透過您的圖書館登入
IP:18.218.209.8
  • 學位論文

以四層式物聯網架構提昇物聯網環境之安全與可用性

Security and Availability Enhancement by Using the Four Layer Architecture of IoT

指導教授 : 王順生 王淑卿
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


隨著資訊技術不斷演進,以及IPv6技術的日漸成熟,一個以未來網路的新概念應用於具有感測、網路以及運算功能進而發展成智能物件(Smart Object),使物件與物件能進行資料傳遞,形成新興的網路環境,稱之為物聯網(Internet of Things;IoT)。 過去有關物聯網中介層之研究,無法解決物聯網環境可能出現不準確的資料、龐大複雜化的資料以及資料不安全性的問題。因此,本研究提出一個中介層框架來進行感知層資料的過濾與整合,以獲得有意義的資訊。 在本研究提出的中介層框架下,感知層使用安全水準協議(Security Level Agreement;SLA)的概念來降低計算的成本,並且在中介層與感知層之間使用數位簽章的概念提出輕量安全機制,經由中介層讓感知層內感測節點的身分具有可驗證性與不可否認性,進而提升物聯網的安全性環境的安全性。 本研究在雲端計算資源層提出三階段排程演算法,以P-ESJF(Priority-Enhanced Shortest Job First)、P-EOLB(Priority-Enhanced Opportunistic Load Balancing)與EMM(Enhanced Min-Min)排程演算法改善系統效能,使得每個需要執行的工作都能被分配到適當的資源並改善每個服務節點的負擔與降低資源的浪費。

並列摘要


Currently, information technology is developing rapidly, and resulting in the vigorous development of the IPv6. The new concept of the future network is applied to the smart objects which have sensing, networking and computing abilities, and the ability to transfer data between the objects; the novel network environment is called the Internet of Things (IoT). The past researches of the middleware layer in the IoT have not discussed inaccurate information, large and complex information and data insecurity issues. Thus, a framework of middleware is proposed to solve these problems through data filtering and integration to draw on meaningful information. This study used the concept of security level agreements to reduce the risk of data being subject to malicious attacks, as well as the computational cost of data encrypted in the perception layer. And the digital signature is used to establish a lightweight security mechanism between the application and the perception layer. Through the framework of the middleware layer, the identity of the application and the perception layer will have a verification and non-repudiation, and the security of the IoT can be obtained. This study proposed Three-Phase Scheduling (3PS) under a cloud computational resource layer, to improve the effectiveness of the system. Thereby, each task to be performed can be assigned to the appropriate resources, while improving the load on each service node and reducing the waste of resources.

參考文獻


[2] 陳慶維 (2011),在階層式雲端運算網路架構下以負載平衡為導向之排程機制,朝陽科技大學資訊管理系碩士論文,臺中。
[5] K. Aberer, M. Hauswirth and A. Salehi(2007), “Infrastructure for Data Processing in Large-scale Interconnected Sensor Networks,” Proceedings of International Conference on Mobile Data Management, pp. 198-205.
[6] A. Allam(2006), “Service-oriented Modeling and Architecture for Realization of an SOA,” Proceedings of the IEEE 2006 International Conference on Services Computing, pp. 521.
[9] R. Armstrong, D. Hensgen and T. Kidd(1998), “The Relative Performance of Various Mapping Algorithms is Independent of Sizable Variances in Run-Time Predictions,” Proceeding of the 7th IEEE Heterogeneous Computing Workshop, pp. 79-87.
[11] K. Birman, G. Chockler, and R. Renesse(2009), “Toward A Cloud Computing Research Agenda,” ACM SIGACT News, Vol. 40, No. 2, pp. 68-80, June.

延伸閱讀