帳號:guest(18.118.30.168)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者:古庭菘
作者(英文):Ting-Song Gu
論文名稱:無線感測網路組內和組間的密鑰分配機制
論文名稱(英文):Intragroup and Intergroup Key Distribution mechanism for Wireless Sensor Networks
指導教授:楊慶隆
指導教授(英文):Ching-Nung Yang
口試委員:郭文中
張道顧
口試委員(英文):Wen-Chung Kuo
Tao-Ku Chang
學位類別:碩士
校院名稱:國立東華大學
系所名稱:資訊工程學系
學號:611021230
出版年(民國):112
畢業學年度:111
語文別:英文
論文頁數:76
關鍵詞:無線感測網路多匯集點WSN密鑰預分配雜湊鏈節點攔截攻擊位置節點攔截攻擊加強型節點攔截攻擊
關鍵詞(英文):Wireless sensor networkMultiple sinks WSNKey pre-distributionHash chainNode capture attack (NA)Location NAAdvanced NA
相關次數:
  • 推薦推薦:0
  • 點閱點閱:10
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:8
  • 收藏收藏:0
無線感測網絡 (Wireless Sensor Network; WNS) 主要功能是通過部署的感測器節點我們可以收集和傳輸各種資料,並送回後端資料庫。例如,可應用於智能(城市、計量、農業、環境、畜牧業)、零售、監控、電子醫療、軍事應用等。
在WSN中,確保資料傳輸的安全性是至關重要的。我們通常使用安全加密技術來實現,因此需要分享密鑰。密鑰預分配 (Key Pre-distribution; KP) 是一種最常使用於WSN的密鑰分配技術,用於建立感測器節點之間安全通訊的密鑰以確保收集的資料在傳輸過程中的機密性。藉由使用KP技術WSN能夠更有效地保護資料安全。大多數關於KP相關方案的研究都集中在增強抵禦節點攻擊的韌性,同時保持節點鏈路的連通性。在這些方案中,將密鑰事先分配給感測器節點,使它們能夠進行安全通訊。然而,傳統的KP方案在大規模WSN中可能會面臨諸多挑戰,例如密鑰管理的複雜性、能源效率和安全性之間的平衡等。本論文主要就是研究這個主題。為了應對大規模WSN的需求,一種常見的方法是採用多個匯集器無線感測網路 (Multiple Sinks WSN; MWSN) 的架構。MWSN通常由多個群組所組成,每個群組都有一個匯集器節點。這種架構可以提供更多的感測器節點,同時具有較好的連接性和節點容錯性。基於新的MWSN環境,在此基礎上提出了組內和組間密鑰預分配(intragroup and intergroup KP: I2KP)機制,使得通過大規模WSN的不同匯集器節點收集資料時實現安全性和能源效率的平衡。我們提出了四種不同類型的I2KP方案: I2KP using different key pool (I2KPDP)、I2KP using same key pool (I2KPSP)、I2KP using hash chain (I2KPHC)、I2KP using bidirectional hash chain (I2KPBH)。
為了評估I2KP的有效性,我們進行了理論分析和數值模擬。結果表明,所提出的I2KP方法可以有效地提高大規模WSN的安全性和能源效率。這四種I2KP都滿足組內和組間的密鑰分配條件、各有其利弊。根據攻擊者已知的信息量,本論文也討論了三種攻擊形式:節點攔截攻擊(Node Capture Attack; NA)、位置節點攔截攻擊 (Location NA; LNA)、和加強型節點攔截攻擊 (Advanced NA ; ANA)。根據對NA、LNA、ANA的抵抗性、建立鏈路所需的雜湊運算、及感測器節點的儲存密鑰數,我們可以選取適用的I2KP。
The major task of wireless sensor network (WSN) is data collection. Via the deployed sensor nodes we may collect data and send back to backend database for applications. For example, it can be applied on smart (cities, metering, agriculture, environment, animal farming), retail, surveillance, e-Health, military applications.
In WSN, it is very important to ensure the security of data transmission. We usually achieve confidentiality by using encryption, on which a key distribution is required. KP (Key pre-distribution; KP) is often adopted in WSN for key distribution to establish secure links between neighbor sensor nodes. Most researches on KP-like schemes are dedicated on enhancing resiliency against node capture attack, and meantime retain the link connectivity. However, traditional KP schemes are not suitable for large-scale WSNs, such as the complexity of key management, the balance between energy efficiency and security. This thesis deals with the topic about using KP in large-scale WSNs. Toward a large scale WSN, a popular way is to adopt the multiple sinks WSN (MWSN) approach to provide a large number of sensor nodes. In MWSN, there are different clusters (referred to as groups). Based on the new MWSN environment, we present intragroup and intergroup KP (I2KP) to fulfil both requirements of security and energy efficiency when gathering data via various sink nodes in large scale WSN. In this thesis, we propose four types of I2KP: : I2KP using same key pool (I2KPSP)、I2KP using different key pool (I2KPSP)、I2KP using hash chain (I2KPHC)、I2KP using bidirectional hash chain (I2KPBH).
To evaluate the effectiveness of I2KP, we perform theoretical analyses and numerical simulations. Experimental results demonstrate that the proposed I2KP scheme can effectively achieve security and meantime improve energy efficiency of large-scale WSNs. All these four schemes satisfying intragroup and intergroup conditions can be applied to MWSN environment, and have their pros and cons. There are three attacks based on the amount of information known to the attacker: node capture attack (NA), location NA (LNA), and advanced NA (ANA). According to the resiliencies against NA, LAN and ANA, the required hash operations of establishing a secure link, and the key ring sizes of sensor nodes, we may choose one of these four types I2KP for MWSN.
