(3.231.230.175) 您好!臺灣時間:2021/04/16 01:47
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:許嵩健
研究生(外文):Sung-Chien Hsu
論文名稱:偵測IPv6無線感測網路的蟲洞攻擊
論文名稱(外文):Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks
指導教授:陳嘉玫陳嘉玫引用關係
指導教授(外文):Chia-Mei Chen
學位類別:碩士
校院名稱:國立中山大學
系所名稱:資訊管理學系研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2015
畢業學年度:104
語文別:中文
論文頁數:51
中文關鍵詞:蟲洞攻擊無線感測網路IPv6
外文關鍵詞:IPv6wireless sensor networkwormhole attack
相關次數:
  • 被引用被引用:0
  • 點閱點閱:125
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:3
  • 收藏至我的研究室書目清單書目收藏:0
近年來隨著IPv6與物聯網蓬勃發展,無線感測網路成為物聯網最重要部份之一,ZigBee聯盟於2013年發佈IPv6的ZigBee IP規範,將無線感測網路從IPv4升級到IPv6,提升ZigBee網路定址能力等功能,解決無線感測網路IP不足的問題。
然而IPv6無線感測網路中的蟲洞攻擊(Wormhole attacks)問題並沒有被解決。蟲洞攻擊的運作原理是攻擊者偽造路由通告封包,建立蟲洞隧道(Wormhole tunnel),在蟲洞隧道的兩端轉送資料封包,將周圍節點的流量吸入蟲洞隧道,攻擊者便能夠進行攔截、竊聽、竄改、或丟棄封包癱瘓網路等惡意行為,因此後果非常嚴重。
文獻中蟲洞攻擊偵測方法,多半需要藉助GPS等外部硬體設備或系統時間同步的機制才能偵測,需耗費昂貴的成本,而且在部份網路環境偵測率不佳。
本研究提出蟲洞攻擊防禦系統,能防禦IPv6無線感測網路的蟲洞攻擊,特色是依據IPv6無線感測網路的標準路由協定RPL,偵測RPL路由封包判斷蟲洞攻擊,不需要額外的設備或系統輔助。在實驗評估中,以系統模擬的方式做實驗,實驗結果證明本研究之方法,可以有效偵測蟲洞攻擊。
Recently, with the development of IPv6 and Internet, wireless sensor network becomes more popular in Internet of thing. ZigBee Alliance announced ZigBee IP specification in 2013, which upgraded the protocol of wireless sensor network from IPv4 to IPv6, and solved the issue of the insufficient IP addresses.
However, IPv6 wireless sensor network still faces wormhole attacks. The Wormhole attacks generate a wormhole tunnel, and cause neighbors to go through it. Which means the attackers can sniff, modify, or drop packets.
There are still some limitations in detecting method of wormhole attack in researches. For example, some researches require GPS support or precise synchronized time in the system.
This paper proposes wormhole detection system. Without any other hardware and system support, our solution analyst packets through RPL standard routing protocol only. We have a good detection rate, according to our experimental results.
論文審定書 i
誌謝 ii
摘要 iii
目錄 v
圖次 vii
表次 viii
第1章 緒論 1
1.1 研究背景 1
1.2 研究動機與目的 2
第2章 文獻探討 3
2.1 無線感測網路簡介 3
2.2 ZigBee IP網路標準與RPL路由協定 4
2.3 蟲洞攻擊介紹 8
2.4 防禦方法 11
第3章 研究方法 14
3.1 系統架構 14
3.2 蟲洞攻擊偵測系統 15
3.2.1 建立DODAG網路與RPL路由範例 16
3.2.2 out-of-band channel蟲洞攻擊範例 18
3.2.3 蟲洞攻擊偵測模組 20
第4章 系統評估 22
4.1 系統驗證 23
4.1.1 實驗一:系統驗證參數 24
4.1.2 實驗一:系統驗證結果 24
4.2 系統評估 31
4.2.1 系統評估的實驗參數 31
4.2.2 實驗二:評估實驗對照組 33
4.2.3 實驗三:Map size 33
4.2.4 實驗四:良性節點數 34
4.2.5 實驗五:良性節點傳輸距離上限 35
4.2.6 實驗六:Rain fade延遲權重 36
4.2.7 實驗七:蟲洞距離長度 37
4.2.8 實驗二至實驗七的實驗總結 38
第5章 結論與未來展望 40
參考文獻 41
[1]ZigBee IP Webinar presentation. Retrieved: Aug. 2015. Available: https://docs.zigbee.org/zigbee-docs/dcn/13/docs-13-0158-00-0mwg-the-new-zigbee-ip-specification-ipv6-control-for-low-power-low-cost-devices-webinar.pdf
[2]S. E. Deering, "Internet protocol, version 6 (IPv6) specification," 1998.
