跳到主要內容

臺灣博碩士論文加值系統

(44.220.247.152) 您好!臺灣時間:2024/09/15 11:33
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:陳厚坤
論文名稱:適用於無線微型感測網路之具容錯性與攻擊抵抗性之多重路徑資訊傳送機制
論文名稱(外文):A Fault-Tolerant, Attack-Resistant Multipath Information Delivery Scheme for Wireless Sensor Networks
指導教授:謝續平謝續平引用關係
指導教授(外文):Shiuh-Pyng Shieh
學位類別:碩士
校院名稱:國立交通大學
系所名稱:資訊科學與工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:英文
論文頁數:57
中文關鍵詞:無線微型感測網路資訊傳播機制傳輸可信賴程度資訊安全
外文關鍵詞:Wireless Sensor NetworkInformation Dispersal SchemeTransmission ReliabilityInformation Security
相關次數:
  • 被引用被引用:0
  • 點閱點閱:118
  • 評分評分:
  • 下載下載:8
  • 收藏至我的研究室書目清單書目收藏:0
對於大多數無線微型感測網路的應用而言,資訊傳輸的可信賴程度與其安全性為兩項主要的考量因素。由於感測節點通常佈建於無人照料或敵人充斥的環境中,並且感測到的資訊必須經由節點間本質即不穩定的無線連結傳輸至後端基地台,如何正確、安全且即時地傳送感測到的資訊實為一大挑戰。為了解決此項議題,我們提出了一個基於封包切割概念的多重路徑資訊傳送機制,FAMIDS。在此機制之下,資料來源節點將原始封包利用增加冗位元的方式切割成數個小封包,並且利用多重路徑安全地傳送該封包。即使部分的小封包接收錯誤,後端基地台仍能重建原始封包。
除此之外,我們建立了分析FAMIDS所能達到的傳輸可信賴程度之分析模型。針對不同的網路條件,我們研究該分析模型之表現情形,並且提出能找出最佳封包切割方式的有效率演算法,以達到最佳的傳輸可信賴程度。相較於傳統之暴力法,我們提出之演算法能有效降低每次封包傳輸之計算複雜度。
Transmission reliability and information confidentiality are two of the major concerns for most applications of wireless sensor networks. Since sensor nodes are usually deployed in unattended or adversarial environments and sensed information is transmitted through inherent instable wireless links among sensor nodes to the base station, how to deliver sensed information correctly, securely and instantaneously becomes a challenging problem. To deal with this issue, we propose an enhanced multipath information delivery scheme FAMIDS based on the concept of packet splitting. With the proposed scheme, the source node splits the original data packet into several sub-packets by adding redundancy, and securely transmits the sub-packets through multiple paths. The base station can reconstruct the original data packet even if part of sub-packets is incorrectly received.

