帳號:guest(18.221.41.214)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者:林定儒
作者(英文):Ting-Ju Lin
論文名稱:植基於雜湊鏈的無線感測網路金鑰分配機制
論文名稱(英文):Hash Chain Based Key Pre-distribution Wireless Sensor network
指導教授:楊慶隆
指導教授(英文):Ching-Nung Yang
口試委員:郭文中
張道顧
口試委員(英文):Wen-Chung Kuo
Tao-Ku Chang
學位類別:碩士
校院名稱:國立東華大學
系所名稱:資訊工程學系
學號:610621230
出版年(民國):108
畢業學年度:108
語文別:中文
論文頁數:31
關鍵詞:無線感測網路成對金鑰分配機制金鑰預分配機制感測點被捕獲攻擊雜湊鏈
關鍵詞(英文):Wireless sensor networkPairwise key distribution schemeKey pre-distributionCaptured sensor node attackHash chain
相關次數:
  • 推薦推薦:0
  • 點閱點閱:12
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:10
  • 收藏收藏:0
無線感測網路 (Wireless Sensor Network; WSN) 是透過無線通信技術,廣泛地建置感測點來做數據的收集、分析、與整合。WSN已經在軍事、工業、和消費等做了廣泛的應用。例如,智慧城市、智能環保與安全、家庭自動化、和健康醫療等領域。由於大量的使用WSN,因此安全性是一個非常重要的議題。為確保WSN的全通信,就需要一個有效率的金鑰分配與管理機制。一般而言,無線感測網路的金鑰分配有兩大類。第一種是成對的金鑰分配。任兩個感測點共享一把金鑰,以得到安全連線。藉由兩兩感測點的安全連線,在無線感測網路內建立一條至匯聚節的安全通道。最終將無線感測網路所收集的資訊,安全地回送至後端的資料庫。另外一種金鑰分配是群體金鑰分享機制,WSN的任一群體共享一把金鑰,以讓群體成員可以用這把金鑰作安全的群體會議通訊。
本論文是關於成對金鑰分配,研究WSN的金鑰預分配 (Key Pre-distribution; KP) 問題。直至目前為止,成對金鑰分配的文獻已有很多,研究者們提出了各種方案以提高安全的連通率,並同時增強網絡抵抗感測點被捕獲的問題。因為攻擊者在捕獲無線感測點時,可能會危及其他安全通道。最近,Bechkit 等人提出了植基於雜湊鏈 (Hash Chain) 的 KP(HCKP)q-composite的成對金鑰分配機制,增強了網絡抵抗無線感測點被捕獲的攻擊。 但是,Bechkit 等人的 HCKP q-composite方案需執行太多的雜湊運算 (註: 所謂的q-composite就是兩個感測器需q把金鑰才能建立安全通訊)。當 q值大時,計算量會更大。本文主要是改善Bechkit 等人的HCKP q-composite金鑰預分配機制,以減少其雜湊運算量,但是仍有相同抵抗無線感測點被捕獲的攻擊能力。
Wireless Sensor Network (WSN) based on wireless communication technology deploy sensor nodes for data collection, analysis, and integration. The WSN has already been widely used in military, industrial, and commercial areas, e.g., smart cities, smart environment, home automation, and e-health care. Because of widespread using WSN, security is a very important issue. To ensure a secure communication, an efficient key distribution and management scheme in WSN is necessarily required. Generally speaking, there are two major categories of key distribution for WSN. The first type is pairwise key distribution, in which a secret key may be shared by every two sensor nodes to establish a secure link. A secure channel to a sink node is established via pairwise secure links. Finally, the information gathered from sensor nodes in WSN is securely sent back to back-end database. Another type of key distribution in WSN is group key distribution scheme, in which any group of WSN may share a conference key, such that group members can use it for secure group communication.
This thesis deals with pairwise key distribution, especially is dedicated on studying on the key pre-distribution (KP) in WSN. Up to dated, there have been many literatures on key distribution, and provide a variety of solutions to improve secure connectivity and at the same time to enhance the resistance of the so-called captured sensor node attack. Attacker compromise wireless sensor nodes, and may eavesdrop other links in WSN. Recently, Bechkit et al. proposed a pairwise key distribution scheme based on hash chain (HC), referred to as HCKP q-composite scheme (note: the q-composite scheme means every two nodes need q keys for establishing a secure link), to enhance the resistance ability against the capture-node attack. However, Bechkit et al.’s HCKP q-composite scheme have to apply many hash operations, and this will be more serious for large q. In this thesis, we enhance Bechkit et al.’s scheme to reduce hash operations, and meanwhile still has the same ability to resist the capture-node attack.
