Responsive image
博碩士論文 etd-0726115-181051 詳細資訊
Title page for etd-0726115-181051
論文名稱
Title
偵測IPv6無線感測網路的蟲洞攻擊
Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
51
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2015-08-04
繳交日期
Date of Submission
2015-08-26
關鍵字
Keywords
蟲洞攻擊、無線感測網路、IPv6
IPv6, wireless sensor network, wormhole attack
統計
Statistics
本論文已被瀏覽 5864 次,被下載 131
The thesis/dissertation has been browsed 5864 times, has been downloaded 131 times.
中文摘要
近年來隨著IPv6與物聯網蓬勃發展,無線感測網路成為物聯網最重要部份之一,ZigBee聯盟於2013年發佈IPv6的ZigBee IP規範,將無線感測網路從IPv4升級到IPv6,提升ZigBee網路定址能力等功能,解決無線感測網路IP不足的問題。
然而IPv6無線感測網路中的蟲洞攻擊(Wormhole attacks)問題並沒有被解決。蟲洞攻擊的運作原理是攻擊者偽造路由通告封包,建立蟲洞隧道(Wormhole tunnel),在蟲洞隧道的兩端轉送資料封包,將周圍節點的流量吸入蟲洞隧道,攻擊者便能夠進行攔截、竊聽、竄改、或丟棄封包癱瘓網路等惡意行為,因此後果非常嚴重。
文獻中蟲洞攻擊偵測方法,多半需要藉助GPS等外部硬體設備或系統時間同步的機制才能偵測,需耗費昂貴的成本,而且在部份網路環境偵測率不佳。
本研究提出蟲洞攻擊防禦系統,能防禦IPv6無線感測網路的蟲洞攻擊,特色是依據IPv6無線感測網路的標準路由協定RPL,偵測RPL路由封包判斷蟲洞攻擊,不需要額外的設備或系統輔助。在實驗評估中,以系統模擬的方式做實驗,實驗結果證明本研究之方法,可以有效偵測蟲洞攻擊。
Abstract
Recently, with the development of IPv6 and Internet, wireless sensor network becomes more popular in Internet of thing. ZigBee Alliance announced ZigBee IP specification in 2013, which upgraded the protocol of wireless sensor network from IPv4 to IPv6, and solved the issue of the insufficient IP addresses.
However, IPv6 wireless sensor network still faces wormhole attacks. The Wormhole attacks generate a wormhole tunnel, and cause neighbors to go through it. Which means the attackers can sniff, modify, or drop packets.
There are still some limitations in detecting method of wormhole attack in researches. For example, some researches require GPS support or precise synchronized time in the system.
This paper proposes wormhole detection system. Without any other hardware and system support, our solution analyst packets through RPL standard routing protocol only. We have a good detection rate, according to our experimental results.
目次 Table of Contents
論文審定書 i
誌謝 ii
摘要 iii
目錄 v
圖次 vii
表次 viii
第1章 緒論 1
1.1 研究背景 1
1.2 研究動機與目的 2
第2章 文獻探討 3
2.1 無線感測網路簡介 3
2.2 ZigBee IP網路標準與RPL路由協定 4
2.3 蟲洞攻擊介紹 8
2.4 防禦方法 11
第3章 研究方法 14
3.1 系統架構 14
3.2 蟲洞攻擊偵測系統 15
3.2.1 建立DODAG網路與RPL路由範例 16
3.2.2 out-of-band channel蟲洞攻擊範例 18
3.2.3 蟲洞攻擊偵測模組 20
第4章 系統評估 22
4.1 系統驗證 23
4.1.1 實驗一:系統驗證參數 24
4.1.2 實驗一:系統驗證結果 24
4.2 系統評估 31
4.2.1 系統評估的實驗參數 31
4.2.2 實驗二:評估實驗對照組 33
4.2.3 實驗三:Map size 33
4.2.4 實驗四:良性節點數 34
4.2.5 實驗五:良性節點傳輸距離上限 35
4.2.6 實驗六:Rain fade延遲權重 36
4.2.7 實驗七:蟲洞距離長度 37
4.2.8 實驗二至實驗七的實驗總結 38
第5章 結論與未來展望 40
參考文獻 41
參考文獻 References
[1] ZigBee IP Webinar presentation. Retrieved: Aug. 2015. Available: https://docs.zigbee.org/zigbee-docs/dcn/13/docs-13-0158-00-0mwg-the-new-zigbee-ip-specification-ipv6-control-for-low-power-low-cost-devices-webinar.pdf
[2] S. E. Deering, "Internet protocol, version 6 (IPv6) specification," 1998.
