透過您的圖書館登入
IP:18.226.159.33
  • 學位論文

在無線感測網路中使用ECQV隱式憑證發展輕量化安全感測資料聚合方法

A Lightweight Secure Sensed Data Aggregation Scheme based on ECQV Implicit Certificate for Wireless Sensor Networks

指導教授 : 楊明豪 羅嘉寧
本文將於2027/08/29開放下載。若您希望在開放下載時收到通知,可將文章加入收藏

摘要


無線感測網路(Wireless Sensor Networks, WSNs)透過許多感測節點蒐集諸如溫度、濕度、壓力、聲音等環境資訊,並結合資料聚合方法將資料傳輸至基地台。但由於感測節點的電池能量有限,計算資源與儲存空間亦相當匱乏,並且網路中之訊息皆透過公開通道進行傳輸,導致攻擊者可能竊聽(Eavesdropping)、攔截(Intercepting)或竄改(Tampering)感測節點所傳送的訊息,破壞網路安全性。 是以,本研究提出一個基於叢集式架構之輕量化安全感測資料聚合方法,將無線感測網路中的感測節點分成多個Cluster,並且結合特殊路由策略,透過Cluster Head之間互相轉送資料,提高資料蒐集之效率。在本方法中,我們使用ECQV技術提高認證效率,使任意兩節點能夠互相交換ECQV隱式憑證且無需透過基地台便能完成雙向認證,並且也在傳輸訊息中加入隨機數,令本方法能夠有效抵禦重送攻擊、非同步攻擊、假冒攻擊以及中間人攻擊。藉由以上安全機制,我們可以防止攻擊者假冒感測節點或是透過重送攻擊來繞過認證,最終可讓無線感測網路能夠安全且有效率地蒐集感測資料。 最後,我們透過效能與安全性分析之結論得知,本方法可提供給資料聚合方法最完整的安全性,能認證訊息來源且有效地保護網路中傳輸之感測資料,並且相較其他協定而言僅需犧牲一點點效能,也就是說,本方法能夠在效能與安全性上達到最佳平衡。

並列摘要


Wireless Sensor Networks (WSNs) using the enormous amount of sensor nodes and data aggregation techniques to gather data (temperature, humidity, pressure, acoustic, etc.) from the surrounding environment. However, sensor nodes are often limited by constrained power, computational ability, and storage. Also, all the messages in the network are all transmitted through a public channel, it means that the messages sent by sensor nodes could be eavesdropped, intercepted, or tampered, which will lead to the network security being compromised. Therefore, in this paper, we propose a cluster-based lightweight secure sensed data aggregation scheme. By dividing sensor nodes in a WSN into multiple clusters, combining special routing strategy, and using inter-cluster data forwarding, we increase the efficiency of data collection. Furthermore, we use ECQV technique to achieve an efficient authentication. Our scheme makes two arbitrary sensor nodes exchange ECQV implicit certificate to each other to complete mutual authentication without getting involved with the base station and also adds random number into transmitted messages. Hence, we can effectively resist replay attack, asynchronous attack, impersonation attack, and man-in-the-middle attack. With the above security mechanism, we can prevent attackers from impersonating sensor nodes or replaying messages to bypass authentication. Eventually, we can provide a secure and efficient data aggregation scheme for WSNs. Finally, the performance and security analyses show that the proposed scheme can provide the most complete security for a data aggregation technique, verify the source of messages, and effectively protect the sensed data transmitted in the network, with just a little bit of performance sacrificed. That is to say, the proposed scheme can achieve the best balance between performance and security.

參考文獻


[1] E. Cayirci, H. Tezcan, Y. Dogan, and V. Coskun, "Wireless sensor networks for underwater survelliance systems," Ad hoc networks, vol. 4, no. 4, pp. 431-446, 2006.
[2] S. H. Lee, S. Lee, H. Song, and H. S. Lee, "Wireless sensor network design for tactical military applications: Remote large-scale environments," in MILCOM 2009-2009 IEEE Military communications conference, 2009: IEEE, pp. 1-7.
[3] M. P. Đurišić, Z. Tafa, G. Dimić, and V. Milutinović, "A survey of military applications of wireless sensor networks," in 2012 Mediterranean conference on embedded computing (MECO), 2012: IEEE, pp. 196-199.
[4] K. Maraiya, K. Kant, and N. Gupta, "Wireless sensor network: a review on data aggregation," International Journal of Scientific & Engineering Research, vol. 2, no. 4, pp. 1-6, 2011.
[5] G. Dhand and S. Tyagi, "Data aggregation techniques in WSN: Survey," Procedia Computer Science, vol. 92, pp. 378-384, 2016.

延伸閱讀