English  |  正體中文  |  简体中文  |  Items with full text/Total items : 54907/89265 (62%)
Visitors : 10599756      Online Users : 18
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/34986


    Title: 安全的感測網路資料傳輸技術之研究
    Other Titles: The study of secure data dissemination in wireless sensor networks
    Authors: 林偉聖;Lin, Wei-sheng
    Contributors: 淡江大學資訊工程學系碩士班
    黃仁俊;Hwang, Ren-junn
    Keywords: 無線感測網路;資料傳輸;安全;Wireless sensor networks;Data Dissemination;security
    Date: 2007
    Issue Date: 2010-01-11 05:52:05 (UTC+8)
    Abstract: 無線感測網路最主要的功能就是透過感測器將所感測到的資料傳輸回基地台供分析與處理。大部分感測器均離基地台有一段距離。所以訊息必須透過中間感測器來幫忙轉送。由於感測器的電力資源有限,因此將訊息透過適當的路由機制所建立的路徑來傳送至基地台會較不指定路徑的傳輸方式更省電力。且由於訊息在傳輸的過程中是透過無線傳輸的方式,相較於傳統有線網路訊息更容易遭到竊聽、竄改等攻擊。因此如何建立路由路徑並確保訊息在路徑傳輸中的安全性乃相當重要。除此之外,在訊息傳輸機制中相當重要的一環就是訊息傳輸的可靠性,亦即訊息成功送達目的地的比率。可靠性的高低不僅會受到網路品質的影響,同時在面臨惡意攻擊者時,亦會造成可靠性的下降。最常見的一種攻擊即為選擇性轉送攻擊。這種攻擊會大幅地降低訊息傳輸的可靠性。本論文提一安全感測網路傳輸技術,每個感測器可以建立多條到達基地台的路由路徑,並透過相關的金鑰對訊息做加密與訊息鑑別碼以確保了資料在傳輸過程中的機密性與完整性。同時透過監督機制來監控訊息的傳輸狀態,可降低不良網路狀態亦或是攻擊者發動的選擇性轉送攻擊對於訊息傳輸所造成的影響。
    The main function of wireless sensor networks is to let sensors sense data and send data back to the base station. Most of sensor nodes need the intermediate nodes to help them relay the data. In order to limit the power consumption of the sensor node, we usually use the routing paths created by the proper routing scheme to transmit the data. Because all transmission is done through wireless communications, the data has more chance to be sniffed or tampered with than through wire transmission. So, it is important to establish the routing paths and to ensure the security of the data in the transmission. Besides, another important issue of the data dissemination scheme is the reliability of the transmission. It is not only affected by the quality of the network, but also in face to the attacker. The common attack is selective forwarding attack. This kind of attack will reduce the reliability of the transmission substantially. In our proposed scheme, we let all nodes generate multiple paths back to the base station, and we use the encryption and message authentication code to keep the confidentiality and integrity of the data. We also monitor the transmission status through our monitor method. So, our scheme maintains the high reliability even under the selective forwarding attack caused by the attacker.
    Appears in Collections:[Graduate Institute & Department of Computer Science and Information Engineering] Thesis

    Files in This Item:

    File SizeFormat
    0KbUnknown304View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback