簡易檢索 / 詳目顯示

研究生: 游凱傑
Kai-jie You
論文名稱: 一個強化安全的無線感測網路時間通訊協定
A Secured Time Synchronization Protocol for Wireless Sensor Network
指導教授: 鄧惟中
Wei-chung Teng
口試委員: 項天瑞
Tien-ruey Hsiang
陳昇瑋
Sheng-wei Chen
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2010
畢業學年度: 99
語文別: 中文
論文頁數: 53
中文關鍵詞: 氾濫式時間同步協定無線感測網路
外文關鍵詞: The Flooding Time Synchronization Protocol, Wireless Sensor Network
相關次數: 點閱:250下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 本研究針對無線感測網路時間同步協定中,發展最為成熟的氾濫式時間同步協定(Flooding Time Synchronization Protocol, 簡稱FTSP)來進行改良。FTSP的設計著重於支援動態網路配置與全域時間的精確度,但是原始的設計並沒有考量安全性的防護,使得它在時間同步進行過程中容易遭受惡意節點的攻擊。因此,加強時間同步協定的安全是非常急迫的研究議題。
    Tanya等人的先行研究把針對FTSP的攻擊分為根節點攻擊與一般節點攻擊兩類,再將一般節點攻擊細分為針對globalTime、seqNum與發送頻率等三種攻擊方式。因此,在分析完FTSP的架構後,我們對於根節點的攻擊提出了根節點選擇機制來公平並安全的選擇出根節點;而在節點資訊收集的方式上,則提出參考節點選擇機制來避免多重參考節點對時鐘偏斜精確度的影響,並在FTSP中加入時間同步過濾器來濾除不正常的時間同步訊息。在時間同步過濾器中包含有:針對globalTime欄位攻擊的鄰近節點全域時間黑名單過濾器、針對seqNum欄位攻擊的鄰近節點全域時間黑名單過濾器、用來判別參考節點身分的時鐘偏斜過濾器,與將誤差矯正造成的影響降低的震盪過濾器。以上所提出的防禦機制應足以對時間同步的運行提供合理的安全性。
    由於根節點選擇機制中,封包傳遞的防護是運用現有的金鑰加密,因此在模擬攻擊的實驗上,只針對除了根節點選擇外所設計的防禦機制進行測試。在模擬實驗中,鄰近節點全域時間黑名單過濾器與鄰近節點seqNum黑名單過濾器成功達到過濾惡意節點針對globalTime與seqNum的攻擊。藉由參考節點的時鐘偏斜震盪範圍在1ppm內的特性,可以透過時鐘偏斜過濾器來辨識參考節點的身分。並且利用震盪過濾器,讓原本收集到錯誤資訊時需等待10個週期時間才能重新獲得正確的時鐘偏斜,降低至5個週期時間就可以完成修正,並且可以避免發送錯誤的時間同步訊息。因此,從實驗得到的結果顯示,本研究中所提出的防禦機制,可以有效彌補過去研究所提到安全性的漏洞。


    This research tries to complement the security vulnerability of Flooding Time Synchronization Protocol (FTSP), which is currently known as the most sophisticated time synchronization protocol in wireless sensor networks. FTSP has advanced features like implicitly dynamic topology and high accuracy time, but its original design does not consider security issues. This makes malicious nodes be able to easily break the time synchronization protocol and change the time of synchronization messages. In order to defend attacks from malicious nodes, the mechanism of FTSP has to be reinforced by adding security components. According to the literature, assaults on FTSP are divided into two categories: the attack on the root node and the attack on normal nodes. The later type can be further subdivided into three different cases: (1) modifying the globalTime field; (2) modifying the seqNum field; (3) reducing the frequency of sending packets. After analyzed the structure of FTSP, we propose a root node election mechanism which benefit from base station to defend the first type attacks. In order to defend attacks on normal nodes, reference node selecting mechanism and several data filters are proposed. The proposed data filters include black lists of neighbor globalTime filter, black lists of neighbor seqNum filter, clock skew filter and time fluctuation filter. By applying these enhanced components, the security of FTSP can be assured.
    Since the root election mechanism utilizes data encryption which is shown to be effective by previous studies, only experiments of normal node attacks are performed. The results of experiments show that we have successfully defended the seqNum attack and the globalTime attack by using black lists of neighbor seqNum filter and black lists of neighbor globalTime filter. By applying the characteristics of fixed clock skew fluctuation, around 1ppm, reference node can be successfully identified. Furthermore, the data collection time automatically drop from 10 sending cycles to 5 sending cycles under a globalTime attack by utilizing time fluctuation filter. From our experimental result, the proposed filters can improve the security of FTSP and fix the vulnerabilities caused by original design.

    摘要 I Abstract II 誌謝 III 目錄 IV 圖目錄 VI 表目錄 VIII 第1章 緒論 1 1.1前言 1 1.2研究背景 1 1.3動機與目的 3 1.4論文架構 4 第2章 文獻探討 5 2.1氾濫式時間同步協定 (FTSP) 5 2.1.1 FTSP的線性迴歸 7 2.2氾濫式時間同步協定攻擊上的探討 9 2.3安全氾濫式時間同步協定的防禦機制 10 2.4 FTS架構分析 12 2.4.1 FTSP主要架構 12 2.4.2 FTSP安全性的問題與新增的防禦 14 第3章 研究方法 16 3.1根節點選擇機制 16 3.2參考節點選擇機制 20 3.3時間同步訊息過濾器 22 3.3.1鄰近節點全域時間黑名單過濾器 23 3.3.2鄰近節點seqNum黑名單過濾器 25 3.3.3時鐘偏斜過濾器 27 3.3.4震盪過濾器 28 3.4變更後FTSP整體架構流程 30 第4章 實驗與結果 32 4.1實驗平台 32 4.2實驗設計 32 4.3實驗結果 33 4.3.1 實驗一: 多重參考節點影響測試 33 4.3.2 實驗二: 惡意節點發送錯誤的全域時間 35 4.3.3 實驗三: 惡意節點發送錯誤的seqNum 36 4.3.4 實驗四: 惡意節點發送包含已存在節點編號的時間同步訊息 38 第5章 結論與未來工作 41 5.1結論 41 5.2未來工作 41 參考資料 43 附錄 45 附錄A 匯集樹協定 (CTP) 45 附錄B 網路時間協定 (NTP) 46 附錄C 實驗監控介面 47 C.1實驗監控介面架構 47 C.2 Nagios 47 C.3 Java GUI 51

    [1] NTP Official Website: http://support.ntp.org/bin/view/Main/WebHome.
    [2] Jeremy Elson, Lewis Girod, and Deborah Estrin, “Fine-Grained Network Time Synchronization Using Reference Broadcasts,” The 5th Symposium on Operating Systems Design and Implementation (OSDI 2002), pp. 147–163, Dec. 2002.
    [3] Saurabh Ganeriwal, Ram Kumar, and Mani B. Srivastava, “Timing-Sync Protocol for Sensor Networks,” The 1st ACM Conference on Embedded Networked Sensor System (SenSys 2003), pp. 138–149, Nov. 2003.
    [4] Miklós Maróti, Branislav Kusy, Gyula Simon, and Ákos Lédeczi, “The Flooding Synchronization Protocol,” The 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), pp. 39-49, Nov. 2004.
    [5] Tanya Roosta, and Shankar Sastry. “Securing Flooding Time Synchronization Protocol in Sensor Networks,” The 1st ACM Workshop on Embedded Systems Security (WESS 2006), Oct. 2006.
    [6] 廖偉傑, “利用序號過濾器實作安全的氾濫式時間同步協定,” 國立台灣科技大學資訊工程系研究所碩士論文, 2007.
    [7] Tanya Roosta, Wei-Chieh Liao, Wei-Chung Teng, and Shankar Sastry, “Testbed Implementation of A Secure Flooding Time Synchronization Protocol,” IEEE Wireless Communications and Networking Conference (WCNC 2008), pp. 3157-3162, Mar. 2008.
    [8] Chris Karlof, Naveen Sastry, and David Wagner, “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks,” The 2nd ACM Conference on Embedded Networked Sensor Systems (SensSys 2004), pp. 162-175, Nov. 2004.
    [9] Ronald Watro, Derrick Kong, Sue-fen Cuti, Charles Gardiner, Charles Lynn, and Peter Kruus, “TinyPK: Securing Sensor Networks with Public Key Technology,” The 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), pp. 59-64, Oct. 2004.
    [10] An Liu and Peng Ning, “TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks,” The 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), pp. 245-256, Apr. 2008.
    [11] Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen, and Pramod K. Varshney, “A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge,” The 23th AnnualJoint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004), pp. 586-597, Mar. 2004.
    [12] Omprakash Gnawali, Rodrigo Fonseca, Kyle Jamieson, David Moss, and Philip Levis, “Collection Tree Protocol,“ The 7th ACM Conference on Embedded Networked Sensor Systems (SensSys 2009), pp. 1-14, Nov. 2009.
    [13] 葉致宏, “植基於泛濫式時間同步協定之時間偏斜模仿方法,” 國立台灣科技大學資訊工程系研究所碩士論文, 2009.
    [14] Ding-Jie Huang, Wei-Chung Teng, Chih-Yuan Wang, Hsuan-Yu Huang, and Joseph M. Hellerstein, “Clock Skew Based Node Identification in Wireless Sensor Networks,” IEEE Global Communications Conference (GLOBECOM 2008), Nov. 2008.
    [15] Crossbow Official Website: http://www.xbow.com.
    [16] TinyOS Official Website: http://www.tinyos.net.
    [17] John R. Douceur, “The Sybil Attack,” The 1st International Workshop on Peer-to-Peer Systems (IPTPS 2002), Mar. 2002.

    QR CODE