[3]TrendLabs 2013年資訊安全總評. Retrieved: Aug. 2015. Available: http://www.trendmicro.tw/cloud-content/tw/pdfs/about/2013_review.pdf
[4]C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad hoc networks, vol. 1, pp. 293-315, 2003.
[5]X. Chen, K. Makki, K. Yen, and N. Pissinou, "Sensor network security: a survey," Communications Surveys & Tutorials, IEEE, vol. 11, pp. 52-73, 2009.
[6]I. Butun, S. Morgera, and R. Sankar, "A Survey of Intrusion Detection Systems in Wireless Sensor Networks," 2014.
[7]C. E. Caicedo, J. B. Joshi, and S. R. Tuladhar, "IPv6 Security Challenges," IEEE Computer, vol. 42, pp. 36-42, 2009.
[8]F. Barani, "A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system," in Intelligent Systems (ICIS), 2014 Iranian Conference on, 2014, pp. 1-6.
[9]G. Mulligan, "The 6LoWPAN architecture," in Proceedings of the 4th workshop on Embedded networked sensors, 2007, pp. 78-82.
[10]X. Ma and W. Luo, "The analysis of 6LoWPAN technology," in 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008, pp. 963-966.
[11]T. Winter, "RPL: IPv6 routing protocol for low-power and lossy networks," RFC 6550, 2012.
[12]J. Vasseur, "Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks," RFC 6551, 2012.
[13]P. Thubert, "Objective function zero for the routing protocol for low-power and lossy networks (RPL)," 2012.
[14]B. Warneke, M. Last, B. Liebowitz, and K. S. J. Pister, "Smart Dust: communicating with a cubic-millimeter computer," Computer, vol. 34, pp. 44-51, 2001.
[15]I. F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," Communications Magazine, IEEE, vol. 40, pp. 102-114, 2002.
[16]Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. Mccann, and K. Leung, "A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities," Wireless Communications, IEEE, vol. 20, pp. 91-98, 2013.
[17]L. Wallgren, S. Raza, and T. Voigt, "Routing Attacks and Countermeasures in the RPL-Based Internet of Things," International Journal of Distributed Sensor Networks, vol. 2013, p. 11, 2013.
[18]T. I. C. W. Attacks, "A Full Image of the Wormhole Attacks," 2009.
[19]H. Yih-Chun, A. Perrig, and D. B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, 2003, pp. 1976-1986 vol.3.
[20]I. Khalil, S. Bagchi, and N. B. Shroff, "LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks," in Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on, 2005, pp. 612-621.
[21]I. Khalil, S. Bagchi, and N. B. Shroff, "MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks," Ad Hoc Networks, vol. 6, pp. 344-362, 2008.
[22]C. Sun, K. Doo-Young, L. Do-hyeon, and J. Jae-il, "WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks," in Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC ''08. IEEE International Conference on, 2008, pp. 343-348.
[23]G. Lee, J. Seo, and D.-k. Kim, "An approach to mitigate wormhole attack in wireless ad hoc networks," in Information Security and Assurance, 2008. ISA 2008. International Conference on, 2008, pp. 220-225.
[24]E. Rescorla, "Diffie-Hellman key agreement method," 1999.
[25]F. Khan, T. Shon, T. Lee, and K. Kim, "Wormhole attack prevention mechanism for RPL based LLN network," in Ubiquitous and Future Networks (ICUFN), 2013 Fifth International Conference on, 2013, pp. 149-154.
[26]T. Reusing, "Comparison of operating systems tinyos and contiki," Sens. Nodes-Operation, Netw. Appli.(SN), vol. 7, 2012.
[27]M. Junker, R. Hoch, and A. Dengel, "On the evaluation of document analysis components by recall, precision, and accuracy," in Document Analysis and Recognition, 1999. ICDAR''99. Proceedings of the Fifth International Conference on, 1999, pp. 713-716.
[28]M. M. van de Kamp, "Statistical analysis of rain fade slope," Antennas and Propagation, IEEE Transactions on, vol. 51, pp. 1750-1759, 2003.
[29]Rain fade - Wikipedia. Retrieved: Aug. 2015. Available: https://en.wikipedia.org/wiki/Rain_fade
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