透過您的圖書館登入
IP:3.141.2.23
  • 學位論文

利用可見光通訊之實用且安全的物聯網設備管理方案

Practical and Secure IoT Device Management using Visible Light

指導教授 : 蕭旭君

摘要


在智慧型工廠的應用情境中,物聯網設備的管理是一項巨大的挑戰。常見的金鑰建立機制並未注重安全性,或者有設計上的缺陷並證實可以被攻擊,抑或是因為預算以及裝置本身規格而難以實際運用。此外,在基於位置的裝置管理中,使用者可以迅速找到裝置的物理位置,並且可以直覺地跟周遭的裝置互動,然而過往的管理方案也並不重視安全性。另一項問題是對已經建立金鑰的裝置進行持續驗證,因為可能會被攻擊者替換為惡意的裝置以干擾工廠正常運作。在這篇論文中,我們提出一個既實務又安全的設備管理方案。這個方案利用了可見光通訊的性質,達成與設備間安全的金鑰交換、從物理上認證裝置的位置以供基於擴增實境的管理介面使用、以及利用已交換的金鑰進行持續驗證及位置更新。我們透過基於藍牙低功耗標準的實作來顯示本文提出方案的可行性,同時對此方案就安全性、可部署性以及可用性進行評估。實驗結果顯示,當同時與多台裝置進行配對時,相較於藍牙低功耗的配對碼輸入驗證,使用我們的實作可以加速達兩倍以上。

並列摘要


In smart factory applications, management of IoT devices is a challenging task. Common bootstrapping practices are either not aware of security, have design flaws and shown vulnerable to attacks, or have deployment difficulties due to budget and form factor constraints. On the other hand, location-based management of devices, in which the user may rapidly locate devices and interact with devices at proximity in an intuitive manner, has not been done securely in previous proposals. Another problem is continuous authentication of bootstrapped devices, as devices might be replaced with malicious ones by attackers in order to disrupt normal operations. In this thesis, we propose a practical yet secure device management solution based on various properties of visible light communication (VLC). VLC enables secure key exchange with peripherals, provide physically authenticated location information for peripheral management in an augmented reality (AR) view, as well as continuous authentication and location update using exchanged keys. We demonstrate the feasibility of proposed scheme with an implementation based on Bluetooth Low Energy (BLE) and evaluate in terms of security, deployability and usability. Experiment results show that when pairing with multiple devices at once, more that 2x speedup is achieved using our implementation compared to BLE Passkey Entry.

參考文獻


[8] C. Cremers. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In Computer Aided Verification, 20th International Conference, CAV
[10] D. Dolev and A. C. Yao. On the Security of Public Key Protocols. IEEE Transactions on Information Theory, 29(2):198–208, 1983.
[11] P. J. Grabner and H. Prodinger. Maximum Statistics of N Random Variables Distributed by the Negative Binomial Distribution. Combinatorics Probability and Computing, 6(2):179–183, 1997.
[12] M. Hermann, T. Pentek, and B. Otto. Design Principles for Industrie 4.0 Scenarios. In Proceedings of the Annual Hawaii International Conference on System Sciences, volume 2016-March, pages 3928–3937, 2016.
[14] A. Jovicic, J. Li, and T. Richardson. Visible light communication: Opportunities, challenges and the path to market. IEEE Communications Magazine, 51(12):26–32, 2013.

延伸閱讀