透過您的圖書館登入
IP:3.128.79.88
  • 學位論文

在感測網路路徑中過濾錯誤資料技術之研究

The Study of En-route Filtering False Data Scheme in Wireless Sensor Networks

指導教授 : 黃仁俊

摘要


在感測網路中,被破解的感測器會造成數種攻擊。而最簡單的方式為假冒某個並沒有真實發生的事件報告或影響真實報告之傳送。若沒有機制來偵測這樣的攻擊行為,不但會造成錯誤的報告而影響整體感測網路感測之正確性,還會使得中繼感測器浪費電力轉送報告。目前有多項技術被提出以改善此一問題。其中主要的作法為事件報告由數個同時感測到此事件的感測器共同背書以取信於基地台。然而,在這種防護機制下,被破解的感測器可以對於真實的事件給予錯誤的背書,而造成真實事件被當成錯誤報告而被過濾掉。在本論文中,對於相關攻擊,我們提出了一個過濾方法。另外,我們亦針對我們方法過濾的有效性、承受度、儲存量與電力節省做分析。最後我們利用模擬來論證我們的方法的各種效能均優於目前現有的方法。

並列摘要


Compromised nodes could launch several attacks in wireless sensor network. The easiest way is to fabricate a report that doesn’t happen actually or to send incorrect data. If undetected, the report could be forwarded to the sink. Such attack will result in not only false alarm but also the energy consumption of intermediate nodes to forward this report. There are many schemes proposed to solve this problem. They use the idea that a legitimate report must consist of several endorsements given by multiple surrounding nodes that also sense the same event. However, the compromised node also can give false endorsement on real event. Such attack will cause the real report to be thought as a false data and be filtered out. In this thesis, we proposed a filtering scheme to counter some related attacks. Moreover, we analyze the filtering effectiveness, the resiliency, storage and energy saving of our scheme. Finally, we also use simulation to demonstrate that the proposed scheme is more efficient than the other solutions.

參考文獻


[1] R. Blom, “An optimal class of symmetric key generation system,” in Eurocrypt’84, Lecture Notes in Computer Science, VOL. 209, Springer-Verlag, pp. 335-338, 1985.
[2] W. Du, J. Deng, Y. S. Han, P. K. Varshney , “A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge” IEEE Transactions on Dependable and Secure Computing, VOL. 3, NO. 1, pp.62-77, 2006.
[4] W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, “An Application- Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE Transactions on Wireless Communications, VOL. 1, NO. 4, pp. 660-670, 2002.
[5] D. Johnson, D.A. Maltz, J. Broch, “The dynamic source routing protocol for mobile ad hoc networks (Internet-Draft),” mobile ad hoc network (MANET) working group, IEFT (1999).
[6] V. Kawadia, P. R. Kumar, “Power Control and Clustering in Ad Hoc Networks,” In INFOCOM, 2003.

延伸閱讀