系統識別號 | U0002-2307201823330000 |
---|---|
DOI | 10.6846/TKU.2018.00708 |
論文名稱(中文) | 工業物聯網加密的串流密碼機制 |
論文名稱(英文) | A Light Weight Stream Cypher Mechanism for IIoT |
第三語言論文名稱 | |
校院名稱 | 淡江大學 |
系所名稱(中文) | 資訊工程學系碩士班 |
系所名稱(英文) | Department of Computer Science and Information Engineering |
外國學位學校名稱 | |
外國學位學院名稱 | |
外國學位研究所名稱 | |
學年度 | 106 |
學期 | 2 |
出版年 | 107 |
研究生(中文) | 林政州 |
研究生(英文) | Cheng-Chou Lin |
學號 | 606410081 |
學位類別 | 碩士 |
語言別 | 繁體中文 |
第二語言別 | 英文 |
口試日期 | 2018-07-02 |
論文頁數 | 25頁 |
口試委員 |
指導教授
-
張世豪(145322@mail.tku.edu.tw)
委員 - 夏至賢(chhsia625@gmail.com) 委員 - 林其誼(chiyilin@mail.tku.edu.tw) |
關鍵字(中) |
工業物聯網 資訊安全 串流密碼法 加密傳輸 設備認證 |
關鍵字(英) |
Industrial Internet of Things Information Security Stream Cypher |
第三語言關鍵字 | |
學科別分類 | |
中文摘要 |
資訊科技(IT)是工業中生產系統和自動化創新最重要的因素之一。在德國,“工業4.0”一詞總結了生產,物流,自動化等工業過程的各種活動和發展。許多研究和開發項目都在不同方面開展工作。從工業與資訊科技產業相關的企業的角度來看,資訊科技產業的資訊安全被認為是目前在智慧製造中很重要的一環。儘管許多當前的資訊科技產業的安全解決方案可以在工業4.0中應用,但工業4.0中要求的整套系統需要與物聯網結合,增加的是智動化的功能,並結合大數據的分析,提供最佳化的生產流程,並考慮其功能性,即時性,穩定性,節能性,與安全性等諸多因素。其中安全性在目前許多工業4.0的設備中仍未整合進去,但卻深深影響整體工廠生產的進度與穩定度,因此極需要在基礎安全機制以及安全架構上完成工業4.0的應用。本文在此提出輕量級的工業資料加密傳輸與設備認證的方法,採用的是WG-8 的加密演算法並改良其尾隨機性,來保護工廠的通訊傳輸。為符合實際工廠的機器設備,我們在實驗中採用Raspberry Pi3 B+ 做為實驗測試實機,並設計與執行我們所提出的通訊安全加密演算法,實驗結果證明WG-8 的加密演算法,這會讓Raspberry Pi3中央處理器(CPU)使用率提升 40% 運轉,但提供工業物聯網更安全的通訊方式與設備認證。 |
英文摘要 |
Information technology (IT) is one of the most important factors in production systems and automation innovation in industry. In Germany, the term "Industry 4.0" summarizes the various activities and developments of industrial processes such as production, logistics and automation. Many research and development projects work in different aspects. From the point of view of enterprises related to the industrial and information technology industries, information security in the information technology industry is considered to be an important part of smart manufacturing. Although many current IT security solutions can be applied in Industry 4.0, the entire system required in Industry 4.0 needs to be integrated with the Internet of Things, with the added functionality of intelligence and combined with the analysis of big data to provide the most Jiahua's production process considers many factors such as its functionality, immediacy, stability, energy saving, and security. Security is still not integrated in many of the current industry 4.0 equipment, but it has a profound impact on the overall plant production progress and stability, so it is extremely necessary to complete the application of Industry 4.0 on the basic security mechanism and security architecture. This paper proposes a lightweight method of industrial data encryption transmission and device authentication, using the WG-8 encryption algorithm and improving its tailing randomness to protect the plant's communication transmission. In order to comply with the actual plant equipment, we used the Raspberry Pi3 B+ as an experimental test machine in the experiment, and designed and implemented our proposed communication security encryption algorithm. The experimental results prove that the WG-8 encryption algorithm, which will allow Raspberry Pi3 central processing unit (CPU) usage increased by 40%, but it provides industrial Internet of Things more secure communication methods and device certification. |
第三語言摘要 | |
論文目次 |
目 錄 第一章、緒論 1 1.1研究背景與動機 1 1.2研究目的 3 1.3 論文組織與架構 3 第二章、文獻探討 5 2.1智慧工廠的資訊安全問題 5 2.2加密演算法 6 2.3串流加密法 8 第三章、研究方法 9 3.1串流加密法 9 3.2加密驗證系統 11 第四章、實驗結果 12 4.1加密驗證系統CPU使用率 13 4.2實驗數據 16 第五章、結論及未來展望 18 第六章、參考文獻 19 附錄 – 英文論文 22 圖目錄 圖1-1工業革命演化圖 2 圖2-1智慧工廠架構圖 5 圖3-1初始化線性轉換器 10 圖3-2執行時線性轉化器 10 圖4-1 RASPBERRY PI3 12 圖4-2加密驗證系統CPU使用率折線圖 13 圖4-3無使用加密驗證系統CPU使用率折線圖 13 圖4-4整合折線圖 14 圖4-5金鑰循環圖 15 圖4-6密文圖 16 圖4-7效能比較折線圖 17 表目錄 表2-1串流加密法比較表 8 |
參考文獻 |
