簡易檢索 / 詳目顯示

研究生: 朱晉廷
Jin-Ting Jhu
論文名稱: 叢集式無線感測網路之金鑰更新技術
Key Evolution for the Cluster-Based Wireless Sensor Network
指導教授: 馮輝文
Huei-Wen Ferng
口試委員: 黎碧煌
Bih-Hwang Lee
張宏慶
Ben Jang
鄭傑
Jay Cheng
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2011
畢業學年度: 99
語文別: 中文
論文頁數: 40
中文關鍵詞: 金鑰變更金鑰管理無線感測網路封包過濾叢集
外文關鍵詞: Key Evolution
相關次數: 點閱:140下載:3
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

無線感測器網路(Wireless Sensor Network,WSN)是在特定區域部署大量低成本的感測器,
這些感測器會監測環境的變化且利用無線網路把資訊傳遞給基地台。
由於無線網路的公開特性,所以感測器在把資訊傳遞出去之前,必需先加密以免被竊聽而直接取得完整資訊。
在一般的無線網路中,比較常使用公開金鑰密碼學(Public Key Cryptography)來保護網路安全,但是無線感測器網路的資源限制使得公開金鑰密碼學不能直接應用。
反之,對稱式金鑰密碼學(Symmetric Key Cryptography)所需的資源比公開金鑰密碼學少很多,也更容易應用在無線感測器網路上。
但是,長時間使用單一固定金鑰,容易遭受到金鑰還原攻擊,使得網路的安全性受到威脅。
如果把叢集(Cluster)的概念拿到 WSN 來應用,我們將會有一些資源較豐富的感測器稱之為Cluster Head 。
因此,本篇論文利用 Cluster Head 來執行金鑰的變更,阻撓竊聽,金鑰還原攻擊與假封包的過濾。


WSN is composed of lot of cheap and resource-constrain nodes deployed in speci c
area to monitor nature event, such as sound, re, vibration, motion or temperature
and to report the event to the base station. Because of the public feature of the wire-
less communication, we need to prevent attacker from eavesdropping the sensitive
information. Therefore, all the data should be encryption before sending.
We in general apply the Public Key Cryptography in wireless network. Owing to
the limitation of resource-constrain, we cannot fully apply the Public Key Cryptog-
raphy in WSN. Instead, the Symmetric Key Cryptography is light-weight encryption
system which is suitable for WSN. Besides, we should not neglect that each sensor
node use the same key all the time. It is easy to su er from cryptanalytic attack
and directly threaten the network security.
Now we apply the concept of cluster to WSN, then we can use the nodes possessing
abundant resource to perform complex operation. We make good use of the concept
of cluster to accomplish key evolution, packet ltering and to thwart eavesdropping,
cryptanalytic attack.

1. 緒論.....1 2. 相關文獻回顧.....3 2.1 金鑰管理.....3 2.2 異質無線感測網路與Cluster-Based.....4 2.3 資料的安全需求.....4 2.3.1 機密性(confidentiality).....4 2.3.2 可信性(authenticity).....5 2.3.3 完整性(integrity).....5 2.3.4 不可否認性(non-repudiation).....5 3. 系統架構與金鑰管理機制.....6 3.1 網路架構.....6 3.2 Assumptions.....7 3.3 符號.....8 3.4 金鑰更新.....8 3.5 報告的產生、過濾.....9 4. 安全性分析與效能評估.....12 4.1 安全性分析.....12 4.1.1 資料的機密性.....12 4.1.2 資料的可信性.....14 4.1.3 資料的可用性.....18 4.2 效能評估.....20 4.2.1 key storage overhead.....20 4.2.2 communication overhead.....21 4.2.3 computation overhead.....22 5. 總結.....23 參考文獻.....24

