系統識別號 | U0002-1607200710580500 |
---|---|
DOI | 10.6846/TKU.2007.00443 |
論文名稱(中文) | 安全的感測網路資料傳輸技術之研究 |
論文名稱(英文) | The Study of Secure Data Dissemination in Wireless Sensor Networks |
第三語言論文名稱 | |
校院名稱 | 淡江大學 |
系所名稱(中文) | 資訊工程學系碩士班 |
系所名稱(英文) | Department of Computer Science and Information Engineering |
外國學位學校名稱 | |
外國學位學院名稱 | |
外國學位研究所名稱 | |
學年度 | 95 |
學期 | 2 |
出版年 | 96 |
研究生(中文) | 林偉聖 |
研究生(英文) | Wei-Sheng Lin |
學號 | 694190231 |
學位類別 | 碩士 |
語言別 | 繁體中文 |
第二語言別 | |
口試日期 | 2007-06-25 |
論文頁數 | 80頁 |
口試委員 |
指導教授
-
黃仁俊(junhwang@ms35.hinet.net)
委員 - 雷欽隆 委員 - 鄧惟中 委員 - 黃心嘉 |
關鍵字(中) |
無線感測網路 資料傳輸 安全 |
關鍵字(英) |
Wireless Sensor Networks Data Dissemination security |
第三語言關鍵字 | |
學科別分類 | |
中文摘要 |
無線感測網路最主要的功能就是透過感測器將所感測到的資料傳輸回基地台供分析與處理。大部分感測器均離基地台有一段距離。所以訊息必須透過中間感測器來幫忙轉送。由於感測器的電力資源有限,因此將訊息透過適當的路由機制所建立的路徑來傳送至基地台會較不指定路徑的傳輸方式更省電力。且由於訊息在傳輸的過程中是透過無線傳輸的方式,相較於傳統有線網路訊息更容易遭到竊聽、竄改等攻擊。因此如何建立路由路徑並確保訊息在路徑傳輸中的安全性乃相當重要。除此之外,在訊息傳輸機制中相當重要的一環就是訊息傳輸的可靠性,亦即訊息成功送達目的地的比率。可靠性的高低不僅會受到網路品質的影響,同時在面臨惡意攻擊者時,亦會造成可靠性的下降。最常見的一種攻擊即為選擇性轉送攻擊。這種攻擊會大幅地降低訊息傳輸的可靠性。本論文提一安全感測網路傳輸技術,每個感測器可以建立多條到達基地台的路由路徑,並透過相關的金鑰對訊息做加密與訊息鑑別碼以確保了資料在傳輸過程中的機密性與完整性。同時透過監督機制來監控訊息的傳輸狀態,可降低不良網路狀態亦或是攻擊者發動的選擇性轉送攻擊對於訊息傳輸所造成的影響。 |
英文摘要 |
The main function of wireless sensor networks is to let sensors sense data and send data back to the base station. Most of sensor nodes need the intermediate nodes to help them relay the data. In order to limit the power consumption of the sensor node, we usually use the routing paths created by the proper routing scheme to transmit the data. Because all transmission is done through wireless communications, the data has more chance to be sniffed or tampered with than through wire transmission. So, it is important to establish the routing paths and to ensure the security of the data in the transmission. Besides, another important issue of the data dissemination scheme is the reliability of the transmission. It is not only affected by the quality of the network, but also in face to the attacker. The common attack is selective forwarding attack. This kind of attack will reduce the reliability of the transmission substantially. In our proposed scheme, we let all nodes generate multiple paths back to the base station, and we use the encryption and message authentication code to keep the confidentiality and integrity of the data. We also monitor the transmission status through our monitor method. So, our scheme maintains the high reliability even under the selective forwarding attack caused by the attacker. |
第三語言摘要 | |
論文目次 |
論文目錄 目錄 I 圖目錄 III 表目錄 IV 第1章 緒論 1 第2章 相關研究 6 第3章 安全的感測網路訊息傳輸方法 9 3.1 系統環境描述 12 3.2 成對金鑰及路由金鑰建立階段 13 3.3 多路徑探索階段 15 3.4 訊息傳輸階段 17 3.5 金鑰更新階段 32 第4章 安全分析 40 4.1 機密性與完整性 40 4.2 針對常見路由攻擊的抵抗性 41 第5章 模擬結果 45 第6章 結論與未來研究工作 56 參考文獻 58 附錄—英文論文稿 61 圖目錄 圖1:感測器在訊息傳輸時扮演不同角色的示意圖 19 圖2:訊息成功送達基地台的比率 47 圖3:訊息成功送達基地台的比率(存在遭破解感測器20%) 48 圖4:訊息成功送達基地台的比率(存在遭破解感測器30%) 49 圖5:訊息成功送達基地台的比率(存在失效感測器20%,連線失敗率2%) 50 圖6:訊息成功送達基地台的比率(存在失效感測器30%,連線失敗率3%) 51 圖7:攻擊者取得機密資料的比率 53 圖8:訊息傳輸所耗費的傳輸次數 54 表目錄 表1:符號表 11 表2:傳輸路徑篩選原則 21 表3:不正常行為描述 22 表4:替代路徑篩選原則 24 表5:模擬參數 46 |
參考文獻 |
[1] H. M. Ammari, S. K. Das,“An energy-efficient data dissemination protocol for wireless sensor networks”,IEEE International Conference on Pervasive Computing and Communications, p.5, March 2006. [2] A. Boukerche, X. Cheng, J. Linus,“A performance evaluation of a novel energy-aware data-centric routing algorithm in wireless sensor networks”, Wireless Networks, vol. 11, issue 5, September 2005. [3] D. Carman, P. Kruus, and B. J. Matt,“Constraints and approaches for distributed sensor network security”, NAI Labs Technical Report 00-010, June 2000. [4] J. Deng, C. Hartung, R. Han, S. Mishra,“A practical study of transitory master key establishment for wireless sensor networks”, First International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp.289 – 302, September 2005. [5] T. Dimitriou, I. Krontiris,“A localized, distributed protocol for secure information exchange in sensor