第一章 介紹 1
1.1 背景 1
1.2 文章貢獻 9
1.3 文章組織 10

第二章 先前工作 11
2.1 單向雜湊鏈 11
2.2 Bechkit's HCKP q-composite方法 11

第三章 HCKP q-composite方法 15
3.1 HCKP q-composite方法 15
3.2 g+h方法 17

第四章 安全分析 21
4.1 安全分析 21

第五章 結論與未來工作 25
[AUMA09] J.P. Aumasson, W. Meier, and F. Mendel, “Preimage attacks on 3-Pass HAVAL and step-reduced MD5,” in Proc. Of the 15th Workshop on Selected Areas in Cryptography, pp. 120-135, 2009.
[BECH13] W. Bechkit, Y.Challal, and A. Bouabdallah, “A new class of hash-chain based key pre-distribution scheme for WSN,” Computer Communications, Vol. 36, pp. 243-255, 2013
[CHAN03]H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in Proc. IEEE Symp. Secur. Privacy (SP), pp. 197- 213, 2003.
[CHEI16] O. Cheikhrouhou, “Secure group communication in wireless sensor net- works: a survey,” Journal of Network and Computer Applications, pp. 115-132, 2016.
[CAST17] A. Castiglion, P. D’Arco, A.D. Santis, R. Russo, “Secure group communication scheme for dynamic heterogeneous distributed computing,” Future Generation Computer System, pp. 313-324, 2017
[CHEN17] Y.R. Chen and W.G. Tzeng, “Group key management with efficient rekey mechanism: a semi-stateful approach for out-of-synchronized members,” Computer Communications, Vol. 98, pp. 31-42, 2017..
[DINI15] G. Dini and L. Lopriore, “Distributed storage protection in wireless sensor networks,” Journal of System Architecture, Vol. 61 pp. 256-266, 2015.
[GAND17] F. Gandino, R. Ferrero, and M. Rebaudengo, “A key distribution scheme for mobile wireless sensor networks: q-s-Composite,” IEEE Transaction on Information Forensics and Security, Vol. 12, pp. 34-47 2017
[HU05] Y.C. Hu, M. Jakobsson, and A. Perrig, “Efficient constructions for one- way hash chains,” in Proc. Of 3rd international conf. on Applied Cryptography and Network Security, pp.423-441, 2005.
[HARN15] L. Harn and C.F. Hsu, “Predistribution scheme for establishing group keys in Wireless sensor networks,” IEEE Sensor Journal, Vol. 15, pp. 5103- 5108, 2015.
[KHAN12] E. Khan, E. Gabidulin, B. Honary, and H. Ahmed, “Matrix-based memory efficient symmetric key generation and pre-distribution scheme for wire- less sensor network,” IET Wireless Sensor Syst., Vol.2, pp.708-114 2012.
[KLON17] M. Klonowski, P. Syga, “Enhancing privacy for ad hoc systems with pre- deployment key distribution,” Ad Hoc Networks, pp. 35-47, 2017.
[LIN10] Y.Y. LIN, R.Z. Wang. Scalable secret image sharing with smaller shadow images. IEEE Signal Process Lett 2010;17(3):316–19.
[LIN07] S.J Lin, J.C Lin. VCPSS: a two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recognit 2007;40(12):3652–66.
[LI13] P Li, C.N Yang, C.C Wang, Q. Kong, Ma Y. Essential secret image sharing scheme with different importance of shadows. J Vis Commun Image Represent 2013;24(7):1106–14.
[LEVI17] A. Levi, S. Sarimurat, “Utilizing hash graphs for key distribution for mobile and replaceable interconnected sensor in IOT context,” Ad Hoc Net- works, pp. 3-8, 2017.
[LI13] F. Li and P. Xiong. “Practical secure communication for integrating wire- less sensor networks into Internet of Things,” IEEE Sensor J. , Vol. 13, pp. 3677-3684, 2013.
