透過您的圖書館登入
IP:216.73.216.209
  • 學位論文

在LoRa環境實現之物聯網應用安全通訊機制之探討

A Study on Secure Communication Mechanism of IoT Application Realized in LoRa Environment

指導教授 : 田筱榮
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


近年來物聯網的技術發展迅速,可廣泛的應用在許多環境中,設備與設備間的溝通主要是透過無線網路通訊技術來傳遞及接收訊息。不同的無線通訊技術所使用的頻段、傳輸距離、傳輸速率與應用的方式都不一樣。且物聯網設備具有體積小、消耗功率低及使用週期長等特性,為了滿足這些需求,設備的運算能力會較低。在物聯網之中有各式各樣的安全與隱私以及其它相關問題,受到許多人廣泛的討論。本研究透過使用Arduino設備架設LoRa網路環境。在使用運算能力較低的設備的情況下,保護使用者在傳遞資訊時不會被惡意的攻擊者攻擊,並避免資訊的洩漏或造成系統運作的異常。

關鍵字

物聯網 LoRa LoRaWAN

並列摘要


In recent years, the technology of the Internet of Things has developed rapidly and can be widely used in many environments. The communication between devices and devices is mainly through wireless network communication technology to transmit and receive messages. The frequency bands, transmission distances, transmission rates used by different wireless communication technologies are different from those applied. Moreover, IoT devices have the characteristics of small size, low power consumption, and long service life. In order to meet these requirements, the computing power of the device will be low. There are a variety of security and privacy issues and other related issues in the Internet of Things that have been widely discussed by many people. This study used the Arduino device to set up the LoRa network environment. In the case of using a device with low computing power, the protection user is not attacked by a malicious attacker when transmitting information and avoids leakage of information or abnormal operation of the system.

並列關鍵字

Internet of Things LoRa LoRaWAN

參考文獻


[1] Andrea, I., Chrysostomou, C. and Hadjichristofi, G., “Internet of Things: Security vulnerabilities and challenges,” 2015 IEEE Symposium on Computers and Communication (ISCC), 2015, p. 180-187.
[2] Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H. and Zhao, W., “A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications,” IEEE Internet of Things Journal, 4(5), 2017, p. 1125-1142.
[3] Yang, Y., Wu, L., Yin, G., Li, L. and Zhao, H., “A survey on security and privacy issues in Internet-of-Things,” IEEE Internet of Things Journal, 4(5), 2017, p. 1250-1258.
[4] Aras, E., Ramachandran, G.S., Lawrence, P. and Hughes, D., “Exploring the security vulnerabilities of LoRa,” 2017 3rd IEEE International Conference on Cybernetics (CYBCONF), 2017, p. 1-6.
[5] Koteshwara, S. and Das, A., “Comparative study of Authenticated Encryption targeting lightweight IoT applications,” IEEE Design & Test, 34(4), 2017, p. 26-33.

延伸閱讀