跳到主要內容

臺灣博碩士論文加值系統

(44.221.73.157) 您好!臺灣時間:2024/06/20 10:47
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:張廷瑋
研究生(外文):ZHANG, TING-WEI
論文名稱:以無人飛行載具動態偵測非法無線網路存取點三維座標位置
論文名稱(外文):Dynamic Detection of Rogue Access Point Position with Unmanned Aerial Vehicles
指導教授:蕭漢威蕭漢威引用關係
指導教授(外文):HSIAO, HAN-WEI
口試委員:陳灯能楊新章
口試委員(外文):CHEN, DENG-NENGYANG, HSIN-CHANG
口試日期:2021-08-02
學位類別:碩士
校院名稱:國立高雄大學
系所名稱:資訊管理學系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2021
畢業學年度:109
語文別:中文
論文頁數:53
中文關鍵詞:網路安全非法無線網路定位無線網路無人飛行載具
外文關鍵詞:Network SecurityRogue Access Point PositioningWireless NetworkUnmanned Aerial Vehicles
相關次數:
  • 被引用被引用:0
  • 點閱點閱:160
  • 評分評分:
  • 下載下載:30
  • 收藏至我的研究室書目清單書目收藏:0
隨著科技的蓬勃發展,物聯網的時代逐漸來臨,為了面對越來越多無線網路設備需求,無線網路存取技術逐漸普及,但也使得網路攻擊者入侵方式更加多元,因此無線網路安全成為了重要之議題。為因應此趨勢,相關安全技術之研究也快速發展,如何有效率偵測並定位非法之無線網路存取點 (Rogue Access Point, RAP) 成為研究領域之重點。而隨著架設無線網路存取點之門檻降低,在公家機關、私人企業或軍事單位中可能會出現未經授權而架設之無線網路存取點 (Access Point, AP),故可能導致在防禦系統內部網路如同打開一入口給予網路攻擊者進行攻擊,而使耗費重大資源架設之防禦系統等同無效,因此找出這些非法無線網路存取點是需要被探討之無線網路安全議題。
本研究提出了在大區域中快速搜索非法無線網路存取點並精準定位出其三維座標位置之方法。在本研究中以無人飛行載具搭載探測設備設定一連串有序之航點,於飛行任務中透過探測儀器接收到之接收訊號強度值 (Received Signal Strength Indication, RSSI) 與全球導航衛星系統 (Global Navigation Satellite System, GNSS) 所給予無人飛行載具之位置資訊經由一連串導航飛行與偵測訊號強度的程序定位出潛藏的非法無線網路存取點之位置。以此方式可協助管理者快速找出可能具有風險違規之無線網路存取點及其位置,並降低搜索之時間成本。
With the booming of technology, the era of Internet of Things (IoT) is gradually approaching. In order to meet the demand of more and more wireless network devices, wireless network access technology is gradually becoming popular, but it also makes the attackers can invade by more diverse ways, so wireless network security has become an important issue. In response to this trend, research on security technologies is rapidly developing, and how to efficiently detect and locate rogue access points (RAPs) has become a key to network security. With the lowering of the threshold for setting up RAPs, unauthorized RAPs may appear in public agencies, private enterprises, or military units, which may lead to make an entry for attackers to the internal network of the defense system, rendering the defense system ineffective after spending a lot of resources on setting up. Therefore, identifying these rogue access points is a wireless network security issue that needs to be explored.
In this study, we propose a method to quickly search for rogue access points in a large area and precisely locate their 3D position. In this study, an unmanned aerial vehicle (UAV) with detection equipment was used to set a series of sequential waypoints, and the UAV's position information given by the RSSI and Global Navigation Satellite System (GNSS) during the flight mission was determined by a series of navigation and the location of potential rogue access points is located by a series of navigation and signal strength detection procedures. This approach helps administrators quickly identify and locate potentially risky access points and their locations, and reduces the time and cost of searches.
摘要 i
ABSTRACT ii
目錄 iv
圖目錄 v
表目錄 vi
第一章 緒論 1
第一節 研究背景 2
第二節 研究動機 4
第三節 研究目的 5
第二章 文獻探討 6
第一節 無線網路安全相關研究 6
第二節 無線網路定位之相關研究 7
第三節 無人載具定位非法無線網路點之相關研究 8
第三章 研究方法 10
第一節 系統架構 10
第二節 探索模式 12
第三節 收斂模式 14
第四章 實驗與評估 23
第一節 前置處理 24
第二節 建立預測模型 27
第三節 驗證定位演算法 34
第五章 結論與未來方向 40
參考文獻 42

