(3.236.214.19) 您好!臺灣時間:2021/05/10 02:45
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:唐浩文
研究生(外文):Hao-Wen Tang
論文名稱:異質性無線感測網路之可前向驗證金鑰管理方法
論文名稱(外文):A Forward Authentication Key Management Scheme for Heterogeneous Wireless Sensor Network
指導教授:廖宜恩廖宜恩引用關係
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊科學與工程學系所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2009
畢業學年度:97
語文別:中文
論文頁數:37
中文關鍵詞:無線感測網路金鑰管理方法異質性感測網路金鑰鏈叢集首
外文關鍵詞:Heterogeneous Wireless Sensor NetworksKey Management SchemesKey Chain
相關次數:
  • 被引用被引用:1
  • 點閱點閱:178
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
無線感測網路(Wireless Sensor Network, WSN)通常使用金鑰加、解密技術來保護感測節點與感測節點間資料傳輸的安全。由於感測節點侷限於本身硬體資源問題,不是所有的金鑰管理方法皆適用於無線感測網路上。在本篇論文中,我們提出一個新的應用在異質性感測網路(Heterogeneous Wireless Sensor Networks, HSNs)的金鑰管理方法,叢集首(Cluster Head, CH)與基地台(Base Station, BS)將循序建立金鑰鏈(Key-Chain),使得金鑰鏈具有每一把金鑰與前一把金鑰會有關聯性的特性。叢集首再將其生成的金鑰鏈依序傳送給叢集中的感測節點,基地台也將其生成的金鑰鏈依序傳送給環境內的叢集首,以合成彼此的配對金鑰,如此可使系統成員在更換金鑰時,感測節點能透過金鑰鏈的生成的特性以驗證與叢集首的合法性,叢集首亦能驗證基地台的合法性,以確保更換金鑰動作為系統所要求。所提方法不只可減少叢集首與感測節點儲存金鑰的數目,進而降低感測節點的記憶體空間需求,亦能不斷的更換金鑰以維護無線感測網路環境的安全性。
In wireless sensor network, key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes. However, sensor node is congenitally limited by its insufficient resource of hardware such as memory size and battery duration. Therefore, current key management schemes are not all appropriate for wireless sensor networks. In this thesis, we propose a new method which uses dynamic key management schemes for heterogeneous wireless sensor networks (HSNs).
In the proposed scheme, a hash function is loaded into base station, cluster heads, and sensor nodes. Cluster heads and sensor nodes then generate their own key-chain that provides forward authentication in case of key change for security reason. Pair-wise keys are established between cluster heads and sensor nodes to ensure transmission secrecy.
The proposed scheme can reduce the number of keys needed in sensor nodes and cluster heads. It is also robust to the following attacks: guessing attacks, replay attacks, falsification attacks, man-in-the-middle attacks, and node captured attacks.
摘要 II
Abstract III
目錄 IV
圖目錄 VI
表目錄 VII
第一章 緒論 1
1.1 研究動機與目的 1
1.2 主要貢獻 2
1.3 論文架構 2
第二章 相關研究 4
2.1 無線感測網路 4
2.2 金鑰管理系統 5
2.2.1 加解密機制介紹 5
2.2.2 雜湊函數 8
2.2.3 訊息鑑別碼 9
2.3 無線感測網路之金鑰管理機制 13
第三章 系統模型與架構 16
3.1 系統介紹與環境初始化 16
3.2 金鑰鏈(Key-chain)生成機制 18
3.3 配對金鑰的建立與分群 18
3.4 金鑰的更換與驗證 23
第四章 系統模擬與效能分析 26
4.1 開發工具與開發環境 26
4.2 模擬環境與實驗設定 27
4.3 實驗結果 27
4.4 實驗數據分析與比較 28
4.5 安全性分析 30
第五章 結論與未來研究方向 32
5.1 結論 32
5.2 未來研究方向 33
參考文獻 34
1.中文部份
(1).書籍
[1]William Stallings, 密碼學與網路安全性-原理與實務第三版, 2004
(2).網路資源
[2]Wikipedia, “DES”, Wikimedia Foundation, Inc.
http://zh.wikipedia.org/w/index.php?title=DES&variant=zh-tw, Accessed 30 Apr. 2009.
[3]Wikipedia, “高級加密標準”, Wikimedia Foundation, Inc.
http://zh.wikipedia.org/w/index.php?title=AES&variant=zh-tw, Accessed 30 Apr. 2009.
[4]Wikipedia, “ RSA加密演算法”, Wikimedia Foundation, Inc.
http://zh.wikipedia.org/w/index.php?title=RSA%E5%8A%A0%E5%AF%86%E6%BC%94%E7%AE%97%E6%B3%95&variant=zh-tw, Accessed 14 May. 2009.
[5]訊息認證與雜湊函數
http://gec.kmu.edu.tw/~tjm/security/sec4/text0.html, Accessed 14 May. 2009.
[6]訊息鑑別
http://74.125.153.132/search?q=cache:05VLUk0ZRCoJ:ailab.cs.nchu.edu.tw/, Accessed 15 May. 2009.

