資料載入處理中...
跳到主要內容
臺灣博碩士論文加值系統
:::
網站導覽
|
首頁
|
關於本站
|
聯絡我們
|
國圖首頁
|
常見問題
|
操作說明
English
|
FB 專頁
|
Mobile
免費會員
登入
|
註冊
切換版面粉紅色
切換版面綠色
切換版面橘色
切換版面淡藍色
切換版面黃色
切換版面藍色
功能切換導覽列
(216.73.216.176) 您好!臺灣時間:2025/09/06 14:03
字體大小:
字級大小SCRIPT,如您的瀏覽器不支援,IE6請利用鍵盤按住ALT鍵 + V → X → (G)最大(L)較大(M)中(S)較小(A)小,來選擇適合您的文字大小,如為IE7或Firefoxy瀏覽器則可利用鍵盤 Ctrl + (+)放大 (-)縮小來改變字型大小。
字體大小變更功能,需開啟瀏覽器的JAVASCRIPT功能
:::
詳目顯示
recordfocus
第 1 筆 / 共 1 筆
/1
頁
論文基本資料
摘要
外文摘要
目次
參考文獻
電子全文
紙本論文
論文連結
QR Code
本論文永久網址
:
複製永久網址
Twitter
研究生:
魏丹尼
研究生(外文):
Daniel Adrianto Widyopratomo
論文名稱:
ETSI M2M 標準建議的安全協議和相關通訊密碼套件之分析
論文名稱(外文):
Analysis of Security Protocols and Corresponding Cipher Suites Recommended in ETSI M2M Standards
指導教授:
林甫俊
指導教授(外文):
Lin,Fuchun Joseph
口試委員:
林寶樹
、
謝續平
、
林甫俊
口試委員(外文):
Bao-Shuh Paul Lin
、
Shiuhpyng Shieh
、
Fuchun Joseph Lin
口試日期:
July 28, 2015
學位類別:
碩士
校院名稱:
國立交通大學
系所名稱:
電機資訊國際學程
學門:
工程學門
學類:
電資工程學類
論文種類:
學術論文
論文出版年:
2015
畢業學年度:
103
語文別:
英文
論文頁數:
43
中文關鍵詞:
物聯網
、
安全協議
外文關鍵詞:
Machine-to-Machine Communication
、
Internet of Things
、
security protocol
相關次數:
被引用:0
點閱:382
評分:
下載:27
書目收藏:0
對於物聯網來說資訊安全是重要的基本層面之一,且需要精心設計及實施。幸運的是,ETSI — 作為一個制定電信的標準組織,已經定義了一套全面的共同安全機制來保護物聯網系統,包括我們所可以利用的相應安全協議。對於TLS協議,ETSI也提出了一系列的加密套件演算法。基於物聯網服務提供商及網路提供商的之間的關係,這些選項可被分為兩種類型 —存取網路相依型和存取網路獨立型。根據這種分類,ETSI允許物聯網服務提供商去選擇最適合他們的物聯網應用的其中一種。然而在標準裡頭,並無說明在什麼條件之下,特定的協議比起其他的協議將會是最好的一個。雖然物聯網服務提供商可以簡單地從中做選擇,但理想的是,能有一些分析的方法根據物聯網應用的特性和流量模式,以選擇最安全的協議以及最節省資源的協議的依據。
在此研究之中,我們將研究在什麼樣的情況下何種協議以及其加密套件演算法為最適合。而我們也只將專注於在物聯網服務提供商與網路提供商之間無須任何關係的網路獨立型協議上,因為這些協議為工業上使用的協議。同時也由於假設並無任何存取網路的支持,所以此種端點對端點的系統也能更被簡易地模擬。在TS 102 690之中,ETSI定義了三個層級的安全機制: 服務啟動安全、連接安全及mId安全。
• 物聯網服務啟動機制旨在相互驗證物連網服務提供商與物聯網裝置或閘道。此研究將會以EAP/PANA乘載的EAP-IBAKE、EAP/PANA乘載的EAP-TLS與TCP/TLS機制做為分析項目。在服務啟動程序完成後,物聯網安全根鑰 (Root Key) 將會隨之產生
• 物聯網連接機制使用安全根鑰來設置一個在物聯網網路節點與物聯網裝置/閘道之間的安全會話。EAP/PANA乘載的EAP-GPSK及TLS-PSK將會做為主要分析的項目。此機制將會產生物聯網連接鑰 (Connection Key),而此鑰也將會用於最後一個機制 —網路端與裝置端之間的安全。
• mId安全機制保護了mId界面的資料安全。雖然其有三種方式可用於保護界面的安全:存取網路安全、通道安全和物件安全,但在我們的研究之中將會集中在通道的安全上做分析。
為了要進行我們的分析,我們計劃開發這些安全機制在OpenMTC平台之上,因其為符合ETSI-M2M標準的物聯網平台。我們將會使用工廠內的人員管理系統做為測試的範例樣本,此系統的特性為在短時間裡頭產生出大量的小數據流量。根據分析結果,我們希望找到在此類型的網路流量模式範例下最合適的協議。我們使用效率, 成本, 和有效性等參數來確定最合適的協定。為了測量效率,我們將記錄處理的時間和記憶體的使用情況。為了測量成本,我們分析送出跟接收的訊息量,而其總封包大小也用來做比較的參數。對於一個特定的協定的有效性,我們將從一個密碼套件安全保障程度來做為區分,如非常強,強,平均,弱,或非常弱。
Security is one of the fundamental aspects one needs to carefully design and implement for IoT systems. Fortunately, ETSI, as a standard body in telecommunication industry, has defined a comprehensive set of common security mechanisms to protect the IoT system including the corresponding security protocols that we can utilize. For TLS protocols, ETSI also suggests a set of cipher suite algorithms. Those options are categorized into two types, access-dependent and access-independent, based on the relationship between the M2M Service Provider and the Access Network Provider. According to this categorization, ETSI allows the