跳到主要內容

臺灣博碩士論文加值系統

(44.200.82.149) 您好!臺灣時間:2023/06/11 03:21
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:郭宗平
研究生(外文):TSUNG-PING KUO
論文名稱:基於區塊鏈整合的信任管理方案在物聯網系統之研究
論文名稱(外文):Base on the Trust Management Scheme by Integration of Block Chain to IoT Systems
指導教授:陳雍宗陳雍宗引用關係
口試委員:陳雍宗張義芳王中行胡永柟鍾翼能
口試日期:2022-06-15
學位類別:博士
校院名稱:大葉大學
系所名稱:電機工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2022
畢業學年度:110
語文別:中文
論文頁數:61
中文關鍵詞:應用層區塊鏈(BC)物聯網(IoT)系統選擇合成(SC)信任管理(TM)
外文關鍵詞:Application layerBC (Block-chain)IoT (Internet of things) systemSC (Selection combining)TM (Trust management).
相關次數:
  • 被引用被引用:0
  • 點閱點閱:137
  • 評分評分:
  • 下載下載:40
  • 收藏至我的研究室書目清單書目收藏:1
本文提出了一種經由基於信任管理(TM, trust management)方案結合區塊鏈(BC, block chain)來實現物聯網(IoT, internet of thing)精確運行的機制。儘管在現實世界中已廣泛掌握了IoT的實現和應用,但目前存在很多解決可信賴性的問題。因此,與物聯網應用層相關的大量安全問題迫在眉睫。因此,對於解決安全算法的發展至關重要的是,避免物聯網系統遭受惡意攻擊。除此之外,還演示了通過提供有毒化學品的流程工作而實施的實際工作項目。在選擇性合成(selective combining, SC)階段,首先根據與信息估計加權的信任值提取的指定參數融合控制信息,然後再從TM中提取指定參數,再從SC生成所擷取的融合信息轉發到區塊鏈BC,以計算最終訊息的信任值。物聯網技術將提供何種程度的熵(entropy),稱為信息質量(quality of information, QoI),取決於絕對的信任值,該信任值來自上述步驟。通過實際物理評估的實驗部署之仿真結果表明,將SC和BC方案融合到TM程序中後,具有更高的安全性與可靠性。此外,將SC與BC方法融合用於TM的機制可以提高IoT系統之效率,並解決物聯網上應用層的安全性問題。相對而言,此種演算法是會帶來某些不可預期的懲罰因素,諸如請求者分組容量以及IoT的性能數據速率之類的QoI程度之降低。最終,在部署中顯示了一個真實世界的應用程序,該應用程序嵌入了BC,以提高IoT上TM方案的QoI效能。經由仿真結果得知,當未曾有SC與BC結合之前與之後,QoI大約的都低於0.5,當應用SC與B C結合之後,整個系統的QoI的效益可以比未曾加入SC與B C的效益提升,此項結果,證實了理論分析的準確性和所提出模型的有效性。
Though the implementation and application to the IoT (internet of things) have widely grasped in the real world, it exists much of the issue addressing the trustworthiness currently. Therefore, there are huge of security issues relevant to the application layer of IoT becoming urgent for solving. Accordingly, it is critical for addressing the development of security algorithm to avoid the IoT system suffers from malicious attack. There is a Mechanism for exact operations of IoT based on TM (trust management) scheme by integration of BC (block-chain) and SC (selection combining) proposed in the article. Apart from, a real project implemented by providing the flow work for the toxicant chemical is demonstrated. In SC stage, specified parameters first extracted according to the trust value weighted by an estimation value before fused with the control information come from the TM. The fused information generated from SC passed forward to the BC in order to calculate the final trust value. What degree of the entropy, referred as QoI (quality of information), will provide with IoT technologies is definitely dependent on the trust value comes from the previously mentioned steps. The simulation results from experiments deployed with physical assessment show that the security has more reliability after the SC and BC schemes fused together into the TM procedure. Furthermore, the mechanism fusing SC with BC methods for TM can enhance the efficiency and solve the security problem of application layer over IoT. Alternatively, the reducing in QoI degree, such as the packet capacity for the requester as well as data rate of performance for the IoT are the penalty factors. Eventually, there is a real world application shown up the deployment where embeds the SC+BC to increase the QoI of TM scheme over IoT.