[1]Industrial Revolution http://www.twgreatdaily.com/cat77/node1562986,last accessed Oct. 11, 2017. [2]Ahmad-Reza Sadeghi, Christian Wachsmann, Michael Waidner, ”Security and Privacy Challenges in Industrial Internet of Things”, In Proceedings of the 52nd Annual Design Automation Conference Article No. 54, pp. 1-6, 2015 [3]Guang Gong, and Amr M. Youssef, ”Cryptographic Properties of the Welch–Gong Transformation Sequence Generators”,IEEE Transactions on Information Theory,vol. 48(11), Nov, 2002 [4]Gang Xiong, Tongkai Ji, Xipeng Zhang, Fenghua Zhu, Wenjing Liu, ”Cloud Operating System for Industrial Application”, In proceeding of the IEEE International Conference on Service Operations And Logistics, And Informatics (SOLI) [5]Real-Time Operating System https://www.digitimes.com.tw/iot/article.asp?cat=130&cat1=45&cat2=25&id=0000424643_ee45qu335sxgr42fqo53o,last accessed Jun.13, 2018. [6]Lennart Diedrich, Patrick Jattke, Lulzim Murati, Matthias Senker and Alexander Wiesmaier, “Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium” [7]Moni Naor,” Bit Commitment Using Pseudo-Randomness”, In proceeding of the IEEE CRYPTO pp. 128-136, 1989 [8]Matthias Hamann, Matthias Krause and Willi Meier, “LIZARD – A Lightweight Stream Cipher for Power-constrained Devices” , ACR Transactions on Symmetric Cryptology ISSN 2519-173X, Vol. 2017, No. 1, pp. 45–7 [9]Muhammad Usman, Irfan Ahmed, M. Imran Aslam, Shujaat Khan and Usman Ali Shah,” SIT: A Lightweight Encryption Algorithm for Secure Internet of Things”, In proceeding of the International Journal of Advanced Computer Science and Applications, Vol. 8, No. 1, 2017 [10]Manuel Cheminod, Luca Durante, and Adriano Valenzano, “Review of Security Issues in Industrial Networks” , IEEE Transactions on Industrial Informatics, Vol. 9, Issue: 1, Feb. 2013 [11]Md Zakirul Alam Bhuiyan, Guojun Wang, and Kim-Kwang Raymond Choo, “Secured Data Collection for a Cloud-Enabled Structural Health Monitoring System”In Proceeding of the IEEE 18th International Conference on High Performance Computing and Communications [12]Naruemon Wattanapongsakorn, Phurivit Sangkatsanee, Sanan Srakaew, Chalermpol Charnsripinyo,” Classifying Network Attack Types with Machine Learning Approach”, 7th International Conference on Networked Computing [13]Sridipta Misra, Salman Hashmi and Muthucumaru Maheswaran “Security Challenges and Approaches in Internet of Things” [14]Saumya Raj, Dr.Rajesh R,” Descriptive Analysis of Hash Table Based Intrusion Detection Systems”, 2016 International Conference on Data Mining and Advanced Computing (SAPIENCE) [15]Peng Xu,Shuanghong He,Wei Wang,Willy Susilo,Senior and Hai Jin, Senior,” Lightweight Searchable Public-key Encryption for Cloud-assisted Wireless Sensor Networks”, IEEE Transactions on Industrial Informatics [16]Rhea Bonnerji, Simanta Sarkar, Krishnendu Rarhi, Abhishek Bhattacharya,” COZMO - A New Lightweight Stream Cipher” [17]Kerry A. McKay,Larry Bassham,Meltem Sönmez Turan,Nicky Mouha,” Report on Lightweight Cryptography” [18]Uwe Blocher and Markus Dichtl,” Fish: A Fast Software Stream Cipher”, FSE 1993: Fast Software Encryption pp 41-44 [19]Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, and Le Dong,” LHash: A Lightweight Hash Function”, Inscrypt 2013: Information Security and Cryptology pp 291-308 [20]Yin Chuan-long, Zhu Yue-fei, Fei Jin-long, He Xin-zheng,” A Deep Learning Approach for Intrusion Detection using Recurrent Neural Networks”, IEEE Access ( Volume: 5 ) [21]Zhijun Li, Guang Gong,” On the Node Clone Detection in Wireless Sensor Networks”, IEEE/ACM Transactions on Networking (TON) archive Volume 21 Issue 6, December 2013 Pages 1799-1811 [22]Xinxin Fan, Kalikinkar Mandal and Guang Gong ,” WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices”, QShine 2013: Quality, Reliability, Security and Robustness in Heterogeneous Networks pp 617-632 archive Volume 21 Issue 6, December 2013 Pages 1799-1811 |
論文全文使用權限 |
如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信