[LOUW17] J. Louw, G. Nienzen, T.D. Ramotsoela, A.M. Abu-Mahfouz, “A Key Distribution Scheme using Elliptic Curve Cryptography in Wireless Sensor Networks,” 2016 IEEE 14th International Conference on Industrial Infor- mation(INDIN) pp. 1166-1170, 2017.
[MAGA14] A.A. Magar, “A Survey about Key Pre-distribution Scheme in Wireless Sensor Networks,” International Journal of Engineering Research and General Science, Vol2, pp.423-429, 2014.
[MESS14] M.L. Messai, H. Seba, “A survey of key management schemes in multi- phase wireless sensor networks,” Computer Networks, pp. 60-74, 2016.
[MEHM17] A. Mehmood, M. M. Umar, and H. Song, “ICMDS: Secure inter-cluster multiple –key distribution scheme for wireless sensor networks,” Ad Hoc Networks, vol. 55, pp. 97-106, 2017
[RASH11] A. Rasheed and R.N. Mahapatra, “Key predistribution schemes for establishing pairwise keys with a mobile sink in sensor networks,” IEEE Trans. Parallel Distrib. Syst., Vol. 22, pp. pp. 176-184, 2011.
[SARA17] R.V. Saraswathi, L.P. Sree, K. Anuradha, “Dynamic and probabilistic key management for distributed wireless sensor networks,”.2016 IEEE Inter- national Conference on Computational Intelligence and Computing Re- search (ICCIC), 2017.
[YANG07] C. Yang, T. Chen, K. Yu, C. Wang. Improvements of image sharing with steganography and authentication. Journal of Systems and Software 2007;80(7):1070–6. ISSN 0164-1212
[YANG10] C.N. Yang, C.B. Ciou. Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis Comput 2010;28(12):1600–10.
[YANG11] C.N. Yang, Y.Y. Chou. A general scalable secret image sharing scheme with the smooth scalability. J Syst Softw 2011;84(10):1726–33.
[YANG12] C.N. Yang,J.F. Ouyang, L. Harn. Steganography and authentication in image sharing without parity bits. Opt Commun 2012;285(7):1725–35.
[YAVU15] F. Yavuz, J. Zhao, O. Yağan, and V. Gilgor, “Designing secure and reliable wireless sensor networks under a pairwise key predistribution scheme,” 2015 IEEE International Conference on Communications (ICC), pp.6277-6283, 2015
[YAGA16] O. Yagan, A.M. Makowski, “Wireless sensor networks under the random pairwise key predistribution scheme can resiliency be achieved with small key rings,” IEEE/ACM transaction on networking, Vol. 24, pp.3383-3396, 2016.
[YANG17] C.N. Yang, J.M. Li, and Y.S. Chou, “On the analysis of k-secure t-conference key distribution scheme,” ICCNS 2017 Proceedings of the 2017 the 7th International Conference on Communication and Network Security, pp.91-95 2017.
[YEIN17] A.D. Yein, C.H. Lin, W.S. Hsieh, “A secure mutual trust scheme for wire- less sensor networks,” 2017 IEEE 26th International Symposium on Indus- trial Electronics (ISIE), pp. 1369-1375, 2017.
[YAN19] X. Yan, L. Liu, Y. Lu, Q. Gong Security analysis and classification of image secret sharing. J Inf Secur Appl 2019; 47:208–16.
[ZHAO09] R. Zhao, J. Zhao, F. Dai, F. Zhao. A new image secret sharing scheme to identify cheaters. Computer Standards & Interfaces 2009;31(1):252–7. ISSN 0920-5489
[ZHAO14] J. Zhao, O. Yagan, V. Gligor, “On topological properties of wireless sensor networks under q-composite key pre-distribution scheme with on/off channels,” 2014 IEEE International Symposium on Information Theory, pp.1131-1135, 2014.
[ZHAO17] J. Zhao, “Topological properties of secure wireless sensor networks under q-composite key pre-distribution scheme with unreliable links,” IEEE/ACM transactions on networking, Vol. 25, pp. 3383-3396, 2016.
[ZHAN17] F. Zhan, N. Yao, Z. Gao, G. Tan, “A novel key generation method for wire- less sensor networks based on system of equations,” Journal of Network and Computer Applications, pp. 114-127, 2017.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *