English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 80990/80990 (100%)
造訪人次 : 41636101      線上人數 : 1063
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋


    請使用永久網址來引用或連結此文件: http://ir.lib.ncu.edu.tw/handle/987654321/77527


    題名: 網路攝影機遠端連線安全性分析
    作者: 吳定遠;Wu, Ting-Yuan
    貢獻者: 資訊管理學系
    關鍵詞: 網路攝影機;身份驗證;信令;數位簽章
    日期: 2018-06-25
    上傳時間: 2018-08-31 14:47:12 (UTC+8)
    出版者: 國立中央大學
    摘要: 本論文為研究消費性網路攝影機之遠端多媒體串流連線時之安全性。一般消費者經常對於網際網路傳輸存在安全性疑慮,而在網路攝影機的遠端連線操作上,也充滿了來自於消費市場各種對於隱私及傳輸安全的質疑與挑戰。在這樣的背景之下,當安全監控系統的使用者帳號遭惡意竊用時,則網路攝影機本身所能提供的安全防護機制,即為消費者最關切的議題之一。本論文首先整理了四個知名的安全監控系統目前的現況與其安全性策略,分析其潛在的安全性問題。為提升網路攝影機遠端連線之安全性,本論文以實務經驗,訂出以有效性、隱密性、操作便利性、驗證效率及衍生成本等五項維度,以質化分析衡量各種身份驗證法。在主觀分析、客觀比較各種方法應用於本研究之優缺點後,歸納得到數位簽章,為最適合應用於網路攝影機,並使得網路攝影機可獨立驗證來訪者身份的機制。而在量化分析上,則模擬數位簽章演算法在網路攝影機運作的情境,以實驗證明其驗證效率無虞。本研究並為公開金鑰的管理,設計一套可行的流程,為保障消費者在使用安全監控系統的隱私權益、及遠端操作網路攝影機時之安全性作出貢獻。;This paper is designed to study the security of remote multimedia streaming connections for IP Camera. The massive consumer often has security concerns about Internet transmissions, and the remote operation of the IP Camera is also full of challenges from the consumer market for privacy and security. In this context, when the user account of the security monitoring system is maliciously used, the security protection mechanism provided by the IP Camera itself is one of the topics most concerned to consumers. This paper first collates the current status and security strategy of the four well-known security monitoring systems and analyzes their potential security issues. In order to improve the security of the remote connection of IP Camera, based on practical experience, this paper sets out five dimensions: effectiveness, confidentiality, ease of operation, verification efficiency, and derivative cost, and uses quality analysis to measure various authentication methods. After subjective analysis and objective comparison of the advantages and disadvantages of various methods applied to this study, digital signatures were summarized, which is the most suitable mechanism for applying in IP Camera and enables IP Camera to independently verify the identity of visitors. On the quantitative analysis, the simulated digital signature algorithm is used in the context of IP Camera operation, and it is proved by experiments that the verification efficiency is flawless. This study also designs a set of feasible processes for the management of public key, which will help consumers protect their privacy rights in using the security monitoring system and the security when remotely operating the IP Camera.
    顯示於類別:[資訊管理研究所] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML155檢視/開啟


    在NCUIR中所有的資料項目都受到原著作權保護.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明