English  |  正體中文  |  简体中文  |  Items with full text/Total items : 65421/65421 (100%)
Visitors : 22277126      Online Users : 172
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/69480


    Title: 叢集無線感測網路之機率式遠端認證協定;Probablistic Remote Attestation for Cluster-based WSN
    Authors: 洪捷;Hong,Chieh
    Contributors: 資訊工程學系
    Keywords: 無線感測網路;遠端認證;完整性;WSN;Remote Attestation;Integrity
    Date: 2016-01-22
    Issue Date: 2016-03-17 20:44:53 (UTC+8)
    Publisher: 國立中央大學
    Abstract: 近年來,無線感測網路的應用日益廣泛,舉凡生活防災到安全議題上都可以看見其蹤跡。但也由於無線感測網路通常都建置在開放式或無人監控的環境之下,使得攻擊者可以很容易取得其中的感測器並將惡意程式碼植入其中,藉此傳遞不正確的資料讓使用者做出錯誤的決策或分析。

    有學者提出使用遠端認證 (Remote Attestation) 的方式讓基地台驗證感測器的完整性,以確認其是否遭受破壞。許多相關論文在分析無線感測網路安全性時只著重分析基地台與單個感測器間的情況,但是無線感測網路通常都是一個基地台管理大量的感測器。根據我們的分析發現,使用一對一的完整性驗證協定並無法保證一對多的應用情況下仍然安全。

    在本論文中,我們首先提出一種名為『節點恢復』(Node Recovery) 之新型式攻擊,並以這個新攻擊為觀點去分析一些現存一對多感測器完整性驗證對策的缺陷。最後,我們提出一項機率式的一對多型式之感測器完整性驗證協定,其不僅可以抵禦前述節點恢復攻擊,並能有效率的進行整體無線感測網路完整性驗證。
    ;Wireless Sensor Networks (WSNs) have been increasingly developed in many mission-critical applications, such as military and healthcare monitoring systems. Sensor nodes are usually equipped with limited computational resources and become attractive target for various security risks, one of which is malicious code injection attack. An attacker can alter the internal memory state of a sensor node; the compromised nodes can violate the safety and privacy of the users and send foraged data to a base station. Therefore, a mechanism for verifying the trustworthiness of the sensor nodes is highly desirable.


    Many researchers have proposed several methods to check the integrity of the sensor nodes in WSNs. Remote attestation is a common promising protection mechanism used for verifying the integrity of a sensor node′s memory state. The remote attestation is based on challenge-response technique. A verifier can attest the sensor node′s integrity by verifying a cryptographic checksum of the node′s memory state. However, most remote attestation schemes are suitable only for the one-hop communication between the verifier and the prover.


    This research first identifies a new attack model, namely node recovery attack, which enables an attacker to recover a compromised sensor node; consequently, the verifier is convinced that the recovered node is not compromised. We analyze various countermeasures applied in two WSN architectures and show that these countermeasures are subject to the node recovery attack. A probabilistic remote attestation scheme is proposed to resist the node recovery attack.
    Appears in Collections:[資訊工程研究所] 博碩士論文

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML215View/Open


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback  - 隱私權政策聲明