M2M Service Provider to select the one that is the most suitable for their M2M applications. The standards do not describe in what condition a particular protocol will be the best among the others. Although M2M Service Providers can easily choose one out of many options, it is most ideal if some analytic methods can be defined for selecting a protocol that is the most secure and the least resource demanding one according to the characteristics and the traffic patterns of IoT applications.
In this research we examine which conditions are most suitable for a security protocol and a cipher suite algorithm. We focus only on access-independent protocols which do not require any relationship between the M2M Service Provider and the Access Network Provider, because these protocols are most applicable in the industry. Also, the whole end-to-end system can be simulated easily by assuming no support from access networks. In TS 102 690, ETSI defines three levels of security mechanisms: Service Bootstrapping, Connection, and mId security.
• M2M Service Bootstrapping mechanism aims to mutually authenticate the M2M Service Provider and the M2M Device or Gateway. EAP-IBAKE over EAP/PANA, EAP-TLS over EAP/PANA and TLS over TCP will be analyzed with regard to this study. The result of M2M Service Bootstrapping is an M2M Root Key (Kmr).
• M2M Connection mechanism uses the M2M Root Key to set up a secure data session between a Network M2M Node and an M2M Device / Gateway. EAP-GPSK over EAP/PANA and TLS-PSK are the objects to be analyzed. This mechanism generates M2M Connection Key (Kmc) which will be used for the last mechanism, mId security.
• The mId security protects the data transmission over the mId interface. Although there are three ways to secure the interface: access network layer security, channel security, and object security, we will focus on the channel security in our study.
To proceed with our analysis, we develop these security mechanisms on top of the OpenMTC platform, which is an ETSI-M2M-compliant system. We use people management system in a factory as the use case for our testing samples, in particular, testing the situation where a large amount of small data traffic is generated in a very short time. Based on the result, we analyze what is the most suitable protocol for the type of traffic pattern in this use case. Several parameters can be utilized to determine the most suitable protocol, such as efficiency, cost, and effectiveness. In order to measure efficiency, we record the processing time, CPU usage, and memory usage. To measure the cost, we use the number of sent and received messages, including their total sizes, as the parameters for comparison. For the effectiveness of a particular protocol, we use the degree of security guarantee from a protocol / cipher suite such as very strong, strong, average, weak, or very weak.
