(3.236.228.250) 您好!臺灣時間:2021/04/22 05:26
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:陳祈彰
研究生(外文):Chi-chang Chen
論文名稱:無線感測器網路連結性之改善方法
論文名稱(外文):Connectivity improvement scheme in wireless sensor network
指導教授:謝文雄謝文雄引用關係
指導教授(外文):Wen-Shyong Hsieh
學位類別:碩士
校院名稱:國立中山大學
系所名稱:資訊工程學系研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:英文
論文頁數:43
中文關鍵詞:連結性鬆散環境無線感測器網路安全
外文關鍵詞:wireless sensor networkloose environmentconnectivitysecurity
相關次數:
  • 被引用被引用:0
  • 點閱點閱:96
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
安全在現在無線感測器網路(WSN, wireless senor networks)環境底下一直是眾所討論的議題之一,由於WSN本身獨特資源限制,讓WSN安全上必須額外考量計算能力、儲存空間容量、無線通訊特性、有限電池電源…等,隨機金鑰預配(RKP, random key pre-distribution)即是為了實現在WSN上安全通訊而發展的金鑰分配中的一環,RKP的特徵在於兩個獨立的節點必須至少有一個共同的預設金鑰才能構成對稱金鑰(pair-wise key)進而進行安全通訊,然而節點分佈若處於鬆散的環境上,由於平均節點度數下降,鄰居數較低,整體網路的連結性會隨著RKP不容易建立對稱金鑰的關係而下降,本論文將以提升鬆散環境下整體網路連結性為出發點,延伸原本只考量單跳鄰居資訊的RKP-DE,從雙跳鄰居資訊的觀點,將RKP-DE流程反向、提出RKP-DEinverse,再合併RKP-DE和RKP-DEinverse,成為新的方法RKP-DEtwo_hop,試著證明並實驗我們可以有效提升整體網路的連結性。
Under the current environment of Wireless Senor Networks (WSN), security is always one of the topics that everyone discussed about. Because of the limitations of WSN’s unique resource, this results in the security of WSN needs to especially consider the calculating ability, memory capacity, characteristics of wireless communication, limited battery power supply, etc. Random key pre-distribution (RKP) is the one of the key distribution that is developed for the sake of safe communication of WSN, the characteristic of RKP is that there must have at least one common pre-distributed key in the two independent nodes in order to compose a pair-wise key, so that the safe communication can be carried out. However, if the nodes are distributed in the loose environment, the numbers of neighbors would be lower due to the decrease of average node degree. Then the connectivity of the entire network would decrease because it is not easy for the RKP to establish the pair-wise key. This paper would set the improvement of the entire network’s connectivity under the loose environment as the starting point to extend the RKP-DE that only considers one-hop neighbor information, and reverse the flow path of RKP-DE and propose RKP- DEinverse from the viewpoint of two-hop neighbor information. Then RKP-DE and RKP- DEinverse are merged and become a new method – RKP- DEtwo_hop, so as to try to prove that we can raise the connectivity of the whole network effectively.
Page i. 中文摘要
Page ii. Abstract
Page iii. Content
Page v. List of Figures
Page vi. List of Table
Page 1. Chapter 1 Introduction
Page 1. 1-1 Background
Page 2. 1-2 Key Agreement
Page 3. 1-3 Motivation
Page 7. Chapter 2 Relative Works
Page 7. 2-1 Random key pre-distribution and
Q-composite
Page 7. 2-2 Random key distribution –decoupling
Page 8. 2-2-1 Network decoupling
Page 9. 2-2-2 Design of RKP-DE
Page 10. 2-2-3 Dependency Elimination
Page 11. Chapter 3 Design of our scheme
Page 11. 3-1 RKP-DEinverse
Page 13. 3-2 The Relationship between RKP-DE and
RKP-DEinverse
Page 14. 3-3 RKP-DEtwo_hop
Page 15. 3-4 Performance Analysis
Page 16. 3-4-1 Probability formula
Page 17. 3-4-2 Derivation of the formula
Page 21.Chapter 4 Simulation and Result Analysis
Page 21. 4-1 Definition
Page 22. 4-2 Sensitivity of connectivity to node number
Page 26. 4-3 Sensitivity of connectivity to key chain size
Page 30.Chapter 5 Conclusion and Future work
Page 31.Reference
[1]Chris Karlof and David Wagner, “Secure Routing in Wireless Sensor Networks: Attack and Countermeasures”. Proceedings of First IEEE International Workshop on Sensor Network Protocols and Applications.2003: pp.113-127.
[2]Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz and Aram Khalili, “A pairwise key predistribution scheme for wireless sensor networks,” ACM Transactions on Information and System Security (TISSEC), vol 8, issue 2, pp. 228-258. May 2005.
[3]B. C. Neuman and T. Tso, “Kerberos: An authentication service for computer networks,” IEEE Communication, vol. 32, no. 9, pp. 33-38, September 1994.
[4]W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, pp. 664-654, November 1976.
[5]R. L. Rivest, A. Shamir, and L. M. Adleman, “A method for obtaining digital signatures and public-key crytosystems,” Communication for ACM, vol. 21, no. 2, pp. 120-126, 1978.
[6]Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan, “ Network Decoupling for Secure Communication in Wireless Sensor Networks,” Quality of Service, 2006. IWQoS 2006. 14th IEEE International Workshop on June 2006, pp.189 – 198.
[7]Laurent Eschenauer and Virgil D. Gligor ” A key-management scheme for distributed sensor networks, ” Proceedings of the 9th ACM conference on Computer and communications security, Nov. 2002, pp.41 - 47.
[8]H. Chan, A. Perrig, and D. song,”Random key predistribution schemes for sensor network,” in Proceedings of IEEE Symposium on Research in Security and Privacy, Symp, May 2003, pp. 197 – 213.
[9]A. Wacker, M. Knoll, T. Heiber, and K. Rothermel, ”A new approach for establishing pair-wise keys for securing wireless sensor networks,” in Proceedings of the 3rd ACM Conference on Embedded Networked Sensor System(Sensys), Nov. 2005.
[10]S. Zhu, S. Xu, S. Setia, and S. Jajodia, “Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach, ” in Proceedings of the 11th IEEE International Conference on Network Protocols(ICNP), Nov 2003.
[11]E. Ertin, A. Arora, R. Ramnath, and M. Nesterenko, “Kansei: A testbed for sensing at scale,” in Proceedings of the 4th Symposium on Information Processing in Sensor Networks (IPSN/SPOTS track), April 2006.
[12]D. Liu, P. Ning, and W. Du, “Group-based key pre-distribution in wireless sensor networks,” in Proceedings of ACM Workshop on Wireless Security (WiSe), September 2005.
[13]A. Wacker, M. Knoll, T. Heiber, and K. Rothermel, “A new approach for establishing pairwise keys for securing wireless sensor networks,” in Proceedings of the 3rd ACM Conference on Embedded Networked Sensor Systems (Sensys), November 2005.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊
 
系統版面圖檔 系統版面圖檔