博碩士論文 109522044 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:34 、訪客IP:18.188.228.210
姓名 許懿傑(Yi-Cheih Hsu)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱
(VFCS: A PQC-based Vehicle Forensics Cloud System)
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 (2027-6-30以後開放)
摘要(中) 近年來車聯網與自動駕駛技術迅速發展,伴隨著車輛數位鑑識的需求
也隨之提升。在美國,汽車已經繼傳統的取證標的:電腦、手機之後,成
為第三大取證介質。加上量子技術逐漸成熟,對於車聯網主要利用無線通
訊技術進行資料的傳輸,將會面臨量子計算的威脅。因此我們需要一套能
夠有效抵抗量子電腦攻擊的密碼學演算法,來保護傳輸中的資料及隱私。
本研究利用晶格 (Lattice) 加密演算法的 NTRU 後量子非對稱加解密 及 FALCON 後量子數位簽章技術,針對行車資料上雲做出相對完善的保 護,保障資料的機密性、 完整性及不可否認性,最後將資料儲存至 Hyperledger Fabric 區塊鏈以達成鑑識證據監管鏈之目的。
本研究透過車載診斷系統 (OBD-II),搭配樹莓派的運算,實現我們針 對車輛數位鑑識所設計出來的雲端平台。
摘要(英) Due to the rapid development of Internet of Vehicles (IoV) and autonomous driving technologies in recent years, automobiles have become the third largest digital forensic medium after the traditional forensic targets: computers and mobile phones in the United States.
Coupled with the gradual maturity of quantum technology, the devices will mainly use wireless communication technology for data transmission, which will face the threat from quantum computing. Therefore, we need new cryptographic algorithms that can effectively resist quantum computing attacks to protect data and privacy in the data transmission.
Our research uses Lattice-based NTRU post-quantum public-key encryption and FALCON post-quantum digital signature algorithm to provide relatively complete protection for driving data to the cloud to ensure the confidentiality, integrity and non-repudiation of the data. We also implement Hyperledger Fabric blockchain framework to achieve the chain of custody.
We propose a cloud platform which is designed for vehicle digital forensics through the on-board diagnostic (OBD-II) system and the data computing with the collectors.
關鍵字(中) ★ OBD-II
★ 數位鑑識
★ 後量子密碼學
★ 異常分析
關鍵字(英) ★ OBD-II
★ Digital Forensics
★ Post-Quantum Cryptography
★ Anomaly Detection
論文目次 Abstract ...................................... i
摘要 .......................................... ii
Acknowledgments ............................. iii
List of Figures ............................. vii
List of Tables ............................... ix
Chapter 1. Introduction ....................... 1
Chapter 2. Background ......................... 3
2.1 Controller Area Network ................... 3
2.2 Local Interconnect Network ................ 4
2.3 On-board Diagnostics ...................... 5
2.4 Post-quantum Cryptography ................ 11
Chapter 3. Related Work ...................... 13
3.1 Products ................................. 13
3.2 Academic Research ........................ 15
Chapter 4. System Design ..................... 16
4.1 Overview ................................. 16
4.2 Collector ................................ 17
4.3 Evidence Server .......................... 19
4.4 Post Quantum Cryptography ................ 21
4.4.1 NTRU .................................. 22
4.4.2 FALCON ................................. 23
4.5 Message Queue ............................ 24
4.6 Anomaly Detection ........................ 25
Chapter 5. Evaluation ........................ 27
5.1 Collector Registration ................... 28
5.2 OBD-II Bridge & Collector ................ 29
5.3 Collector Runtime ........................ 31
5.4 Collector Collect Performance ............ 31
5.5 Hash & PQC Performance ................... 34
5.6 Hyperledger Fabric ....................... 35
5.7 Anomaly Detection Performance ............ 36
Chapter 6. Discussion ........................ 38
6.1 More & Real-Time Data from CAN Bus ....... 38
6.2 Reverse Engineering ...................... 39
6.3 Collector Hardware & Software Security ... 39
Chapter 7. Conclusion ........................ 40
Reference .................................... 42
參考文獻 [1]: https://www.csselectronics.com/pages/can-bus-simple-intro-tutorial
[2]: https://www.csselectronics.com/pages/lin-bus-protocol-intro-basics
[3]: https://www.geotab.com/blog/obd-ii/
[4]: https://www.csselectronics.com/pages/obd2-explained-simple-intro
[5]: https://en.wikipedia.org/wiki/On-board_diagnostics#OBD- II_diagnostic_connector
[6]: https://www.sparkfun.com/datasheets/Widgets/ELM327_AT_Commands.pdf
[7]: https://en.wikipedia.org/wiki/OBD-II_PIDs#Services_/_Modes
[8]: https://www.magnetforensics.com/resources/tips-tricks-analyzing-vehicle- data-with-berla-ive-webinar-recording/
[9]: https://berla.co/ecosystem/
[10]: https://github.com/CSS-Electronics
[11]: https://www.csselectronics.com/pages/can-bus-hardware-products\r [12]: Rosenstatter, T., Olovsson, T., & Almgren, M. (2021, August). V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems. In The 16th International Conference on Availability, Reliability and Security (pp. 1-10).
[13]: Mansor, H., Markantonakis, K., Akram, R. N., Mayes, K., & Gurulian, I. (2016, August). Log your car: The non-invasive vehicle forensics. In 2016 IEEE Trustcom/BigDataSE/ISPA (pp. 974-982). IEEE.
[14]: https://falcon-sign.info/
[15]: Shor, P. W., “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM
review, Vol. 41, pp. 303–332, 1999.
[16]: https://csrc.nist.gov/Projects/post-quantum-cryptography/round-3- submissions
[17]: https://en.wikipedia.org/wiki/NTRU#Standardization
[18]: https://www.rabbitmq.com/
[19]: https://blog.eleven-labs.com/fr/rabbitmq-partie-1-les-bases/
[20]: Liu, F. T., Ting, K. M., & Zhou, Z. H. (2008, December). Isolation forest. In 2008 eighth ieee international conference on data mining (pp. 413-422). IEEE.
[21]: https://en.wikipedia.org/wiki/Hyperledger#Hyperledger_Fabric
指導教授 許富皓 許建隆(Fu-Hau Hsu Chien-Lung Hsu) 審核日期 2022-7-20
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明