簡易檢索 / 詳目顯示

研究生: 吳世琦
Shih-Chi Wu
論文名稱: OpenBLEID+BLETunneling:供使用者裝置透過BLE閘道器與網際網路服務溝通之方法
OpenBLEID+BLETunneling:A Means for User Devices to Communicate with Internet Services via BLE-based Gateways Considering Access Privileges
指導教授: 查士朝
Shi-Cho Cha
洪政煌
Cheng-Huang Hung
口試委員: 羅乃維
Nai-Wei Lo
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2016
畢業學年度: 104
語文別: 中文
論文頁數: 47
中文關鍵詞: 存取權限低功率藍牙通道物聯網閘道器物聯網
外文關鍵詞: Access Privilege, BLE Tunneling, sIoT Gateway, IoT
相關次數: 點閱:348下載:3
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 由於低功率藍牙(Bluetooth Low Energy,簡稱 BLE)具有耗用功率較低的特性,使得 BLE 成為目前與物聯網裝置溝通的一個主流協定;而物聯網裝置通常不具備直接連結網際網路的能力,因此,物聯網裝置常需要透過閘道器才能將資料上傳至網際網路伺服器。當使用者攜帶該物聯網裝置至各地時,各地的閘道器就需要確認該物聯網裝置或使用者是否具有能夠透過閘道器上傳資料的權限。然而,過去像是 6LoWPAN 等協定,並沒有定義如何鑑別物聯網裝置與使用者身分的方法,也沒有特別針對 BLE 協定設計訊息傳送的方法。
    有鑑於此,本研究提出 OpenBLEID 與 BLETunneling 的標準與方法。首先,OpenBLEID 是要讓裝置或使用者在不同區域移動時,都可以提供閘道器一個鑑別裝置或使用者身分的方法。這樣的機制仿照 OpenID 的概念,讓使用者可以向一個身分提供者進行登錄,之後閘道器就可透過 BLE 取得所要進行身分鑑別裝置的身分提供者,並作為中間人,讓身分提供者對裝置進行身分鑑別並證明裝置的身分,最後由閘道器判斷該裝置是否可存取網路。另一方面,BLETunneling 讓授權的裝置可以將需要傳送的網際網路封包,經由閘道器轉發到目標網際網路伺服器,並且能夠接收網際網路伺服器的回應。本研究提出的標準將有利於基於 BLE 的物聯網裝置在各地移動時,都能讓鄰近的閘道器確認其身分,從而得到授權,以存取網際網路服務。


    Due to resource limitation, Internet of Things (IoT) devices may not have capabilities of Internet connection. Instead, current IoT devices are usually equipped with Bluetooth Low Energy (BLE) for communication because of BLE’s low energy consumption. If such IoT devices wish to communicate with hosts on the Internet, the devices may need to connect to gateways with BLE and transmit data to the hosts via the gateways. In this case, the gateways should authenticate the devices and ensure that the devices are authorized to transfer data through the gateways. Also, the gateways need to communicate with the host on behalf of the devices. However, there is no standard or protocol defining means for IoT devices to communicate with Internet servers through gateways with BLEs.
    In light of this, this study proposes OpenBLEID and BLETunneling. OpenBLEID provides a means for gateways to authenticate the devices or device owners without knowledge of the devices in advance. In this case, OpenBLEID borrows the concept of OpenID. Devices can be first registered with an identity provider (IdP). Then, when a device wishes to send data through a gateway, the gateway can request its IdP to authenticate the device to determine the privileges of the device. On the other hand, BLETunneling enables authorized devices to transmit requests to Internet servers and receive responses from internet servers through a gateway. For the very sake of that, this study can contribute to establish specifications for IoT devices to communicate with Internet servers through gateways with BLEs.