[3] TrendLabs 2013年資訊安全總評. Retrieved: Aug. 2015. Available: http://www.trendmicro.tw/cloud-content/tw/pdfs/about/2013_review.pdf
[4] C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad hoc networks, vol. 1, pp. 293-315, 2003.
[5] X. Chen, K. Makki, K. Yen, and N. Pissinou, "Sensor network security: a survey," Communications Surveys & Tutorials, IEEE, vol. 11, pp. 52-73, 2009.
[6] I. Butun, S. Morgera, and R. Sankar, "A Survey of Intrusion Detection Systems in Wireless Sensor Networks," 2014.
[7] C. E. Caicedo, J. B. Joshi, and S. R. Tuladhar, "IPv6 Security Challenges," IEEE Computer, vol. 42, pp. 36-42, 2009.
[8] F. Barani, "A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system," in Intelligent Systems (ICIS), 2014 Iranian Conference on, 2014, pp. 1-6.
[9] G. Mulligan, "The 6LoWPAN architecture," in Proceedings of the 4th workshop on Embedded networked sensors, 2007, pp. 78-82.
[10] X. Ma and W. Luo, "The analysis of 6LoWPAN technology," in 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008, pp. 963-966.
[11] T. Winter, "RPL: IPv6 routing protocol for low-power and lossy networks," RFC 6550, 2012.
[12] J. Vasseur, "Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks," RFC 6551, 2012.
[13] P. Thubert, "Objective function zero for the routing protocol for low-power and lossy networks (RPL)," 2012.
[14] B. Warneke, M. Last, B. Liebowitz, and K. S. J. Pister, "Smart Dust: communicating with a cubic-millimeter computer," Computer, vol. 34, pp. 44-51, 2001.
[15] I. F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," Communications Magazine, IEEE, vol. 40, pp. 102-114, 2002.
[16] Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. Mccann, and K. Leung, "A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities," Wireless Communications, IEEE, vol. 20, pp. 91-98, 2013.
[17] L. Wallgren, S. Raza, and T. Voigt, "Routing Attacks and Countermeasures in the RPL-Based Internet of Things," International Journal of Distributed Sensor Networks, vol. 2013, p. 11, 2013.
[18] T. I. C. W. Attacks, "A Full Image of the Wormhole Attacks," 2009.
[19] H. Yih-Chun, A. Perrig, and D. B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, 2003, pp. 1976-1986 vol.3.
[20] I. Khalil, S. Bagchi, and N. B. Shroff, "LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks," in Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on, 2005, pp. 612-621.
[21] I. Khalil, S. Bagchi, and N. B. Shroff, "MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks," Ad Hoc Networks, vol. 6, pp. 344-362, 2008.
[22] C. Sun, K. Doo-Young, L. Do-hyeon, and J. Jae-il, "WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks," in Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC '08. IEEE International Conference on, 2008, pp. 343-348.
[23] G. Lee, J. Seo, and D.-k. Kim, "An approach to mitigate wormhole attack in wireless ad hoc networks," in Information Security and Assurance, 2008. ISA 2008. International Conference on, 2008, pp. 220-225.
[24] E. Rescorla, "Diffie-Hellman key agreement method," 1999.
[25] F. Khan, T. Shon, T. Lee, and K. Kim, "Wormhole attack prevention mechanism for RPL based LLN network," in Ubiquitous and Future Networks (ICUFN), 2013 Fifth International Conference on, 2013, pp. 149-154.
[26] T. Reusing, "Comparison of operating systems tinyos and contiki," Sens. Nodes-Operation, Netw. Appli.(SN), vol. 7, 2012.
[27] M. Junker, R. Hoch, and A. Dengel, "On the evaluation of document analysis components by recall, precision, and accuracy," in Document Analysis and Recognition, 1999. ICDAR'99. Proceedings of the Fifth International Conference on, 1999, pp. 713-716.
[28] M. M. van de Kamp, "Statistical analysis of rain fade slope," Antennas and Propagation, IEEE Transactions on, vol. 51, pp. 1750-1759, 2003.
[29] Rain fade - Wikipedia. Retrieved: Aug. 2015. Available: https://en.wikipedia.org/wiki/Rain_fade
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code