[1] Akyildiz, I.F., Weilian Su, Sankarasubramaniam, Y., Cayirci, E., \A survey on
sensor networks," in IEEE Communications Magazine, Vol.40, no.8, pp.102 -
114, 2002.
[2] Yun Zhou, Yuguang Fang, Yanchao Zhang, \Securing wireless sensor networks:
a survey," in IEEE Communications Surveys & Tutorials, Vol.10, no.3, pp.6 -
28, 2008.
[3] Xiaojiang Du, Hsiao-Hwa Chen, \Security in wireless sensor networks," in IEEE
Wireless Communications, Vol.15, no.4, pp.60 - 66, 2008.
[4] M. Boujelben, O.Cheikhrouhou, M. Abid, H. Youssef, \Establishing Pairwise
Keys in Heterogeneous Two-Tiered Wireless Sensor Networks," in The Third
International Conference on Emerging Security Information, Systems and Tech-
nologies SECURWARE, Greec, 2009.
[5] Kui Ren, Wenjing Lou, Yanchao Zhang, \LEDS: Providing Location-Aware
End-to-End Data Security in Wireless Sensor Networks," in IEEE Transactions
on Mobile Computing, Vol.7, no.5, pp.585 - 598, May 2008.
[6] R. Blom, \An Optimal Class of Symmetric Key Generation Systems," in Ad-
vances in Cryptology: PROCEEDINGS EUROCRYPT 84, Lecture Notes in
Computer Science, vol.209, pp.335 - 38, 1985.
[7] C. Blundo et al., \Perfectly-Secure Key Distribution for Dynamic Conferences,"
in Advances in Cryptology: CRYPTO' 92, Lecture Notes in Computer Science,
vol.740, pp.471-486, 1993.
[8] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, \SPINS:Security
Protocols for Sensor Networks," in Proc. MobiCom, July 2001.
[9] Kejie Lu, Yi Qian, Guizani, M., Hsiao-Hwa Chen, \A framework for a dis-
tributed key management scheme in heterogeneous wireless sensor networks,"
in IEEE Transactions on Wireless Communications, Vol.7, no.2, pp.639 - 647,
Feb 2008.
[10] P. Traynor, R. Kumar, H. Choi, G. Cao, \E cient Hybrid Security Mecha-
nisms for Heterogeneous Sensor Networks," in IEEE Transactions on Mobile
Computing, Vol.6, no.6, pp.663 - 677, 2007.
[11] S. Cui, A. Goldsmith, and A. Bahai, \Energy-e ciency of MIMO and coopera-
tive MIMO techniques in sensor networks," in IEEE Journal on Selected Areas
in Communications, Vol.22, no.6, pp.1089 - 1098, Aug 2004.
[12] M.F. Younis, K. Ghumman, M. Eltoweissy, \Location-Aware Combinatorial
Key Management Scheme for Clustered Sensor Networks," in IEEE Transac-
tions on Parallel and Distributed Systems, Vol.17, no.8, pp.865 - 882, 2006.
[13] M.H. Guo, H.T. Liaw, D.J. Deng, H.C. Chao, \Cluster-based secure communi-
cation mechanism in wireless ad hoc networks," in IET Information Security,
Vol.4, no.4, pp.352 - 360, Dec 2010.
[14] W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, \Energy-E cient Com-
munication Protocol forWireless Microsensor Networks," in IEEE Proceedings
of the Hawaii International Conference on System Sciences, pp.1 - 10, Jan 2000.
[15] S. Lee, H.S. Lee, \Analysis of Network Lifetime in Cluster-Based Sensor Net-
works," in IEEE Communications Letters, Vol.14, no.10, pp.900 - 902, Oct
2010.
[16] Gicheol Wang, D. Choi, D. Kang, \Securing Wireless Sensor Networks Using
Cluster Reformations," in IEEE/IFIP International Conference on Embedded
and Ubiquitous Computing, Vol.2, pp.306 - 311, 2008.
[17] Zhihong Liu, Jianfeng Ma, Qingqi Pei, Liaojun Pang, YoungHo Park, \Key
Infection, Secrecy Transfer, and Key Evolution for Sensor Networks," in IEEE
Transactions on Wireless Communications, Vol.9, no.8, pp.2643 - 2653, May
2010.
[18] Yanchao Zhang, Wei Liu, Yuguang Fang, Dapeng Wu , \Secure localization
and authentication in ultra-wideband sensor networks," in IEEE Journal on
Selected Areas in Communications, Vol.24, no.4, pp.829 - 835, Apr 2006.
[19] H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, \Toward resilient security in
wireless sensor networks," in Proc. ACM MobiHoc '05, 2005.
[20] F. Ye, H. Luo, S. Lu, and L. Zhang, \Statistical en-route ltering of injected
false data in sensor networks," in Proc. IEEE INFOCOM '04, 2004.
[21] S. Zhu, S. Setia, S. Jajodia, and P. Ning, \An interleaved hop-by-hop authen-
tication scheme for ltering of injected false data in sensor networks," in Proc.
IEEE Symp. Security and Privacy '04, May 2004.
[22] a. Shamir, \How to share a secret," in Comm. ACM, vol.22, no.11, pp.612 -
613, Nov 1979.

QR CODE