2.西文部份
(1).Journal and Conference Articles
[7]K. Lu, Y. Qian, and J. Hu, “A framework for distributed key management schemes in heterogeneous wireless sensor networks,” IEEE International Performance Computing and Communications Conference, pp.513–519, 2006.
[8]L. Eschenauer, and V. Gligor,“ A key management scheme for distributed sensor networks,” In Proceedings of the 9th ACM Conference on Computer and Communications Security, pp.41–47, 2002.
[9]H. Chan, A. Perrig, and D. Song, “Random key pre-distribution schemes for sensor networks,” IEEE symposium on security and privacy, pp. 197–213, 2003.
[10]H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” Proceedings of the IEEE Symposium on Security and Privacy, pp. 197–213, 2003.
[11]X. Du, Y. Xiao, M. Guizani, and H. H. Chen, “An Effective Key Management Scheme for Heterogeneous Sensor Networks,” Ad Hoc Networks, Elsevier, Vol. 5, Issue 1, pp. 24–34, Jan. 2007.
[12]D. Liu, P. Ning and R. Li, “Establishing pairwise keys in distributed sensor networks,” ACM Transactions on Information and System Security (TISSEC),Vol. 8 n.1, pp. 41-77, February 2005.
[13]D. Liu, and P. Ning, “Location-based pairwise key establishments for static sensor networks,” Proceedings of the 2003 ACM Workshop on Security in Ad Hoc and Sensor Networks, pp. 72–82, 2003.
[14]G. Li, J. He, and Y. Fu, “Key management in sensor networks,” Proceedings of the International Conference on Wireless Algorithms, Systems and Applications 2006, pp. 457–466, August 2006.
[15]Y. Zhang, W. Liu, W. Lou and Y. Fang, “Securing Sensor Networks with Location-Based keys,” IEEE Communications Society / WCNC, 2005.
[16]D. Liu and P. Ning, “Location-based pairwise key establishments for static sensor networks,” In:SASN ’03: proceedings of the 1st ACM workshop on security of ad hoc and sensor networks. ACM, New York, pp. 72–82, 2003.
[17]A. Wadaa, S. Olariu, L. Wilson, and M. Eltoweissy, “Scalable cryptographic key management in wireless sensor networks,” Proceedings of the 24th international conference on distributed computing systems workshops, pp. 796–802, 2004.
[18]R. Blom, “Non-public key distribution,” Advances in cryptology—CRYPTO 82, pp. 231–236, 1998.
[19]C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M.Yung, “Perfectly-secure key distribution for dynamic conferences,” CRYPTO ’92: proceedings of the 12th annual international cryptology conference on advances in cryptology, pp. 471–486, 1993.
[20]D. Liu, P. Ning, and W. Du, “Group-based key pre-distribution in wireless sensor networks,” WiSe’05:Proceedings of the 4th ACM workshop on Wireless Security, pp. 11–20, 2005.
[21]M. Moharrum, and M. Eltoweissy, “A study of static versus dynamic keying schemes in sensor networks,” Proceedings of the Second ACM international workshop on performance evaluation of wireless Ad Hoc, sensor, and ubiquitous networks, pp. 122–129, 2005.
[22]M. Moharrum, M. Eltoweissy, and R. Mukkamala, “Dynamic key management in sensor networks,” IEEE Communications 44 (4), pp.122–130, 2006.
[23]A. Perrig, R. Szewczyk, J. Tygar, Victorwen, and D. E. Culler, “Spins: Security protocols for sensor networks,” Seventh Annual Int’l Conf. on Mobile Computing and Networks, 2001.
[24]M. Younis, K. Ghumman, and M. Eltoweissy, “Location-aware combinatorial key management scheme for clustered sensor networks,” IEEE Transaction on Parallel and Distributed System 17 (8), pp. 865–882, 2006.
[25]G. Jolly, M.C. Kuscu, P. Kokate, and M. Younis, “A low-energy key management protocol for wireless sensor networks,” Proc. of Eighth IEEE international Symposium on Computers and Communications, pp. 335–340, 2003.
[26]H. Chan, and A. Perrig, “Pike: peer intermediaries for key establishment in sensor networks,” INFOCOM 2005, 24th annual joint conference of the IEEE computer and communications societies, pp 524–535, 2005.

[27]G. Li, J. He, and Y. Fu, “A group-based dynamic key management scheme in wireless sensor networks,” Proceedings of the 21st International Conference on Advanced Information Networking and Applications, pp. 127–132, 2007.
[28]Y. Cheng, D.P. “Agrawal, Efficient pairwise key establishment and management in static wireless sensor networks,” in:Proceedings of the Second IEEE International Conference on Mobile ad hoc and Sensor Systems, Washington, DC, November 7–10, 2005.
[29]A. Savvides, C. Han, and M. Strivastava, “Dynamic fine-grained localization in ad hoc networks of sensors,” Proceedings of ACM/IEEE MobiCom’01, pp.166–179, 2001.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