English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 80990/80990 (100%)
造訪人次 : 41635069      線上人數 : 2248
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋


    請使用永久網址來引用或連結此文件: http://ir.lib.ncu.edu.tw/handle/987654321/74646


    題名: 可執行於未授權物聯網裝置之認證機制;Perform Trusted Work over Untrusted IoT Devices
    作者: 李東岳;Li, Dong-Yue
    貢獻者: 資訊工程學系
    關鍵詞: IoT 安全;IoT 認證;一次性密碼;IoT security;IoT authentication;One Time password
    日期: 2017-07-17
    上傳時間: 2017-10-27 14:35:11 (UTC+8)
    出版者: 國立中央大學
    摘要: 在物聯網越來越普及的這個時代,我們所面臨的資安問題不再侷限在個人電腦上,家中的電視冰箱等都有可能成為駭客攻擊的對象。當企業將自家產品傳感器佈署在管轄不到的範圍中,企業要如何確保所佈署的傳感器是否被入侵?若傳感器接收的訊息會傳送至企業內部的伺服器,攻擊者便有可能進一步滲透到企業內部。
    在正常情況下,傳感器每隔一段固定時間,傳送特定封包格式(beacon)來告訴伺服器目前此傳感器還在線上。由於傳感器不在企業能夠防禦的範圍內,攻擊者能夠拿到實體的機器,若攻擊者將實體記憶體的內容全數載下,透過反編譯技術將原始碼重現,傳感器內部的行為攻擊者是能夠完全模仿的。
    為了防止特定封包格式被模仿,本文提出以一次性密碼(One Time Password)來替代,並透過傳送執行檔的方式以及亂數的驗證來確保客戶端所執行的程式是安全的。在第四章會介紹一次性密碼的傳送以及偵測。
    ;In this era of increasingly popular Internet of things, we are facing the problem of security which is no longer limited to personal computers, on the contrary home TVs, refrigerators and so forth may also be the objects of hacker attacks. When the enterprises deployed sensors on their own product out of the controllable range, how does the enterprises make sure that the deployment of the sensor is not invaded? If the messages captured by the sensor were ready to be sent to the server in the enterprise, the attacker could probably able to penetrate into the enterprise further.
    Under normal circumstances, the sensor will send a specific packet format (beacon) during a fixed period of time, to tell the server that the sensor is still online. Because the sensor is not within the defense range of the enterprise, the attacker may be able to grab the entity of the machine. If the attacker loaded all the contents of the physical memory and reproduced the source code through the disassembly techniques, the behaviors within the sensor would be able to be imitated by the attacker completely.
    In order to prevent a particular format of packets from being imitated, this article proposes an alternative method to ensure that the program executed by the client is secure by using the One Time Password mechanism, sending executable files and verifying of the random numbers. In the fourth chapter, the transmission and detection of the one-time passwords will be introduced.
    顯示於類別:[資訊工程研究所] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML114檢視/開啟


    在NCUIR中所有的資料項目都受到原著作權保護.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明