跳到主要內容

臺灣博碩士論文加值系統

(44.200.82.149) 您好!臺灣時間:2023/06/10 00:04
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:唐恆生
研究生(外文):TANG,HENG,SHENG
論文名稱:基於異質網路之物聯網感測資料安全通訊監控系統
論文名稱(外文):Secure transmission and monitoring system design for IoT sensing data based on heterogeneous networks
指導教授:顏錦柱
指導教授(外文):YAN,JUN-JUH
口試委員:陳智勇郭瀚鴻
口試委員(外文):CHEN,JHIH-YONGGUO,HAN-HONG
口試日期:2023-05-22
學位類別:碩士
校院名稱:國立勤益科技大學
系所名稱:電子工程系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2023
畢業學年度:111
語文別:中文
論文頁數:63
中文關鍵詞:安全通訊物聯網異質網路
外文關鍵詞:secure communicationInternet of thingsMQTTTCP/IPheterogeneous network
相關次數:
  • 被引用被引用:0
  • 點閱點閱:14
  • 評分評分:
  • 下載下載:3
  • 收藏至我的研究室書目清單書目收藏:0
通訊科技的進步以及物聯網的興起,市面上出現了許多不同無線傳輸協定的設備以及感測器,例如Wifi、藍牙(Bluetooth)、LoRa等通訊協議,因為不同傳輸協定資訊整合的需要,市面上逐漸出現支援單一或多個傳輸協定的微控制器(microcontroller, MCU),而異質網路、智慧家庭相關的產品也相繼問世。本研究基於物聯網的架構研究異質網路的資料整合、應用,蒐集不同通訊協定的資訊,使感測器的資料,可經由市面上不同的網路通訊協定來傳輸資料,整合於閘道器的設計,並利用訊息佇列遙測傳輸MQTT(Message Queuing Telemetry Transport)通訊架構,讓遠端的使用者能夠即時監控與操作,本研究整合了TCP/IP (Transmission Control Protocol / Internet Protocol)以及Bluetooth協定下的低功耗藍牙BLE(Bluetooth Low Energy)以及訊息佇列遙測傳輸MQTT作為無線傳輸,使用ESP32 MCU能夠支持多種通訊協定的傳輸,再由樹莓派(Raspberry- Pi)當作異質網路閘道器,將資料整合後經由混沌系統所產生的混沌亂數、AES-CFB、SHA3-256多道程序加密後,以MQTT傳輸協定搭配混沌動態主題與使用者端進行連接,以達到資料監控時的資料安全性與方便性,同時資料會上傳至MySQL資料庫中,以便使用者回顧之前的感測紀錄。
Following advancement of communication technology and the rise of the Internet of Things, many devices and sensors with different wireless transmission protocols have appeared, such as Wifi, Bluetooth, LoRa and other communication protocols. Due to the demand for information integration of different protocols, Microcontrollers (MCUs) supporting single or multiple transmission protocols are developed, and products related to heterogeneous networks and smart homes are also proposed. Based on the architecture of the Internet of Things, this thesis aims to study the data integration and application of heterogeneous networks. By collecting data of different communication protocols, so that the sensor data can be transmitted through different network communication protocols and integrated in the gateway. Then through MQTT (Message Queuing Telemetry Transport) communication architecture, remote users can monitor and operate in real time. This research integrates TCP/IP (Transmission Control Protocol / Internet Protocol) and Bluetooth Low Energy under the Bluetooth protocol and utilize MQTT as wireless transmission. ESP32 MCUs are used to support the transmission of multiple communication protocols and then Raspberry Pi (Raspberry-Pi) is designed as a heterogeneous gateway. After encrypting the data with the chaotic random numbers, SHA3-256 and AES-CFB, the MQTT transmission protocol are combined to connect with the user end to achieve data security. At the same time, the data will be uploaded to the MySQL database so that users can review previous sensing records.