Chapter 1 Introduction 1
1.1 Background 1
1.2 The Organization of The Thesis 2
Chapter 2 Previous Works 5
2.1 Hash Chain 5
2.2 KPHC 6
Chapter 3 Motivation 7
Chapter 4 The Proposed I2KP 11
4.1 The Proposed I2KPDP 11
4.2 The Proposed I2KPSP 22
4.3 The Proposed I2KPHC 29
4.4 The Proposed I2KPBH 47
Chapter 5 Comparison and Numerical Simulations 55
5.1 Comparison 55
5.2 Numerical Simulation 58
5.2.1 Resiliency 58
5.2.2 Computation Overhead 66
Chapter 6 Conclusion and Future Work 69
References 70
[BECH13]W. Bechkit, Y. Challal, and A. Bouabdallah, “A new class of hash-chain based key pre-distribution scheme for WSN,” Computer Communications, vol. 36, pp. 243-255, Jan., 2013.
[CHAN03]H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” IEEE Symp. Security Privacy, May 2003, pp. 197-213.
[CHEN17]Y.R. Chen and W.G. Tzeng, “Group key management with efficient rekey mechanism: a semi-stateful approach for out-of-synchronized members,” Computer Communications, vol. 98, pp. 31-42, Jan., 2017.
[CHAN20]S.T. Chandel and S. Sharma, “Deployment of multiple sink in different monitoring areas based on the optimization technique,” International Journal of Sensors, Wireless Communications and Control, vol. 10, pp. 915-928, 2020.
[DAS13]D. Das, Z. Rehena, S. Roy and N. Mukherjee, “Multiple-sink placement strategies in wireless sensor networks,” 2013 5th International Conference on Communication Systems and Networks, pp. 1-7, 2013.
[DENG18]R. Deng, S. He, and J. Chen, “An online algorithm for data collection by multiple sinks in wireless-sensor networks,” IEEE Transactions on Control of Network Systems, vol. 5, pp. 93-104, 2018.
[DICK19]M. Dick, Mo.d Alwabel, Y. Kwon, “Multiple sink nodes to improve performance in WSN,” Journal of Korea Multimedia Society, vol. 22, pp. 676-683, 2019.
[DOOS20]S. Doostali, S.M. Babamir, “An energy efficient cluster head selection approach for performance improvement in network-coding-based wireless sensor networks with multiple sinks,” Computer Communications, vol. 164, pp. 188-200, 2020.
[ESCH02]L. Eschenauer and V.D. Gligor, “A key-management scheme for distributed sensor networks,” The 9th ACM conference on Computer and communications security, pp. 41-47, 2002.
[EHDA16]Ehdaiea et al., “2D hash chain robust random key distribution scheme,” Information Processing Letters, vol. 16, pp. 367-372, 2016.
[GAND17]F. Gandino, R. Ferrero, and M. Rebaudengo, “A key distribution scheme for mobile wireless sensor networks: q-s-Composite,” IEEE Transactions on Information Forensics and Security, vol. 12, pp. 34-47, 2017.
[HARN15]L. Harn and C.F. Hsu, “Predistribution scheme for establishing group keys in wireless sensor networks,” IEEE Sensors Journal, vol.15, pp. 5103-5108, 2015.
[HERN19]N.J. Hernandez Marcano, J.H. Lauritsen, K.K. Jacobsen and R.H. Jacobsen, “Enabling secure multicast group communications in IP wireless networks for the Internet of Things,” The 25th European Wireless Conference, pp. 1-7, 2019.
[JINO17]S.R. Jino Ramson and D.J. Moni, “Applications of wireless sensor networks - A survey,” 2017 International Conference on Innovations in Electrical, Electronics, Instrumentation and Media Technology (ICEEIMT), pp. 325-329, 2017.
[KHAN12]E. Khan, E. Gabidulin, B. Honary, and H. Ahmed, “Matrix-based memory efficient symmetric key generation and pre-distribution scheme for wireless sensor networks,” IET Wireless Sensor Syst., vol. 2, pp. 108-114, 2012.
[MEHM17]A. Mehmood, M. M. Umar, and H. Song, “ICMDS: Secure inter-cluster multiple-key distribution scheme for wireless sensor networks,” Ad Hoc Networks, vol. 55, pp. 97-106, Feb., 2017.
[REHE15]Z. Rehena, D. Das, S. Roy, and N. Mukherjee,“Multiple Sink Placement in Partitioned Wireless Sensor Networks,” International Journal of Next-generation Computing, Vol. 6, Issue 2, pp. 79-95, 2015.
[YAGA16]O. Yagan and A. M. Makowski, “Wireless sensor networks under the random pairwise key predistribution scheme: can resiliency be achieved with small key rings?,” IEEE/ACM Transactions on Networking, vol. 24, pp. 3383-3396, 2016.
[YANG17]C.N. Yang, J.M. Li, and Y.S. Chou, “On the analysis of k-Secure t-conference key distribution scheme,” ICCNS 2017 Proceedings of the 2017 the 7th International Conference on Communication and Network Security, pp. 91-95, ACM Proc. ISBN 978-1-4503-5349-6, Tokyo, Japan, Nov., 2017.
[YANG21]C.N. Yang, C.L. Kao, and C.J. Wang, “Two-dimensional diagonal layer hash chain based key pre-distribution scheme,” Journal of Information Security and Applications, Article 103038, 2021.
[ZHAO17]J. Zhao, “Topological properties of secure wireless sensor networks under the q-composite key predistribution scheme with unreliable links,” IEEE/ACM Transactions on Networking, vol. 25, pp. 1789-1802, 2017.
[ZEMR19]H. Zemrane, Y. Baddi, and A. Hasbi, “Ehealth smart application of WSN on WWAN,” The 2nd International Conference on Networking, Information Systems & Security, 2019.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *