Responsive image
博碩士論文 etd-0715108-220700 詳細資訊
Title page for etd-0715108-220700
論文名稱
Title
無線感測網路改良式廣播認證機制之研究
The Improved Broadcast Authentication Schemes in Wireless Sensor Networks
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
70
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2008-06-26
繳交日期
Date of Submission
2008-07-15
關鍵字
Keywords
安全、無線感測器網路、廣播認證機制
Broadcast Authentication Scheme, Security, Wireless Sensor Network
統計
Statistics
本論文已被瀏覽 5701 次,被下載 0
The thesis/dissertation has been browsed 5701 times, has been downloaded 0 times.
中文摘要
在無線感測器網路的環境中,當某個節點想要傳送訊息給另一個節點時,最自然的方式就是用廣播的方法將訊息傳播至整個網路。換句話說,只要一個節點傳送訊息給另外一個節點,它的鄰居節點也都可以收到此訊息。用廣播的優點在於可以很有效率地將資料一次傳送給很多的接收者。相反地,它會造成一些缺點。感測器網路有可能會佈放在敵軍的區域,而且很有可能會遭受到惡意的攻擊。這些所謂的惡意攻擊是攻擊者可以先散播一些不實的訊息給它的鄰居節點後,再藉由這些鄰居節點繼續傳播下去,直到整個網路都收到錯誤訊息。由此可知,如果節點想使用廣播來傳送訊息,但訊息上卻沒有任何用來做認證的機制的話,則每個人都可以冒充為傳送者來傳送不實的訊息。我們稱此種攻擊為「封包注入攻擊」。所以在廣播網路中,安全是一項主要的挑戰。為了可以讓接收者去驗證一個廣播訊息,每個訊息必須符合兩個條件。第一,接收者必須確定資料是從合法的來源端傳送過來的。第二,資料在傳送過程中沒有被竄改過。TESLA在之前已經被提出來使用在感測器網路上,它主要是用時間同步和延遲公佈金鑰的方式來保護加密訊息的金鑰。然而,TESLA這機制仍然有一些缺點,所以在本篇論文我們會提出一些方式來修改TESLA,且我們將證明修改後的機制所得到的效能會比原本的TESLA還要好。
Abstract
In the environment of wireless sensor network, while one node want to send a message to another node, the most natural way is used broadcasting to distribute the message to the whole network. In the other words, as long as one node sends messages to the other node, its neighbor nodes can also listen to these messages, and then receive them. The advantage of broadcast networks is that can efficiently distribute data to multiple receivers. However, it has some drawbacks. A sensor network may be deployed in hostile environment where there are malicious attacks. The malicious attacker can send false messages to his neighbor nodes, and then rely on these neighbor nodes to distribute over the network. So if there are not any schemes of the security authentication in the message when a node wants to use broadcast, everyone can impersonate the sender and broadcast false messages. We call this a packet injection attack. So security is a main challenge in broadcast network. In order to authenticate a broadcast message,it would conform to two conditions. First, insure that the data is transmitted from the claimed source. Second, the messages are not be modified en route. TESLA has been proposed to provide such services for sensor networks,it mainly use time synchronization and delay disclosure key to protect encryption key。However, this scheme still has some drawbacks, so we propose some schemes to modify TESLA in this paper, and we will show these schemes can achieve better performance than previous ones.
目次 Table of Contents
中文摘要 i
Abstract ii
List of Figures iii
Chapter 1 Introduction 1
1-1 Wireless Sensor Network 1
1-2 The Limited Resource of Sensor 3
1-3 The conception of Network Security 4
1-3-1 Taxonomy of Attack 5
1-3-2 Key Cryptography 8
1-4 The Security of wireless sensor network 12
Chapter 2 Related Works 13
2-1 TESLA 13
2-1-1 Background 14
2-1-1-1 One-Way Hash Chain 14
2-1-1-2 Loose Time Synchronization 17
2-1-2 Sketch of TESLA protocol 19
2-1-3 Advantage of TESLA protocol 21
2-1-4 Drawback of TESLA protocol 222-2
μTESLA protocol 23
2-2-1 Advantage of μTESLA 24
2-2-2 Drawbacks of μTESLA 25
2-3 Hashing Chain 26
2-3-1 Advantage of Hashing Chain 27
2-3-2 Drawbacks of Hashing Chain 28
2-4 Lightweight One-time Signature 28
2-4-1 Background 28
2-4-2 Merkle Tree 29
2-4-3 Authentication of Receivers 31
2-4-4 Authentication Path of Merkle Tree 33
2-4-5 Advantage of Lightweight One-time Signature 34
2-4-6 Drawback of Lightweight One-time Signature 34
Chapter 3 Proposed Schemes 35
3-1 Proposed Scheme-1 35
3-1-1 Advantage of Proposed Scheme-1 39
3-1-2 Drawback of Proposed Scheme-1 40
3-2 Proposed Scheme-2 42
3-2-1 Advantage of Proposed Scheme-2 46
3-3 Proposed Scheme-3 48
3-3-1 Advantage of Proposed Scheme-3 52
3-4 Proposed Scheme-4 54
3-4-1 Drawbacks of Proposed Scheme-4 58
Chapter 4 Conclusion 60
Reference 61
參考文獻 References
[1] A. Perrig, R. Canetti, J. D. Tygar, and D. Song, “The TESLA broadcast authentication protocol,” RSA CryptoBytes, 5(Summer), 2002.

[2] R. Merkle, “Protocols for public key cryptosystems,” in Proceedings of the IEEE Symposium on Research in Security and Privacy, pp 122–134, April 1980.

[3] R. Merkle, “A digital signature based on a conventional encryption function,” Advances in Cryptology — CRYPTO 87, pp 369–378, 1988.

[4] R. Merkle, “A certified digital signature,” Advances in Cryptology — CRYPTO ’89, ps 218–238, 1990.

[5] R. Merkle, ”Protocols for public key cryptosystems,” in Proceedings of the IEEE Symposium on Research in Security and Privacy, pp 122–134, April 1980.

[6] R. Merkle, “A digital signature based on a conventional encryption function,” Advances in Cryptology — CRYPTO’87, pp 369–378, 1988.

[7] R. Merkle, ”A certified digital signature,” Advances in Cryptology — CRYPTO ’89, pp 218–238, 1990.

[8] Perrig, Adrian, Ran Canetti, Dawn Song, and Doug Tygar, “The TESLA Broadcast Authentication Protocol," in RSA Cryptobytes, Summer 2002.

[9] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, “SPIN: Security Protocol for Sensor Networks,” in Proceedings of ACM conference on Mobile Computing and Networking (MobiCom), pp. 189-199, Rome, Italy, July 2001

[10] Thomas Hardjono, Laksminiath R. Dondeti, “Multicast and Group Security,” Artech House Inc, 2003

[11] Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming Hsieh "An efficient broadcast authentication scheme in wireless sensor networks," in Proceedings of the 2006 ACM Symposium on Information, computer and communications security.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內校外均不公開 not available
開放時間 Available:
校內 Campus:永不公開 not available
校外 Off-campus:永不公開 not available

您的 IP(校外) 位址是 54.225.24.249
論文開放下載的時間是 校外不公開

Your IP address is 54.225.24.249
This thesis will be available to you on Indicate off-campus access is not available.

紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code