English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 78937/78937 (100%)
造訪人次 : 39356011      線上人數 : 556
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋


    請使用永久網址來引用或連結此文件: http://ir.lib.ncu.edu.tw/handle/987654321/69480


    題名: 叢集無線感測網路之機率式遠端認證協定;Probablistic Remote Attestation for Cluster-based WSN
    作者: 洪捷;Hong,Chieh
    貢獻者: 資訊工程學系
    關鍵詞: 無線感測網路;遠端認證;完整性;WSN;Remote Attestation;Integrity
    日期: 2016-01-22
    上傳時間: 2016-03-17 20:44:53 (UTC+8)
    出版者: 國立中央大學
    摘要: 近年來,無線感測網路的應用日益廣泛,舉凡生活防災到安全議題上都可以看見其蹤跡。但也由於無線感測網路通常都建置在開放式或無人監控的環境之下,使得攻擊者可以很容易取得其中的感測器並將惡意程式碼植入其中,藉此傳遞不正確的資料讓使用者做出錯誤的決策或分析。

    有學者提出使用遠端認證 (Remote Attestation) 的方式讓基地台驗證感測器的完整性,以確認其是否遭受破壞。許多相關論文在分析無線感測網路安全性時只著重分析基地台與單個感測器間的情況,但是無線感測網路通常都是一個基地台管理大量的感測器。根據我們的分析發現,使用一對一的完整性驗證協定並無法保證一對多的應用情況下仍然安全。

    在本論文中,我們首先提出一種名為『節點恢復』(Node Recovery) 之新型式攻擊,並以這個新攻擊為觀點去分析一些現存一對多感測器完整性驗證對策的缺陷。最後,我們提出一項機率式的一對多型式之感測器完整性驗證協定,其不僅可以抵禦前述節點恢復攻擊,並能有效率的進行整體無線感測網路完整性驗證。
    ;Wireless Sensor Networks (WSNs) have been increasingly developed in many mission-critical applications, such as military and healthcare monitoring systems. Sensor nodes are usually equipped with limited computational resources and become attractive target for various security risks, one of which is malicious code injection attack. An attacker can alter the internal memory state of a sensor node; the compromised nodes can violate the safety and privacy of the users and send foraged data to a base station. Therefore, a mechanism for verifying the trustworthiness of the sensor nodes is highly desirable.


    Many researchers have proposed several methods to check the integrity of the sensor nodes in WSNs. Remote attestation is a common promising protection mechanism used for verifying the integrity of a sensor node′s memory state. The remote attestation is based on challenge-response technique. A verifier can attest the sensor node′s integrity by verifying a cryptographic checksum of the node′s memory state. However, most remote attestation schemes are suitable only for the one-hop communication between the verifier and the prover.


    This research first identifies a new attack model, namely node recovery attack, which enables an attacker to recover a compromised sensor node; consequently, the verifier is convinced that the recovered node is not compromised. We analyze various countermeasures applied in two WSN architectures and show that these countermeasures are subject to the node recovery attack. A probabilistic remote attestation scheme is proposed to resist the node recovery attack.
    顯示於類別:[資訊工程研究所] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML338檢視/開啟


    在NCUIR中所有的資料項目都受到原著作權保護.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明