摘 要 i
ABSTRACT iii
誌 謝 v
目 錄 vi
圖目錄 vii
表目錄 viii
一、 緒 1
1.1 研究動機 1
1.2 研究目的 3
二、 基於混沌理論加解密系統設計 5
2.1 混沌系統亂數產生設計 5
2.2 混沌系統離散化實驗 9
2.3 離散化混沌系統同步控制設計 12
三、 動態亂數產生以及動態加密設計 28
3.1 動態亂數產生設計 28
3.2 動態密鑰的加密與解密模擬 28
3.3 亂數品質-NIST測驗介紹 29
3.4 混沌動態密鑰NIST SP 800-22 revision1a測驗 31
四、 MQTT通訊協定之混沌動態主題設計 33
4.1 MQTT通訊協定 33
4.2 混沌動態主題步驟說明 35
五、 異質網路閘道器 40
5.1 TCP/IP實驗 41
5.2 低功耗藍牙(BLE)實驗 44
5.3 異質網路閘道器 47
六、 基於物聯網架構之異質網路資料安全管理系統 49
6.1 系統架構 49
6.2 流程說明與驗證 50
6.3 系統資料庫設計: 56
七、 結論 58
八、 參考資料 60


[1]Madakam, S., Lake, V., Lake, V., & Lake, V. (2015). Internet of Things (IoT): A literature review. Journal of Computer and Communications, 3(05), 164.
[2]Gokhale, P., Bhat, O., & Bhat, S. (2018). Introduction to IOT. International Advanced Research Journal in Science, Engineering and Technology, 5(1), 41-44.
[3]數位時代 ( 2018 ) 台灣因「駭客攻擊」年損8100億!6成民眾沒「這觀念」,資安意識差到連3年全球倒數第一。上網日期:2022年11月3日。檢自:
https://www.storm.mg/lifestyle/448195?srcid=73746f726d2e6d675f6e756c6c_1557684909
[4]Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., & Ghani, N. (2019). Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations. IEEE Communications Surveys & Tutorials, 21(3), 2702-2733.
[5]Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015, December). Internet of things (IoT) security: Current status, challenges and prospective measures. In 2015 10th international conference for internet technology and secured transactions (ICITST) (pp. 336-341). IEEE.
[6]Jurcut, A. D., Ranaweera, P., & Xu, L. (2020). Introduction to IoT security. IoT security: advances in authentication, 27-64.
[7]TWNIC(2018)。2018台灣網路報告。上網日期:2022年11月3日。檢自:https://report.twnic.tw/2018/StrategyThreeEstablishAndDevelopSmart%20HomeApplications.html
[8]Gou, Q., Yan, L., Liu, Y., & Li, Y. (2013, August). Construction and strategies in IoT security system. In 2013 IEEE international conference on green computing and communications and IEEE internet of things and IEEE cyber, physical and social computing (pp. 1129-1132). IEEE.
[9]Maksimović, M., Vujović, V., Davidović, N., Milošević, V., & Perišić, B. (2014). Raspberry Pi as Internet of things hardware: performances and constraints. design issues, 3(8), 1-6.
[10]Singh, J.P., Roy, B.K. A more chaotic and easily hardware implementable new 3-D chaotic system in comparison with 50 reported systems. Nonlinear Dyn 93, 1121–1148 (2018). https://doi.org/10.1007/s11071-018-4249-3
[11]Xinmiao Zhang and K. K. Parhi, "Implementation approaches for the Advanced Encryption Standard algorithm," in IEEE Circuits and Systems Magazine, vol. 2, no. 4, pp. 24-46, 2002, doi: 10.1109/MCAS.2002.1173133.
[12]Helmy, M., El-Rabaie, E. S. M., Eldokany, I., & Abd El-Samie, F. E. (2022). Proposed Hybrid Encryption Algorithm for Robust 3D Image Communication over Wireless Channels. Optik, 170205.
[13]Schmidbauer, T., & Wendzel, S. (2022). Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 13(1), 137-166.