摘要 i
Abstract iii
Acknowledgement v
Table of Contents vi
List of Tables viii
List of Figures ix
List of Acronyms x
I. Introduction 1
1.1. Motivation and Problem Overview 1
1.2. Contribution 2
1.3. Thesis Organization 2
II. Background 4
2.1. Technologies 4
2.1.1. Transport Layer Security (TLS) 4
2.1.2. Extended Authentication Protocol (EAP) 4
2.2. ETSI M2M Standards 5
2.2.1. Architecture 5
2.2.2. Security Mechanisms 8
2.2.2.1. M2M Service Bootstrapping 8
2.2.2.2. M2M Service Connection 9
2.2.2.3. mId Security 11
2.2.2.4. Access Right Resources 12
2.3. Platform Implementation of ETSI M2M Standards 12
2.3.1. OpenMTC 12
2.3.2. OM2M 13
2.3.3. Cocoon 13
III. Other Related Standards 14
3.1. OneM2M Architecture 14
3.2. Security Architecture 15
3.2.1. Remote Security Provisioning Frameworks 15
3.2.2. Security Association Enablement Frameworks 16
IV. Design and Implementation 18
4.1. System Architecture 18
4.2. Metrics Measurement 20
4.2.1. Message Size Meter 20
4.2.2. Processing Time Counter 21
4.2.3. CPU Usage Probe 21
4.2.4. Memory Usage Probe 22
4.3. Implementation 22
4.3.1. System Topology 22
4.3.2. Common Software 23
4.3.3. Security Module in GSCL 25
V. Testing and Evaluation 27
5.1. Data Generator 27
5.2. Performance Evaluation 28
5.2.1. Service Bootstrapping 28
5.2.2. Service Connection 32
5.2.3. mId Security 34
VI. Conclusion and Future Work 37
References 39
Curriculum Vitae 42
[1] Xiao Nie and Xiaobing Zhai, "M2M security threat and security mechanism research," in 3rd International Conference on Computer Science and Network Technology (ICCSNT), Dalian, 2013, pp. 906-909.
[2] P Flood and M Schukat, "Peer to peer authentication for small embedded systems: A zero-knowledge-based approach to security for the Internet of Things," in 10th International Conference on Digital Technologies (DT), 2014, pp. 68-72.
[3] Jie-Ren Shih et al., "Securing M2M With Post-Quantum Public-Key Cryptography," IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 3, pp. 106-116, March 2013.
[4] European Telecommunications Standard Institute. (2013, October) Machine-to-Machine communications (M2M); Functional architecture. Document. [Online]. http://www.etsi.org/
[5] European Telecommunications Standard Institute. (2013, December) Machine-to-Machine communications (M2M); mIa, dIa and mId interfaces. Document. [Online]. http://www.etsi.org/
[6] Internet Engineering Task Force (IETF). (2008, August) The Transport Layer Security (TLS) Protocol. Document. [Online]. http://tools.ietf.org/html/rfc5246
[7] William Stallings, Network Security Essentials: Applications and Standards, 4th ed. USA: Pearson Education, Inc, 2011.
