摘要: | 農業所提供的糧食是人們賴以維生的基礎,但因對於環境過度的開發導致全球環境變化,而最直接受到氣候變遷的影響即是農業,為了降低極端氣候所造成的衝擊與提升農作物的產量,促使整合物聯網技術的智慧農業迅速崛起。低功耗廣域網路的興起主要是為了滿足大規模物聯網的市場需求,其特性主要為低傳輸速率、低裝置功耗以及擁有遠距離傳輸的能力,但也因在電池壽命與資訊傳輸上有所限制,使遠端更新技術難以實現於低功耗廣域網路中。 本研究基於LoRaWAN網路架構並將GVM整合至終端節點的系統中,並搭配由GPP所產生的編碼表以遠端更新裝置的執行流程,藉此達到物聯網應用的快速開發。在實驗分析中將編碼表與傳送韌體的更新方式進行比較,傳輸時間方面能夠減少約133秒的時間,而在耗電量上則能夠節省約0.4mAh的消耗。由於物聯網裝置最容易受到安全威脅的即是更新過程,在更新前驗證訊息的完整性並只接受來自受信任的發送者所傳送的資料是非常重要的,因此在系統中額外定義一組GPP密鑰,用以將更新資料加密並也用作於產生訊息認證碼,使終端節點能藉由認證碼檢驗資料的完整性,且因認證碼是由密鑰所產生,也能用以確認發送者身份的合法性,因此將加密與驗證機制導入更新系統中,以加強更新資料於傳輸時的安全性,從而降低更新時的風險。;The food provided by agriculture is the basis of people′s livelihood. However, overexploitation of natural resources has led to global environmental change, and the most directly affected by climate change is agriculture. To reduce the impact of extreme climate and increase the yield of crops, thus promoting the rapid development of smart agriculture using IoT technology. The rise of LPWAN is mainly to satisfy the market demand for large scale IoT, which is characterized by low transmission rate, low power consumption and long-range communications. But because of the limitations on transmission and the requirement for devices with a long battery life, so the FUOTA feature is difficult to implement in LPWAN. This study is based on the LoRaWAN network architecture and integrates GRAFCET virtual machine into the system of end-node devices, with the coding table generated by GPP to remotely update the execution process of the device, thus achieving rapid development of IoT applications. In the analysis, comparing the update method of the coding table and the transmission firmware, the transmission time can be reduced by about 133 seconds, and the power consumption can be saved by about 0.4 mAh. Since the most vulnerable part of an IoT device is the update procedure, it is critical to verify the integrity of the message before updating and only accept the data from trusted senders. Therefore, an additional GPP key is defined in the system to encrypt the update data and is used to generate message authentication code, so that the end node can verify the integrity of the data with authentication code. Moreover, since the authentication code is generated from the key, it can be used to confirm the identity of the sender′s legitimacy. Consequently, encryption and authentication mechanisms are integrated into the update system to enhance the security of update data during transmission, thereby reducing the risk of the update procedure. |