Responsive image
博碩士論文 etd-0717107-163129 詳細資訊
Title page for etd-0717107-163129
論文名稱
Title
無線感測器網路連結性之改善方法
Connectivity improvement scheme in wireless sensor network
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
43
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2007-06-29
繳交日期
Date of Submission
2007-07-17
關鍵字
Keywords
連結性、鬆散環境、無線感測器網路、安全
wireless sensor network, loose environment, connectivity, security
統計
Statistics
本論文已被瀏覽 5725 次,被下載 1613
The thesis/dissertation has been browsed 5725 times, has been downloaded 1613 times.
中文摘要
安全在現在無線感測器網路(WSN, wireless senor networks)環境底下一直是眾所討論的議題之一,由於WSN本身獨特資源限制,讓WSN安全上必須額外考量計算能力、儲存空間容量、無線通訊特性、有限電池電源…等,隨機金鑰預配(RKP, random key pre-distribution)即是為了實現在WSN上安全通訊而發展的金鑰分配中的一環,RKP的特徵在於兩個獨立的節點必須至少有一個共同的預設金鑰才能構成對稱金鑰(pair-wise key)進而進行安全通訊,然而節點分佈若處於鬆散的環境上,由於平均節點度數下降,鄰居數較低,整體網路的連結性會隨著RKP不容易建立對稱金鑰的關係而下降,本論文將以提升鬆散環境下整體網路連結性為出發點,延伸原本只考量單跳鄰居資訊的RKP-DE,從雙跳鄰居資訊的觀點,將RKP-DE流程反向、提出RKP-DEinverse,再合併RKP-DE和RKP-DEinverse,成為新的方法RKP-DEtwo_hop,試著證明並實驗我們可以有效提升整體網路的連結性。
Abstract
Under the current environment of Wireless Senor Networks (WSN), security is always one of the topics that everyone discussed about. Because of the limitations of WSN’s unique resource, this results in the security of WSN needs to especially consider the calculating ability, memory capacity, characteristics of wireless communication, limited battery power supply, etc. Random key pre-distribution (RKP) is the one of the key distribution that is developed for the sake of safe communication of WSN, the characteristic of RKP is that there must have at least one common pre-distributed key in the two independent nodes in order to compose a pair-wise key, so that the safe communication can be carried out. However, if the nodes are distributed in the loose environment, the numbers of neighbors would be lower due to the decrease of average node degree. Then the connectivity of the entire network would decrease because it is not easy for the RKP to establish the pair-wise key. This paper would set the improvement of the entire network’s connectivity under the loose environment as the starting point to extend the RKP-DE that only considers one-hop neighbor information, and reverse the flow path of RKP-DE and propose RKP- DEinverse from the viewpoint of two-hop neighbor information. Then RKP-DE and RKP- DEinverse are merged and become a new method – RKP- DEtwo_hop, so as to try to prove that we can raise the connectivity of the whole network effectively.
目次 Table of Contents
Page i. 中文摘要
Page ii. Abstract
Page iii. Content
Page v. List of Figures
Page vi. List of Table
Page 1. Chapter 1 Introduction
Page 1. 1-1 Background
Page 2. 1-2 Key Agreement
Page 3. 1-3 Motivation
Page 7. Chapter 2 Relative Works
Page 7. 2-1 Random key pre-distribution and
Q-composite
Page 7. 2-2 Random key distribution –decoupling
Page 8. 2-2-1 Network decoupling
Page 9. 2-2-2 Design of RKP-DE
Page 10. 2-2-3 Dependency Elimination
Page 11. Chapter 3 Design of our scheme
Page 11. 3-1 RKP-DEinverse
Page 13. 3-2 The Relationship between RKP-DE and
RKP-DEinverse
Page 14. 3-3 RKP-DEtwo_hop
Page 15. 3-4 Performance Analysis
Page 16. 3-4-1 Probability formula
Page 17. 3-4-2 Derivation of the formula
Page 21.Chapter 4 Simulation and Result Analysis
Page 21. 4-1 Definition
Page 22. 4-2 Sensitivity of connectivity to node number
Page 26. 4-3 Sensitivity of connectivity to key chain size
Page 30.Chapter 5 Conclusion and Future work
Page 31.Reference
參考文獻 References
[1]Chris Karlof and David Wagner, “Secure Routing in Wireless Sensor Networks: Attack and Countermeasures”. Proceedings of First IEEE International Workshop on Sensor Network Protocols and Applications.2003: pp.113-127.
[2]Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz and Aram Khalili, “A pairwise key predistribution scheme for wireless sensor networks,” ACM Transactions on Information and System Security (TISSEC), vol 8, issue 2, pp. 228-258. May 2005.
[3]B. C. Neuman and T. Tso, “Kerberos: An authentication service for computer networks,” IEEE Communication, vol. 32, no. 9, pp. 33-38, September 1994.
[4]W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, pp. 664-654, November 1976.
[5]R. L. Rivest, A. Shamir, and L. M. Adleman, “A method for obtaining digital signatures and public-key crytosystems,” Communication for ACM, vol. 21, no. 2, pp. 120-126, 1978.
[6]Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan, “ Network Decoupling for Secure Communication in Wireless Sensor Networks,” Quality of Service, 2006. IWQoS 2006. 14th IEEE International Workshop on June 2006, pp.189 – 198.
[7]Laurent Eschenauer and Virgil D. Gligor ” A key-management scheme for distributed sensor networks, ” Proceedings of the 9th ACM conference on Computer and communications security, Nov. 2002, pp.41 - 47.
[8]H. Chan, A. Perrig, and D. song,”Random key predistribution schemes for sensor network,” in Proceedings of IEEE Symposium on Research in Security and Privacy, Symp, May 2003, pp. 197 – 213.
[9]A. Wacker, M. Knoll, T. Heiber, and K. Rothermel, ”A new approach for establishing pair-wise keys for securing wireless sensor networks,” in Proceedings of the 3rd ACM Conference on Embedded Networked Sensor System(Sensys), Nov. 2005.
[10]S. Zhu, S. Xu, S. Setia, and S. Jajodia, “Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach, ” in Proceedings of the 11th IEEE International Conference on Network Protocols(ICNP), Nov 2003.
[11]E. Ertin, A. Arora, R. Ramnath, and M. Nesterenko, “Kansei: A testbed for sensing at scale,” in Proceedings of the 4th Symposium on Information Processing in Sensor Networks (IPSN/SPOTS track), April 2006.
[12]D. Liu, P. Ning, and W. Du, “Group-based key pre-distribution in wireless sensor networks,” in Proceedings of ACM Workshop on Wireless Security (WiSe), September 2005.
[13]A. Wacker, M. Knoll, T. Heiber, and K. Rothermel, “A new approach for establishing pairwise keys for securing wireless sensor networks,” in Proceedings of the 3rd ACM Conference on Embedded Networked Sensor Systems (Sensys), November 2005.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內校外完全公開 unrestricted
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code