[8] Internet Engineering Task Force (IETF). (2004, June) Extensible Authentication Protocol (EAP). Document. [Online]. http://tools.ietf.org/html/rfc3748
[9] Internet Engineering Task Force (IETF). (2008, March) The EAP-TLS Authentication Protocol. Document. [Online]. http://tools.ietf.org/html/rfc5216
[10] Internet Engineering Task Force (IETF). (2008, May) Protocol for Carrying Authentication for Network Access (PANA). Document. [Online]. http://tools.ietf.org/html/rfc5191
[11] Internet Engineering Task Force (IETF). (2000, June) Remote Authentication Dial In User Service (RADIUS). Document. [Online]. http://tools.ietf.org/html/rfc2865
[12] Internet Engineering Task Force (IETF). (2006, January) Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM). Document. [Online]. http://tools.ietf.org/html/rfc4186
[13] Internet Engineering Task Force (IETF). (2006, January) Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA). Document. [Online]. http://tools.ietf.org/html/rfc4187
[14] Internet Engineering Task Force (IETF). (2012, August) An EAP Authentication Method Based on Identity-Based Authenticated Key Exchange. Document. [Online]. https://tools.ietf.org/html/draft-cakulev-emu-eap-ibake-00
[15] Internet Engineering Task Force (IETF). (2009, February) Extensible Authentication Protocol Generalized Pre-Shared Key (EAP-GPSK) Method. Document. [Online]. http://tools.ietf.org/html/rfc5433
[16] Fraunhofer FOKUS. (2014) OpenMTC. [Online]. http://www.open-mtc.org/
[17] The Eclipse Foundation. (2015) OM2M - Open Source platform for M2M communication. [Online]. http://eclipse.org/om2m/
[18] Actility. (2011) Cocoon. [Online]. http://cocoon.actility.com/
[19] OneM2M. (2015) Functional Architecture. Document. [Online]. http://www.onem2m.org/
[20] OneM2M. (2015, February) Security Solutions. Document. [Online]. http://www.etsi.org/
[21] Rafa Marín López, Francisco Vidal Meca, and Pedro Moreno Sánchez. (2013, January) OpenPANA. [Online]. https://github.com/OpenPANA/openpana
[22] Arran Cudbard-Bell, Alan DeKok, Phil Mayers, and Matthew Newton. FreeRADIUS. [Online]. http://freeradius.org
[23] Jouni Malinen. hostapd: IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator. [Online]. http://w1.fi/hostapd/
[24] Ben Lynn. (2013, June) PBC Library. [Online]. https://crypto.stanford.edu/pbc/
[25] Free Software Foundation. (2014) The GNU Multi Precision Arithmetic Library. [Online]. https://gmplib.org/
[26] ARM Limited. SSL Library mbedTLS/PolarSSL. [Online]. https://tls.mbed.org/
[27] IBM Corporation. (2011) InfoSphere Streams. [Online]. http://www.ibm.com
[28] John C. Mitchell, Arnab Roy, Paul Rowe, and Andre Scedrov, "Analysis of EAP-GPSK Authentication Protocol," in Applied Cryptography and Network Security, StevenM Bellovin et al., Eds.: Springer Berlin Heidelberg, March 2008, pp. 309-327.
[29] (2015, May) Guide to Deploying Diffie-Hellman for TLS. Article. [Online]. https://weakdh.org/sysadmin.html
電子全文
國圖紙本論文
連結至畢業學校之論文網頁
點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
推文
當script無法執行時可按︰
推文
網路書籤
當script無法執行時可按︰
網路書籤
推薦
當script無法執行時可按︰
推薦
評分
當script無法執行時可按︰
評分
引用網址
當script無法執行時可按︰
引用網址
轉寄
當script無法執行時可按︰
轉寄
top
相關論文
相關期刊
熱門點閱論文
無相關論文
無相關期刊
1.
物聯網平台的效能管理
2.
改善ETSI M2M架構下高速與大量資料的處理
3.
在 IoT/M2M 標準架構上溶入OMA輕量級設備管理通信協定
4.
物聯網應用之收費因子與架構研究
5.
智慧型手機作為穿戴式裝置聯網閘道系統之設計與最佳化
6.
將MQTT協定資源整合至符合ETSI M2M標準之物聯網平台
7.
物聯網收費架構研究
8.
用於穿戴式裝置之低功耗藍芽傳輸方法的比較與評估
9.
透過物聯網通訊改進停車位的佔用率與停車用戶的滿意度
10.
防止物聯網系統憑證的不當複製
11.
將OMA輕量級物聯網閘道整合至M2M標準架構的挑戰
12.
M2M技術下的公眾分享設備之資源分配
13.
確保在受限閘道下的物聯網系統安全
14.
智慧家庭環境中的情境感知
15.
智能家居環境中的手勢控制
簡易查詢
|
進階查詢
|
熱門排行
|
我的研究室