change of number of neighbor 36 5.6.2 Performance in change of message frequency 37 Chapter 6 Conclusion and Future Work 38 Chapter 7 Reference 39 | |
| dc.language.iso | en | |
| dc.subject | 哈希樹 | zh_TW |
| dc.subject | 安全性 | zh_TW |
| dc.subject | 蟲洞攻擊 | zh_TW |
| dc.subject | UAANET | zh_TW |
| dc.subject | hash tree | en |
| dc.subject | wormhole attack | en |
| dc.subject | security | en |
| dc.subject | UAANET | en |
| dc.title | 低空無人機群交通的有效安全方案 | zh_TW |
| dc.title | An efficient secure scheme for low attitude UAV traffic | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 106-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 吳曉光(Hsiao-kuang Wu),林俊宏(C.-H. Richard Lin),蔡子傑(Tzu-Chieh Tsai) | |
| dc.subject.keyword | UAANET,安全性,蟲洞攻擊,哈希樹, | zh_TW |
| dc.subject.keyword | UAANET,security,wormhole attack,hash tree, | en |
| dc.relation.page | 40 | |
| dc.identifier.doi | 10.6342/NTU201802621 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2018-08-08 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 資訊網路與多媒體研究所 | zh_TW |
| 顯示於系所單位: | 資訊網路與多媒體研究所 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-107-1.pdf 未授權公開取用 | 3.76 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
