簡易檢索 / 詳目顯示

研究生: 鄭理介
Li-Chieh Cheng
論文名稱: 基於時脈偏移的可攜式裝置識別技術
Clock Skew Based Identification Technology for Mobile Devices
指導教授: 鄧惟中
Wei-Chung Teng
口試委員: 鮑興國
Hsing-Kuo Pao
陳秋華
Chyouhwa Chen
金台齡
Tai-Lin Chin
鄭欣明
Shin-Ming Cheng
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2013
畢業學年度: 101
語文別: 中文
論文頁數: 126
中文關鍵詞: 時脈偏移識別可攜式裝置
外文關鍵詞: clock skew, identification, mobile devices
相關次數: 點閱:213下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 本研究利用時脈偏移裝置識別技術,針對可攜式裝置進行多種類型變數的實驗,以便求得量測足夠精確度之時脈偏移所需之最短時間。在本研究中,客戶端裝置與伺服器連接後,由客戶端多次傳送時間戳記,而伺服器利用已收集的時間戳記來計算客戶端裝置相對於伺服器的時脈偏移值。
    本研究依據過去的相關研究選取了線性迴歸、快速分段取最小值與線性規劃三種演算法來估算偏移值,並比較三種結果在穩定性、雜訊影響度、受離群值影響程度等方面之優劣。在前置研究中,首先探討了硬體規格與震盪頻率對時脈偏移的估算會不會有所影響;其次利用封包遺失率、標準差以及收送兩端裝置的封包間隔比來鑑別單一實驗結果是否有足夠的代表性;第三點驗證中位數比平均值與縮減平均值更適合做為每個實驗的代表性時脈偏移值;最後說明在不同作業系統中各選定的時間估算函數有何差異。
    經由前置研究的結果,主體研究部分設計出在可攜式裝置上,值得去分析的四個變數:擷取的封包數量、封包間隔時間、網路類型與各自搭配相異作業系統的裝置。透過分析實驗結果,可得知封包數量越多估算越準、封包間隔時間越長估算越穩定、WiFi比3G網路在估算上穩定、搭載不同作業系統的裝置需要對不同的變數有所調整才能有較高的精確度等事實。整體來說,無論在WiFi或3G環境下使用任何一種可攜式裝置,若在至少500毫秒之封包間隔收集5000個封包,則有98%以上的機率估算出來的時脈偏移其誤差在0.7ppm~1ppm之間。


    In this study, we conducted experiments on different kinds of mobile devices, with each a set of 10 different configurations was applied and tested, to find out the minimum time to measure clock skews of enough precision so as to identify mobile devices via network connections. Clock skews of these mobile devices, or the clients, was measured by the server which has collected thousands of timestamps from the clients.
    Three algorithms including linear regression method (LRM), quick piecewise minimum (QPM), and linear programming method (LPM) were compared by their performance on stability, noise effect, and vulnerability to outliers. In preliminary research part, we at first discussed hardware configuration may affects the oscillator frequency, and how these two factors would affect the measurement of clock skew. Secondly, we discussed how the rate of packets missing, standard deviation, and the ratio of packet interval in client and in server can help to judge experiment results. Thirdly, we argue that median is better to find a representative clock skew in every experiment than average and trimmed mean. And last, we summarized the difference of get time functions of different operating systems and programming languages.
    According to the results of preliminary research part, we selected four parameters and designed experiments accordingly. The selected parameters include amount of packets, packet interval time, network type, and built-in operating systems of mobile devices. The experiment results suggest that larger amount of packets and longer packets interval time would derive better estimating result; Estimation would be stabler in WiFi environment than in 3G; Devices with different operating systems would perform differently in the same configuration and thus require different parameters to obtain more precise estimation. In conclusion, there is at least 98% probability that a clock skew of error from 0.7 to 1 ppm can be measured with 5,000 timestamps, 500 ms packet sending interval, from any mobile device with WiFi or 3G connection.

    摘要 I Abstract II 誌謝 III 目錄 IV 圖目錄 VI 表目錄 IX 第1章 緒論 1 1.1前言 1 1.2研究背景 1 1.3動機與目的 2 1.4論文架構 3 第2章 國內外相關研究 4 2.1裝置識別技術 4 2.2裝置識別在雲端安全上的應用 8 第3章 研究方法 11 3.1 目標系統之架構 11 3.2研究流程 11 3.2.1前置研究 12 3.2.2研究主體 13 3.3演算法 14 3.3.1時脈偏移之測量方法 14 3.3.2線性迴歸法(Linear Regression Method, LRM) 15 3.3.3快速分段取最小值演算法(Quick Piecewise Minimum Algorithm, QPM) 16 3.3.4線性規劃法(Linear Programming Method, LPM) 17 3.3.5三種時脈偏移演算法之比較 18 3.4 變數分析 20 3.4.1 震盪頻率(Frequency)與硬體的關聯性 20 3.4.2封包遺失率、標準差與封包間隔比在實驗中的意義 21 3.4.3從平均值、縮減平均值與中位數中選擇代表性的時脈偏移值 24 3.4.4 Android與iOS在函數上的精準度 25 第4章 實驗結果與分析 26 4.1實驗平台 26 4.2實驗設計 26 4.3實驗結果 30 4.3.1 封包數量對時脈偏移值估算的影響 30 4.3.2 封包間隔時間對時脈偏移值估算的影響 35 4.3.3 WiFi與3G對時脈偏移值估算的影響 38 4.3.4作業系統與相異語言之時間函數對時脈偏移值估算的影響 40 4.3.5 各實驗之時脈偏移精確度與變數建議 41 4.3.6 各實驗結果之參考數據 41 第5章 結論與未來研究方向 43 5.1結論 43 5.2未來研究方向 43 參考文獻 45 附錄A 48

    [1] D.-J. Huang, K.-T. Yang, C.-C. Ni, W.-C. Teng, T.-R. Hsiang, and Y.-J. Lee, "Clock skew based client device identification in cloud environments," in Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications, pp. 526-533, March 2012.
    [2] J. Hall, M. Barbeau, and E. Kranakis, “Detection of transient in radio frequency fingerprinting using signal phase,”in Proceedings of IASTED International Conference on Wireless and Optical Communications (WOC ’03),pp. 13-18, 2003.
    [3] R. M. Gerdes, T. E. Daniels, M. Mina, and S. F. Russell, “Device identification via analog signal fingerprinting: A matched filter approach,” in Proceedings of the 2006 Network and Distributed System Security Symposium (NDSS ’06), Feb 2006.
    [4] K. Bonne Rasmussen and S. Capkun, “Implications of radio fingerprinting on the security of sensor networks,”in Proceedings of 3rd International Conference on Security and Privacy in Communications Networks and the Workshops, pp. 331-340, Sept 2007.
    [5] P. Eckersley, “How unique is your web browser?”in Proceedings of Privacy Enhancing Technologies. Springer Berlin / Heidelberg, vol. 6205, pp. 1–18, 2010.
    [6] T. Kohno, A. Broido, and K. Claffy, “Remote physical device fingerprinting, ” in IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 2, pp. 93–108, 2005.
    [7] S. J. Murdoch, “Hot or not: revealing hidden services by their clock skew,” in Proceedings of the 13th ACM Conference on Computer and Communications Security, New York, NY, USA, pp. 27–36,2006
    [8] R. Dingledine, N. Mathewson, and P. Syverson. “Tor: The Second-Generation Onion Router,” in Proceedings of the 13th USENIX Security Symposium, Aug 2004.
    [9] S. Zander and S. J. Murdoch, “An improved clock-skew measurement technique for revealing hidden services,” in Proceedings of the 17th conference on Security symposium. Berkeley, CA, USA: USENIX Association, pp. 211–225, 2008.
    [10] D.-J. Huang, W.-C. Teng, C.-Y. Wang, H.-Y. Huang, and J. M. Hellerstein, “Clock skew based node identification in wireless sensor networks,” in Proceedings of IEEE Global Telecommunications Conference, pp. 1877–1881, 2008.
    [11] Jana, S. and Kasera, S. K. “On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews,” in Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, New York, pp. 104-115, 2008.
    [12] R. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus, “Tinypk: Securing Sensor Networks with Public Key Technology,” in Proceedings of the Second ACM Workshop on Security of Ad hoc and Sensor Networks (SASN '04), pp. 59-64, 2004.
    [13] M. Uddin and C. Castelluccia, “Toward clock skew based wireless sensor node services,”in Proceedings of the 5th Annual ICST Wireless Internet Conference (WICON 2010), pp. 1-9, Mar 2010.
    [14] M. A. Vouk, “Cloud computing: Issues, research and implementations,” n Proceedings of the 30th International Conference on Information Technology Interfaces, pp. 31-40, June 2008.
    [15] M. Jensen, J. Schwenk, N. Gruschka, and L. Iacono, “On technical security issues in cloud computing,” in Proceedings of IEEE International Conference on Cloud Computing, 2009. (CLOUD ’09), pp. 109–116, Sept 2009.
    [16] L. Kaufman, “Data security in the world of cloud computing,” IEEE Security Privacy, vol. 7, no. 4, pp. 61–64, July-Aug 2009.
    [17] H. Li, Y. Dai, L. Tian, and H. Yang, “Identity-based authentication for cloud computing,”in Proceedings of Cloud Computing. Springer Berlin / Heidelberg, vol. 5931, pp. 157–166, 2009.
    [18] C. Schridde, T. Dornemann, E. Juhnke, B. Freisleben, and M. Smith, “An identity-based security infrastructure for cloud environments,”in Proceedings of 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), pp. 644–649, June 2010.
    [19] S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1–11, 2011.
    [20] S. Moon, P. Skelly and D. Towsley, "Estimation and removal of clock skew from network delay measurements," in Proceedings of 18th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 1, pp. 227-234, Mar 1999.
    [21] N. Megiddo, “Linear-time algorithms for linear programming in r3 and related problems,” in Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, ser. SFCS ’82, pp. 329-338, 1982.
    [22] M. E. Dyer, “Linear time algorithms for two- and three-variable linear programs,” SIAM Journal on Computing, vol. 13, no 1, pp. 31-45, 1984.
    [23] V. Paxson, ``On calibrating measurements of packet transit times,'' in Proceedings of the 1998 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, pp. 11--21, 1998.

    QR CODE