networks”, Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, p.8, April 2005. [6] L. Eschenauer, V. D. Gligor,“A key-management scheme for distributed sensor networks”, Proceedings of the 9th ACM conference on Computer and communications security, November 2002. [7] M. Eltoweissy, M. F. Younis, K. Ghumman,“Lightweight key management for wireless sensor networks”, IEEE International Conference on Performance, Computing, and Communications, pp.813-818, 2004. [8] P. Geng, C. Zou,“Routing attacks and solutions in mobile ad hoc networks”, International Conference on Communication Technology, pp.1–4, November 2006. [9] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, K. Pister,“System architecture directions for networked sensors”, Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems ASPLOS-IX, vol. 34, 28, issue 5 , 5, November 2000. [10] V. Jolly, N. Kimura, S. Latifi,“Reliable multipath information dissemination via label forwarding in wireless sensor networks”, Third International Conference on Technology: New Generations ITNG 2006, 10-12, pp.285–293, April 2006. [11] T. Kwon, S. H. Park,“Experimental study on wireless sensor network security”, LNCS 3975, pp.741–743, 2006. [12] C. Karlof, D. Wagner,“Secure routing in wireless sensor networks: attacks and countermeasures”, Proceedings of the IEEE International Workshop on Sensor Network Protocols and Applications, pp.113 – 127, May 2003. [13] S. B. Lee, Y. H. Choi,“A secure alternate path routing in sensor networks”, Computer Communications, vol. 30, issue 1, pp.153-165, December 2006. [14] W. Lou, Y. Kwon,“H-SPREAD a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks”, IEEE Transactions on Vehicular Technology, vol. 55, issue 4, pp.1320–1330, July 2006. [15] W. Liang, Y. Liu,“Online data gathering for maximizing network lifetime in sensor networks”, IEEE Transactions on Mobile Computing, vol. 6, Issue 1, pp.2–11, January 2007. [16] Y. M. Lu, V. W. S. Wong,“An energy-efficient multipath routing protocol for wireless sensor networks”, IEEE 64th Vehicular Technology Conference, pp.1-5, September 2006. [17] W. Liu, Y. Zhang, W. Lou, Y. Fang, “A robust and energy-efficient data dissemination framework for wireless sensor networks”, Wireless Networks, vol. 12, issue 4, July 2006. [18] M. Moharrum, M. Eltoweissy, R. Mukkamala,“Dynamic combinatorial key management scheme for sensor networks”, Wireless Communications and Mobile Computing, vol. 6, Issue 7, pp.1017-1035, November 2006. [19] S. Marti, T. J. Giuli, K. Lai, M. Baker,“Mitigating routing misbehavior in mobile ad hoc network”, Proceedings of the 6th annual international conference on Mobile computing and networking, August 2000. [20] K. Ren, K. Zeng, W. Lou,“A new approach for random key pre-distribution in large-scale wireless sensor networks”, Wireless Communications and Mobile Computing, vol. 6, Issue 3, pp.307-318, May 2006. [21] M. F. Younis, K. Ghumman, M. Eltoweissy,“Location-aware combinatorial key management scheme for clustered sensor networks”, IEEE Transactions on Parallel and Distributed Systems, vol. 17, Issue 8, pp.865–882, August 2006. [22] W. Zhang, G. Cao, L. P. Tom,“Data dissemination with ring-based index for wireless sensor networks”, IEEE Transactions on Mobile Computing, vol. 6, Issue 7, pp.832–847, July 2007. [23] Y. Zhang, W. Liu, W. Lou, Y. Fang,“Location-based compromise-tolerant security mechanisms for wireless sensor networks”, IEEE Journal on Selected Areas in Communications, vol. 24, issue 2, pp.247–260, February 2006. [24] S. Zhu, S. Setia, S. Jajodia,“Sensor networks: LEAP: efficient security mechanisms for large-scale distributed sensor networks”, Proceeding of the 10th ACM conference on Computer and communications security, October 2003. [25] Z. Zhou, X. Xiang, X. Wang,“An energy-efficient data-dissemination protocol in wireless sensor networks”, International Symposium on a World of Wireless, Mobile and Multimedia Networks, p.10, June 2006. |
論文全文使用權限 |
如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信