In addition, we develop an analytical model for evaluating communication reliability achieved by our scheme and study the behavior of the analytical form under different network conditions. For each network model, we propose an algorithm for finding the optimal way of packet splitting with highest communication reliability. Compared with the traditional brute-force approach, the proposed algorithms efficiently reduce the computational complexity for each packet transmission.
1. Introduction 1
2. Related work 4
3. Proposed scheme 8
3.1. Network and Security Assumptions 8
3.2. Path Establishment 10
3.3. Packet Transmission 13
4. Analysis 17
4.1. Reliability Analysis 17
4.1.1. Preliminary 17
4.1.2. The Communication Reliability R(m, n) 23
4.1.3. The Simple Model 25
4.1.4. The Ideal Model 28
4.1.5. The General Model 31
4.1.6. The Special Model 34
4.2. Security Analysis 44
4.2.1. Information Confidentiality 44
4.2.2. Message Integrity 44
4.2.3. Attack Resistance 45
5. Conclusion 47
Appendix 49
References 55
[1] J. N. Al-Karaki and A. E. Kamal, "Routing techniques in wireless sensor networks: a survey," Wireless Communications, IEEE [see also IEEE Personal Communications], vol. 11, pp. 6-28, 2004.
[2] E. Ayanoglu, C.-L. I, R. D. Gitlin, and J. E. Mazo, "Diversity coding for transparent self-healing and fault-tolerant communication networks," Communications, IEEE Transactions on, vol. 41, pp. 1677-1686, 1993.
[3] S. Dulman, T. Nieberg, J. Wu, and P. Havinga, "Trade-off between traffic overhead and reliability in multipath routing for wireless sensor networks," presented at Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE, 2003.
[4] C. T. Ee and R. Bajcsy, "Congestion control and fairness for many-to-one routing in sensor networks," in Proceedings of the 2nd international conference on Embedded networked sensor systems Baltimore, MD, USA ACM Press, 2004 pp. 148-161
[5] R. Jain, S. Kalyanaraman, S. Fahmy, R. Goyal, and S.-C. Kim, "Source behavior for ATM ABR traffic management: an explanation," Communications Magazine, IEEE, vol. 34, pp. 50-56, 1996.
[6] M. Y. Kemal Akkaya, "A survey on routing protocols for wireless sensor networks," Ad Hoc Networks, Elsevier, pp. 325-349, 2003.
[7] M. K. Marina and S. R. Das, "On-demand multipath distance vector routing in ad hoc networks," presented at Network Protocols, 2001. Ninth International Conference on, 2001.
[8] Z. J. H. Panagiotis Papadimitratos, "Secure message transmission in mobile ad hoc networks," Ad Hoc Networks, Elsevier, pp. 193-209, 2003.
[9] M. O. Rabin, "Efficient dispersal of information for security, load balancing, and fault tolerance," J. ACM vol. 36 pp. 335-348 1989
[10] S.-P. Shieh, Y.-C. Tsai, and Y.-L. Huang, "Optimal information-dispersal for fault-tolerant communication over a burst-error channel," Reliability, IEEE Transactions on, vol. 52, pp. 354-366, 2003.
[11] J. A. Stankovic, T. E. Abdelzaher, C. Lu, L. Sha, and J. C. Hou, "Real-time communication and coordination in embedded sensor networks," Proceedings of the IEEE, vol. 91, pp. 1002-1022, 2003.
[12] H.-M. Sun and S.-P. Shieh, "Optimal information-dispersal for increasing the reliability of a distributed service," Reliability, IEEE Transactions on, vol. 46, pp. 462-472, 1997.
[13] A. Tsirigos and Z. J. Haas, "Analysis of multipath routing, part 2: mitigation of the effects of frequently changing network topologies," Wireless Communications, IEEE Transactions on, vol. 3, pp. 500-511, 2004.
[14] A. Tsirigos and Z. J. Haas, "Analysis of multipath Routing-Part I: the effect on the packet delivery ratio," Wireless Communications, IEEE Transactions on, vol. 3, pp. 138-146, 2004.
[15] M. A. M. Vieira, C. N. Coelho, Jr., D. C. da Silva, Jr., and J. M. da Mata, "Survey on wireless sensor network devices," presented at Emerging Technologies and Factory Automation, 2003. Proceedings. ETFA '03. IEEE Conference, 2003.
[16] C.-Y. Wan, S. B. Eisenman, and A. T. Campbell, "CODA: congestion detection and avoidance in sensor networks," in Proceedings of the 1st international conference on Embedded networked sensor systems Los Angeles, California, USA ACM Press, 2003 pp. 266-279
[17] A. Woo and D. E. Culler, "A transmission control scheme for media access in sensor networks ," in Proceedings of the 7th annual international conference on Mobile computing and networking Rome, Italy ACM Press, 2001 pp. 221-235
[18] S. Zhu, S. Setia, and S. Jajodia, "LEAP: efficient security mechanisms for large-scale distributed sensor networks," in Proceedings of the 10th ACM conference on Computer and communications security Washington D.C., USA ACM Press, 2003 pp. 62-72
[19] L. Gargono, A. A. Rescigno, and U. Vaccaro, "Fault-tolerant hypercube broadcasting via information dispersal," Networks, vol. 23, pp. 271-282, 1993.
[20] Y. D. Lyuu, "Fast fault-tolerant parallel communication for de Bruijn and digit-exchange networks using information dispersal," Networks, vol. 23, pp. 365-378, 1993.
[21] D. Ganesan, R. Govindan, S. Shenker, D. Estrin, "Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks," Networks, vol. 23, pp. 271-282, 1993.
[22] D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, "Highly-resilient, energy-efficient multipath routing in wireless sensor networks," SIGMOBILE Mob. Comput. Commun. Rev. , vol. 5, pp. 11-25, 2001.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top