博碩士論文 102522039 完整後設資料紀錄

DC 欄位 語言
DC.contributor資訊工程學系zh_TW
DC.creator洪捷zh_TW
DC.creatorChieh Hongen_US
dc.date.accessioned2016-1-22T07:39:07Z
dc.date.available2016-1-22T07:39:07Z
dc.date.issued2016
dc.identifier.urihttp://ir.lib.ncu.edu.tw:88/thesis/view_etd.asp?URN=102522039
dc.contributor.department資訊工程學系zh_TW
DC.description國立中央大學zh_TW
DC.descriptionNational Central Universityen_US
dc.description.abstract近年來,無線感測網路的應用日益廣泛,舉凡生活防災到安全議題上都可以看見其蹤跡。但也由於無線感測網路通常都建置在開放式或無人監控的環境之下,使得攻擊者可以很容易取得其中的感測器並將惡意程式碼植入其中,藉此傳遞不正確的資料讓使用者做出錯誤的決策或分析。 有學者提出使用遠端認證 (Remote Attestation) 的方式讓基地台驗證感測器的完整性,以確認其是否遭受破壞。許多相關論文在分析無線感測網路安全性時只著重分析基地台與單個感測器間的情況,但是無線感測網路通常都是一個基地台管理大量的感測器。根據我們的分析發現,使用一對一的完整性驗證協定並無法保證一對多的應用情況下仍然安全。 在本論文中,我們首先提出一種名為『節點恢復』(Node Recovery) 之新型式攻擊,並以這個新攻擊為觀點去分析一些現存一對多感測器完整性驗證對策的缺陷。最後,我們提出一項機率式的一對多型式之感測器完整性驗證協定,其不僅可以抵禦前述節點恢復攻擊,並能有效率的進行整體無線感測網路完整性驗證。zh_TW
dc.description.abstractWireless Sensor Networks (WSNs) have been increasingly developed in many mission-critical applications, such as military and healthcare monitoring systems. Sensor nodes are usually equipped with limited computational resources and become attractive target for various security risks, one of which is malicious code injection attack. An attacker can alter the internal memory state of a sensor node; the compromised nodes can violate the safety and privacy of the users and send foraged data to a base station. Therefore, a mechanism for verifying the trustworthiness of the sensor nodes is highly desirable. Many researchers have proposed several methods to check the integrity of the sensor nodes in WSNs. Remote attestation is a common promising protection mechanism used for verifying the integrity of a sensor node′s memory state. The remote attestation is based on challenge-response technique. A verifier can attest the sensor node′s integrity by verifying a cryptographic checksum of the node′s memory state. However, most remote attestation schemes are suitable only for the one-hop communication between the verifier and the prover. This research first identifies a new attack model, namely node recovery attack, which enables an attacker to recover a compromised sensor node; consequently, the verifier is convinced that the recovered node is not compromised. We analyze various countermeasures applied in two WSN architectures and show that these countermeasures are subject to the node recovery attack. A probabilistic remote attestation scheme is proposed to resist the node recovery attack.en_US
DC.subject無線感測網路zh_TW
DC.subject遠端認證zh_TW
DC.subject完整性zh_TW
DC.subjectWSNen_US
DC.subjectRemote Attestationen_US
DC.subjectIntegrityen_US
DC.title叢集無線感測網路之機率式遠端認證協定zh_TW
dc.language.isozh-TWzh-TW
DC.titleProbablistic Remote Attestation for Cluster-based WSNen_US
DC.type博碩士論文zh_TW
DC.typethesisen_US
DC.publisherNational Central Universityen_US

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明