[1]CISCO, “Cisco Annual Internet Report (2018–2023),” 2020. [Online]. Available: https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.pdf.
[2]郭幸香, 李墨軒, and 史賀文, “不合法 AP的治理方法綜整,” 臺灣網際網路研討會, 2019.
[3]C. D.Omorog, B. D.Gerardo, and R. P.Medina, “The performance of blum-blum-shub elliptic curve Pseudorandom Number Generator as WiFi protected access 2 security key generator,” ACM Int. Conf. Proceeding Ser., pp. 23–28, 2018.
[4]S.Srilasak, K.Wongthavarawat, and A.Phonphoem, “Integrated wireless rogue access point detection and counterattack system,” Proc. 2nd Int. Conf. Inf. Secur. Assur. ISA 2008, pp. 326–331, 2008.
[5]D.Orfanus, E. P.DeFreitas, and F.Eliassen, “Self-Organization as a Supporting Paradigm for Military UAV Relay Networks,” IEEE Commun. Lett., vol. 20, no. 4, pp. 804–807, 2016.
[6]M. A.Ma’Sum et al., “Simulation of intelligent Unmanned Aerial Vehicle (UAV) for military surveillance,” 2013 Int. Conf. Adv. Comput. Sci. Inf. Syst. ICACSIS 2013, pp. 161–166, 2013.
[7]Z.Fu, Y.Chen, Y.Ding, and D.He, “Pollution Source Localization Based on Multi-UAV Cooperative Communication,” IEEE Access, vol. 7, pp. 29304–29312, 2019.
[8]E. T.Alotaibi, S. S.Alqefari, and A.Koubaa, “LSAR: Multi-UAV Collaboration for Search and Rescue Missions,” IEEE Access, vol. 7, pp. 55817–55832, 2019.
[9]Y.Naidoo, R.Stopforth, and G.Bright, “Development of an UAV for search & rescue applications: Mechatronic integration for a quadrotor helicopter,” IEEE AFRICON Conf., no. September, pp. 13–15, 2011.
[10]S.Nikbakhsh, A. B. A.Manaf, M.Zamani, and M.Janbeglou, “A novel approach for rogue access point detection on the client-side,” Proc. - 26th IEEE Int. Conf. Adv. Inf. Netw. Appl. Work. WAINA 2012, pp. 684–687, 2012.
[11]K. Z. Y.Ang et al., “High-Precision Multi-UAV Teaming for the First Outdoor Night Show in Singapore,” Unmanned Syst., vol. 6, no. 1, pp. 39–65, 2018.
[12]A.Sebbar, S. E.Boulahya, G.Mezzour, and M.Boulmalf, “An empirical study of WIFI security and performance in Morocco-wardriving in Rabat,” Proc. 2016 Int. Conf. Electr. Inf. Technol. ICEIT 2016, pp. 362–367, 2016.
[13]Shuai Han, Zijun Gong, Weixiao Meng, Cheng Li, Dekun Zhang, and Wenyan Tang, “Automatic Precision Control Positioning for Wireless Sensor Network,” Sensors J., vol. 16, no. 7, pp. 2140–2150, 2016.
[14]H.Zhang, H.Du, Q.Ye, and C.Liu, “Utilizing CSI and RSSI to Achieve High-Precision Outdoor Positioning: A Deep Learning Approach,” IEEE Int. Conf. Commun., vol. 2019-May, pp. 1–6, 2019.
[15]S.Yucer et al., “RSSI-based outdoor localization with single unmanned aerial vehicle,” arXiv, 2020.
[16]F.Awad, A.Omar, M.Naserllah, A.Abu-Hantash, and A.Al-Taj, “Access point localization using autonomous mobile robot,” 2017 IEEE Jordan Conf. Appl. Electr. Eng. Comput. Technol. AEECT 2017, vol. 2018-Janua, pp. 1–5, 2017.
[17]F.Awad and B.Taani, “WiMap : an Efficient Wi-Fi Access Point Localization Mechanism,” no. December, 2018.
[18]J.Wang, N.Juarez, E.Kohm, Y.Liu, J.Yuan, and H.Song, “Integration of SDR and UAS for Malicious Wi-Fi Hotspots Detection,” Integr. Commun. Navig. Surveill. Conf. ICNS, vol. 2019-April, pp. 1–8, 2019.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