[14]Lin, C. H., Hu, G. H., Chen, J. S., Yan, J. J., & Tang, K. H. (2022). Novel design of cryptosystems for video/audio streaming via dynamic synchronized chaos-based random keys. Multimedia Systems, 1-16.
[15]SANTOSO, H. D. (2022). Implementasi Message Authentication Code Dan Algoritme Advanced Encryption Standard Pada Protokol Komunikasi Mqtt (Doctoral dissertation, Universitas Jenderal Soedirman).
[16]Hunkeler, U., Truong, H. L., & Stanford-Clark, A. (2008, January). MQTT-S—A publish/subscribe protocol for Wireless Sensor Networks. In 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE'08) (pp. 791-798). IEEE.
[17]Chen, F., Huo, Y., Zhu, J., & Fan, D. (2020, November). A review on the study on MQTT security challenge. In 2020 IEEE International Conference on Smart Cloud (SmartCloud) (pp. 128-133). IEEE.
[18]Lin, J. S., & Yan, J. J. (2009). Adaptive synchronization for two identical generalized Lorenz chaotic systems via a single controller. Nonlinear Analysis: Real World Applications, 10(2), 1151-1159.
[19]Hou, Y. Y., Liao, T. L., & Yan, J. J. (2007). H∞ synchronization of chaotic systems using output feedback control design. Physica A: Statistical Mechanics and Its Applications, 379(1), 81-89.
[20]不詳, "TCP與SOCKET的三次握手的對應關係",上網日期:2022年11月3日,檢自:https://www.itread01.com/content/1547369120.html.
[21]Barré, S., Paasch, C., & Bonaventure, O. (2011, May). Multipath TCP: from theory to practice. In International conference on research in networking (pp. 444-457). Springer, Berlin, Heidelberg.
[22]Chun, W. (2001). Core python programming (Vol. 1). Prentice Hall Professional.
[23]Hunt, J. (2019). Sockets in Python. In Advanced Guide to Python 3 Programming (pp. 457-470). Springer, Cham.
[24]Lee, S. Y. (2016). Design and Implementation of Multi-Access BLE/Wi-Fi Gateway using Arduino. Journal of Knowledge Information Technology and Systems, 11(6), 703-712.
[25]Taniguchi, Y., Mukaida, T., Ochi, Y., & Iguchi, N. (2021, March). A BLE-based monitoring system for estimating congestion on university campuses. In 2021 IEEE 3rd Global Conference on Life Sciences and Technologies (LifeTech) (pp. 414-415). IEEE.
[26]Okamoto, T., Sasaki, Y., & Suzuki, S. (2017, October). Targeted advertising using BLE beacon. In 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE) (pp. 1-5). IEEE.
[27]Radhakrishnan, M., Misra, A., Balan, R. K., & Lee, Y. (2015, October). Smartphones and ble services: Empirical insights. In 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (pp. 226-234). IEEE.
[28]Hernandez-Rojas, D., Mazon-Olivo, B., Novillo-Vicuña, J., Escudero-Cascon, C., Pan-Bermudez, A., & Belduma-Vacacela, G. (2017, November). IoT android gateway for monitoring and control a WSN. In International Conference on Technology Trends (pp. 18-32). Springer, Cham.
[29]Yan, J. J., Chen, W. Y., & Chang, E. R. (2022). Design of synchronized multimode random key generators based on chaos-based peak value coding and its application to secure communication.
[30]Pham, V. T., Vaidyanathan, S., Volos, C. K., & Jafari, S. (2015). Hidden attractors in a chaotic system with an exponential nonlinear term. The European Physical Journal Special Topics, 224(8), 1507-1517.
[31]Yan, J. J., Chen, C. Y., & Tsai, J. S. H. (2016). Hybrid chaos control of continuous unified chaotic systems using discrete rippling sliding mode control. Nonlinear Analysis: Hybrid Systems, 22, 276-283.
[32]了解藍牙 RSSI 的措施。上網日期:2032年1月10日。檢自:
https://ieeexplore.ieee.org/document/7366936

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