    摘要 Abstract 致謝 目錄 圖目錄 表目錄 第1章 緒論 1.1 研究背景與動機 1.2 研究目的與貢獻 1.3 章節介紹 第2章 文獻探討與背景知識 2.1 物聯網技術 2.2 基於低功率藍牙協定傳送IPv6封包 2.2.1 BLE 架構 2.2.2 BLE星狀網路拓撲 2.2.3 基於低功率藍牙協定傳送IPv6封包之規範 2.3 低功率藍牙隱私位址 2.4 OpenID 規範 第3章 問題定義與需求分析 3.1 問題定義 3.2 角色定義 3.3 傳輸通道 3.4 範例情境 3.5 需求分析 3.5.1 系統功能需求 3.5.2 安全需求 第4章 閘道器設計 第5章 OpenBLEID 5.1 符號定義 5.2 運作流程 第6章 BLETunneling 6.1 適用於UDP之情況 6.2 適用於TCP之情況 第7章 實驗 第8章 安全性分析 8.1 使用 BAN Logic 證明 OpenBLEID 8.2 其他安全性分析 第9章 結論與未來方向 參考文獻

    [1] Brad Fitzpatrick, “Distributed Identity: Yadis, ” 2005
    http://lj-dev.livejournal.com/683939.html
    [2] ETSI, “Overview of ETSI TC M2M Activities Activities,” 2012.
    https://docbox.etsi.org/smartm2m/open/information/m2m_presentation.pdf
    [3] Kevin Townsend, “Introduction to Bluetooth Low Energy,” 2014.
    https://learn.adafruit.com/introduction-to-bluetooth-low-energy?view=all
    [4] The Bluetooth Special Interest Group , “company identifiers,”
    https://www.bluetooth.com/specifications/assigned-numbers/company-identifiers
    [5] Andrew Banks and Rahul Gupta, MQTT Version 3.1.1, OASIS Standard, 2014.
    [6] ETSI TS 102 690 V2.1.1(2013-10). Machine-to-Machine communications (M2M); Functional architecture.
    [7] Flavia C. Delicato, Paulo F. Pires, Thais Batista, Everton Cavalcante, Bruno Costa,
    and Thomaz Barros, “Towards an IoT ecosystem,” In Proceedings of the First
    International Workshop on Software Engineering for Systems-of-Systems
    (SESoS '13), pp. 25-28, ACM, New York, NY, USA, 2013.
    [8] International Telecommunication Union, Telecommunication Standardization
    Sector (ITU-T), ITU-T recommendation Y2060: Overview of internet of thing.
    Geneva, Switzerland, 2012
    [9] J. Nieminen, T. Savolainen, M. Isomaki, B. Patil, Z. Shelby, C. Gome, “Transmission of IPv6 Packets over BLUETOOTH(R) Low Energy,” Work in Progress, Internet Engineering Task Force (IETF) draft-ietf-6lo-btle-03, 2014.
    [10] J. Soldatos, M. Serrano, M. Hauswirth, “Convergence of Utility Computing with
    the Internet-of-Things,” In Proceedings of the 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 874-879, 2012.
    [11] Julien Mineraud, Oleksiy Mazhelis, Xiang Su, and Sasu Tarkoma, A gap analysis
    of Internet-of-Things platforms, eprint arXiv:1502.01181, 2015.
    [12] Kevin Townsend and Carles Cufí, “Getting Started with Bluetooth Low Energy:
    Tools and Techniques for Low-Power Networking,” O'Reilly Media, 2014.

    [13] M. Eisenhauer, P. Rosengren, and P. Antolin, “A Development Platform for
    Integrating Wireless Devices and Sensors into Ambient Intelligence Systems,” In
    Proceedings of the SECON Workshops '09, pp. 1-3, 2009.
    [14] Olivier Hersent, David Boswarthick, and Omar Ellolumi, “The Internet of Things:
    Key Applications and Protocols,” Wiley, 2012.
    [15] OpenID specs, "OpenID Authentication 2.0 – Final, " 2007.
    [16] The Bluetooth Special Interest Group, Bluetooth Core Specification 4.2, 2013.
    [17] Weijun Qin, Qiang Li, Limin Sun, Hongsong Zhu, and Yan Liu, “RestThing: A
    Restful Web Service Infrastructure for Mash-Up Physical and Web Resources,” In
    Proceedings of the 2011 IFIP 9th International Conference on Embedded and
    Ubiquitous Computing (EUC), pp. 197-204, 2011.
    [18] Xin Ma, Wei Luo, “The analysis of 6LowPAN technology,” IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, vol. 1, no. 3, pp. 963- 966, 2008.
    [19] Z. Shelby, K. Hartke, and C. Bormann, “The Constrained Application Protocol
    (CoAP),” Internet Engineering Task Force (IETF) RFC 7252, 2014.

    無法下載圖示 全文公開日期 2018/08/22 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE