簡易檢索 / 詳目顯示

研究生: 邱博宏
Po-Hung Chiu
論文名稱: 基於零信任的物聯網信任評估
Zero Trust-Enabled Trust Evaluation on IoT
指導教授: 馬奕葳
Yi-Wei Ma
口試委員: 柯志亨
Chih-Heng Ke
陳永昇
Yeong-Sheng Chen
陳俊良
Jiann-Liang Chen
黎碧煌
Bih-Hwang Lee
馬奕葳
Yi-Wei Ma
學位類別: 碩士
Master
系所名稱: 電資學院 - 電機工程系
Department of Electrical Engineering
論文出版年: 2023
畢業學年度: 111
語文別: 英文
論文頁數: 41
中文關鍵詞: 信任評估黑洞攻擊拒絕服務攻擊等級攻擊版本號攻擊低功耗和有損網路協定
外文關鍵詞: Trust Evaluation, Blackhole Attack, DoS Attack, Rank Attack, Version Attack, RPL
相關次數: 點閱:233下載:21
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來,物聯網和無線感測器網路的市場持續成長。在2023年,物聯網的市場成長率為16%、無線傳感器的市場成長率為18%。因此,物聯網網路上的安全問題需要受到重視。然而,由於物聯網網路通常涉及節點之間的協作,所以對其他節點的信任評估相當重要。本研究引入了零信任的觀點,會持續對鄰近節點做信任評估,以避免攻擊者危害整體網路的可用性和可靠性。在零信任中,不存在隱性信任,也就是會對各節點的行為做信任評估,以避免其他節點被感染時,導致整體網路受到損害。本研究針對用於低功耗和有損網路協定 (Routing Protocol for Low-Power and Lossy Networks, RPL) 上的黑洞攻擊、拒絕服務攻擊、等級攻擊、版本號攻擊進行信任評估,以防止這4種攻擊者對整體網路造成的損害。本研究透過所提供的各個指標,包含能力 (Capability)、特徵 (Feature)、活動 (Activity)、系統設置 (Data of system information)來對各個交互的行為做信任評估。在檢測黑洞攻擊中,由於每個節點會配合其祖父節點同時對父節點做信任評估,因此不會像其他方法出現很高的誤報率,而導致整體網路的拓樸性能下降。另外,本研究在判斷行為時,是透過該交互節點的能力、預期該有的行為來做評估。因此,提出的方法較不容易出現誤判。


    The market for Internet of Things (IoT) and Wireless Sensor Network (WSN) has continued to grow in recent years. In 2023, the market growth rate of IoT is 16%, and the market growth rate of WSN is 18%. Therefore, security issues on IoT Network are considerably important. However, since IoT Network usually involves collaboration among nodes, trust evaluation of the other nodes is crucial. This study introduces the concept of Zero Trust (ZT), which will continuously evaluate the trust of neighbor nodes to prevent attackers from endangering the availability and reliability of the overall network. In zero trust, there is no implicit trust, that is, the behavior of each node will be evaluated, so as to avoid damage to the overall network when other nodes are infected. This study conducts trust evaluation on BlackHole Attack, Denial of Service attack, Rank Attack, and Version Attack on Routing Protocol for Low-Power and Lossy Networks (RPL), in order to prevent these four kinds of attackers from causing damage to the overall network. This research uses various indicators to evaluate the trust of each interaction behavior, including Capability, Feature, Activity and Data. Other methods usually lead to a decrease in the topology performance of the overall network under Blackhole Attack because of their high false positive rate. However, since each node cooperates with its grandparent node to conduct trust evaluations on the parent node at the same time in the detection of BlackHole Attack, the proposed method can prevent misjudgment. In addition, this study evaluates the behaviors through the ability of the interaction node and the expected behavior. Therefore, the proposed method will have less misjudgment.

    摘要 I Abstract II Acknowledgment III LIST OF FIGURES VI LIST OF TABLES VIII Chapter 1 Introduction 1 1.1 Motivation 1 1.2 Zero Trust 3 1.3 Contribution 3 1.4 Chapter Structure 4 Chapter 2 Background and Related Work 5 2.1 Background 5 2.1.1 Routing Protocol for Low-Power and Lossy Networks (RPL) 5 2.1.2 Blackhole Attack 6 2.1.3 DoS Attack 6 2.1.4 Rank Attack 7 2.1.5 Version Attack 7 2.1.6 Zero Trust Tenets 7 2.2 Related Work 8 Chapter 3 Proposed Trust Evaluation 12 3.1 Trust Definition 12 3.2 Context Handler Component 14 3.3 Trust Evaluation Component 21 3.3.1 Selfish 23 3.3.2 Blackhole Attack 23 3.3.3 DoS attack 25 3.3.4 Rank Attack 28 3.3.5 Version Attack 29 3.3.6 Overall trust calculation 30 3.4 Policy Decision and Enforcement Component 30 Chapter 4 Performance Analysis 32 4.1 Experimental Parameters 32 4.2 Experimental Analysis and Verification 33 4.2.1 Blackhole Attack 33 4.2.2 DoS Attack 34 4.2.3 Rank Attack 35 4.2.4 Version Attack 36 Chapter 5 Conclusions and Future Works 38 5.1 Conclusions 38 5.2 Future Works 38 References 39

    [1] IOT ANALYTICS (2023). State of IoT 2023: Number of connected IoT devices growing 16% to 16.7 billion globally [Online]. Available: https://iot-analytics.com/number-connected-iot-devices (Last Read on: 2023/05/15)
    [2] RESEACH AND MARKETS (2023). Wireless Sensor Network Global Market Report 2023 [Online]. Available: https://www.researchandmarkets.com/report/wireless-sensor-network (Last Read on: 2023/05/15)
    [3] A. Kirimtat, O. Krejcar, A. Kertesz and M. F. Tasgetiren, "Future Trends and Current State of Smart City Concepts: A Survey," IEEE Access, vol. 8, pp. 86448-86467, 2020.
    [4] S. Rose, O. Borchert, S. Mitchell and S. Connelly, "Zero trust architecture," 2020. Available: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf (Last Read on: 2023/05/16)
    [5] MIT Technology Review (2021). 2021 has broken the record for zero-day hacking attacks. [Online]. Available: https://www.technologyreview.com/2021/09/23/1036140/2021-record-zero-day-hacks-reasons/ (Last Read on: 2023/05/16)
    [6] L. Fang, Y. Li, Z. Liu, C. Yin, M. Li and Z.J. Cao, "A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External Attacks," IEEE Transactions on Industrial Informatics, vol. 17, no. 6, pp. 4260-4269, June 2021.
    [7] K. Yun, P. V. Astillo, S. Lee, J. Kim, B. Kim and I. You, "Behavior-Rule Specification-based IDS for Safety-Related Embedded Devices in Smart Home," World Automation Congress (WAC), pp. 65-70, 2021.
    [8] P. Astillo, J. Jeong, W. Chien, B. Kim, J. Jang and I. You, "SMDAps: A Specification-based Misbehavior Detection System for Implantable Devices in Artificial Pancreas System, " Journal of Internet Technology, vol. 22, no. 1, pp. 1-11, 2021.
    [9] G. Abdelmoumin, D. B. Rawat and A. Rahman, "On the Performance of Machine Learning Models for Anomaly-Based Intelligent Intrusion Detection Systems for the Internet of Things," IEEE Internet of Things Journal, vol. 9, no. 6, pp. 4280-4290, 2022.
    [10] Z. A. E. Houda, B. Brik and L. Khoukhi, "“Why Should I Trust Your IDS?”: An Explainable Deep Learning Framework for Intrusion Detection Systems in Internet of Things Networks," IEEE Open Journal of the Communications Society, vol. 3, pp. 1164-1176, 2022.
    [11] M. Abdel-Basset, N. Moustafa, H. Hawash, I. Razzak, K. M. Sallam and O. M. Elkomy, "Federated Intrusion Detection in Blockchain-Based Smart Transportation Systems," IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 3, pp. 2523-2537, 2022.
    [12] S.B. Sadkhan and R.S.B. Sadkhan, "Analysis of Different Types of Digital Signature," proceedings of the International Engineering Conference on Sustainable Technology and Development (IEC), pp. 241-246, 2022.
    [13] Z. Huang and Q. Wang, "A PUF-based unified identity verification framework for secure IoT hardware via device authentication," World Wide Web, vol. 23, pp. 1057-1088, 2019.
    [14] S.M. Muzammal, R.K. Murugesan, N.Z. Jhanjhi, M. Humayun, A.O. Ibrahim, A. Abdelmaboud, “A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things,” Sensors (Basel), 2022.
    [15] Z. Ye, T. Wen, Z. Liu, X. Song and C. Fu, “An Efficient Dynamic Trust Evaluation Model for Wireless Sensor Networks,” Journal of Sensors, vol. 2018, pp. 1-16, 2017.
    [16] S. Y. Hashemi and F. S. Aliee, "Dynamic and comprehensive trust model for IoT and its integration into RPL", The Journal of Supercomputing, vol. 75, no. 7, pp. 3555-3584, 2019.
    [17] A. Lahbib, K. Toumi, S. Elleuch, A. Laouiti and S. Martin, "Link reliable and trust aware RPL routing protocol for Internet of Things," proceedings of the International Symposium on Network Computing and Applications, 2017.
    [18] I. Wadhaj, B. Ghaleb, C. Thomson, A. Al-Dubai and W. J. Buchanan, “Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL),” IEEE Access, vol. 8, pp. 43665-43675, 2020.
    [19] A. Verma and V. Ranga, "Addressing Flooding Attacks in IPv6-based Low Power and Lossy Networks," proceedings of the IEEE Region 10 Conference, 2019, pp. 552-557.
    [20] S. Verducci and A. Schröer, “Social Trust,” International Encyclopedia of Civil Society, 2010.
    [21] R. Ross, M. Winstead and M. McEvilley, "Engineering Trustworthy Secure Systems," 2022. Available: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v1r1.pdf (Last Read on: 2023/05/20)

    QR CODE