中文摘要............iii
ABSTRACT............v
誌謝............vi
目錄............vii
表目錄............x
第一章 緒論............1
1.1緣由............1
1.2研究動機與目的............3
1.3論文結構與說明............5
第二章 物聯網(IoT)與選擇合成(SC)背景技術............8
2.1研究背景............8
2.2論文之研究貢獻分析............10
2.3物聯網及其安全性概述............10
2.4物聯網安全的可信計算之基本介紹............12
2.5分集技術的原理及種類............14
2.6合成技術的原理及種類............15
第三章 信任管理(TM)與區塊鏈(BC)技術............20
3.1信任管理技術分析............20
3.2信任管理協議於健康物聯網系統[32]............25
3.3區塊鏈技術基礎............28
3.4區塊鏈應用層面............32
第四章 基於IoT架構結合SC與區塊鏈技術............35
4.1 IoT中帶區塊鏈(BC)的信任管理(TM)融合演算法............35
4.2將BC嵌入TM的建構過程............39
4.3請求訪問的控制策略............44
第五章 IoT中BC嵌入TM的系統模擬與應用分析............46
5.1. BC嵌入TM的系統模擬............46
5.2實用案例之實現分析............50
5.3實用案例之QoI分析............52
5.4案例之討論與結果............54
第六章 結論與未來研究建議............55
參考文獻............57


[1] A. Ouaddah, I. Bouij-Pasquier, A. Abou Elkalam, and A. Ait Ouahman, “Security Analysis and Proposal of New Access Control Model in the Internet of Thing”, Electrical and Information Technologies (ICEIT), International Conference on, pp. 30-35, 2015.
[2] J. Gole, and M. Cansfield, ‘‘M2M Moves Center Stage: Where Telcos Fit into the M2M Ecosystem,’’ IDC, Framingham, MA, USA, Tech. Rep. [Online]. Available: http://www.idc.com/getdoc.jsp?container Id=LM04U, 2012.
[3] Z. Sheng, C. Mahapatra, C. Zhu, and V. C. M. Leung, “Recent Advances in Industrial Wireless Sensor Networks Toward Efficient Management in IoT”, IEEE Access, Special Section on Industrial Sensor Networks with Advanced Data Management: Design ad Security, Vol. 3, pp. 622-637, May 19, 2015.
[4] Gu Lizet, Wang Jingpei, and Sun Bin, ”Trust Management Mechanism for Internet of Things”, China Communications, ICT Management, pp. 148-156, Feb. 2014.
[5] A. Josang, R. Ismail, and C. Boyd, “A Survey of Trust and Reputation Systems for Online Service Provision”, Decision Support Systems, Vol. 43, pp. 618-644, 2007.
[6] Jaemin Park_y, Kwangjo Kimy, “TM-Coin: Trustworthy Management of TCB Measurements in IoT”, 2nd IEEE Percom. Workshop On Security Privacy and Trust in The Internet of Things, pp. 654-659, 2017.
[7] D. Chen, G. Chang, L. Jin, et al., “A Novel Secure Architecture for the Internet of Things”, 2011 Fifth International Conference on Genetic and Evolutionary Computing, pp. 311-314, 2011.
[8] Z. Sheng, H. Wang, C. Yin, X. Hu, S. Yang, and V. C. M. Leung, ‘‘Lightweight Management of Resource Constrained Sensor Devices in Internet-of-Things,’’ IEEE Internet of Things Journal, Vol. 2, Issue: 5, pp. 402-411, 2015.
[9] J. Lopez, R. Roman, I. Agudo, and C. Fernandez-Gago, “Trust Management Systems for Wireless Sensor Networks: Best Practices”, Computer Communications, Vol. 33, Issue 9, pp. 1086-1093, June 2010.
[10] Gu Xiang, Qiu Jianlin, Wang Jin, “Research on Trust Model of Sensor Nodes in WSNs”, Procedia Engineering, Vol. 29, pp. 909-913, 2012.
[11] S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, "Security in Embedded Systems: Design Challenges," ACM Transactions on Embedded Computing Systems, Vol. 3, no. 3, pp. 461-491, 2004.
[12] Ing-Ray Chen, Jia Guo, and Fenye Bao, “Trust Management for SOA-Based IoT and Its Application to Service Composition,” IEEE Trans. on Services Computing, Vol. 9, no. 3, May/June, 2016
[13] D. G. Brennan, “Linear Diversity Combining Techniques,” in Proc. IRE, Vol. 47, pp. 1075-1102, June 1959.
[14] A. M. Kowshalya, M. L. Valarmathi, “Trust Management in the Social Internet of Things,” Wireless Personal Communications, Vol. 96, Issue 2, pp. 2681–2691, Sep. 2017.
[15] S. Chakrabarty, and D. W. Engels, “A Secure IoT Architecture for Smart Cities,” 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 812 - 813, 2016.
[16] H. Al-Hamadi, and Ing-Ray Chen, “Trust-Based Decision Making for Health IoT Systems,” IEEE Internet of Things Journal, Issue, 99, pp. 1-1, 2017.
[17] Z. A. Khan, and P. Herrmann, “A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things,“ 2017 IEEE 31st International Conference on Advanced Information Networking and Applications, pp. 1169-1176, 2017.
[18] L. Ma, Q. Pei, Y. Qu, K. Fan, and X. Lai, “Decentralized privacy preserving reputation management for mobile crowd sensing,” in Proc. Int. Conf. Security Privacy Commun. Syst., pp. 532-548, 2019.
[19] T. Perera, et. al., “Blockchain-Based Product Traceability Beyond Proof of Existence,” Moratuwa Engineering Research Conference (MERCon), pp. 626-632, 2020.
[20] Meng Shen, et. al., “Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT,” IEEE Journal on Selected Area in Commun., Vol. 38, no. 5, pp. 942-955, May, 2020
[21] A. Ukil, J. Sen, and S. Koilakonda, “Embedded Security for Internet of Things”, Emerging Trends and Applications in Computer Science (NCETACS), 2011 2nd National Conference on, pp. 1-6, 2011.
[22] Z. Ali Khan, and P. Herrmann, “A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things,” 2017 IEEE 31st International Conference on Advanced Information Networking and Applications, pp. 1169-1176, 2017 IEEE
[24] R. Roman, P. Najera, and J. Lopez, "Securing the Internet of Things," Computer, Vol. 44, pp. 51-58, 2011.
[25] Serif Bahtiyar, Mehmet Ufuk Caglayan, “Extracting Trust Information from Security System of a Service”, Journal of Network and Computer Applications, Vol. 35, Issue 1, pp. 480-490, 2012.
[26] Joy I.-Z. Chen, “An Algorithm of Mobile Sensors Data Fusion Tracking for Wireless Sensor Networks”, International Journal of Wireless Personal Commun., Vol. 58, no. 2, pp. 197-214, Dec. 2009.
[27] K. A. Schaefer, D. Scheitrum, and K. Nes, “International Sourcing Decisions in the Wake of a Food Scandal,” Food Policy, Vol. 81, pp. 48–57, 2018.
[28] A. thanasios Papoulis, and S. Unnikrishna Pillai, Probabilitty, Random Variables and Stochastic Processes, 4th Ed., Mc Graw Hill, New York, 2002.
[29] I. S. Grodshteyn, I. M. Ryzhik, Table of Integrals, Series, and Products, 5th ed., CA: Academic Press, San Diego, 1994.
[30] David, H. A., Order Statistics, New York: John Wiley & Sons, Inc., 1981.
[31] Aston Zhang, Zachary C. Lipton, Mu Li, and Alexander J. Smola, Dive into Deep Learning, Release 0.8.0, Jun 16, 2020.
[32] H Al-Hamadi, and Ing-Ray Chen, “Trust-Based Decision Making for Health IoT Systems,” IEEE Journal Internet of Things, 2017.
[33]林谷陶,”區塊鏈技術及營建產業應用案例探討,內政部建築研究所自行研究報告”,中華民國 109 年 12 月成果報告。

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top