簡易檢索 / 詳目顯示

研究生: 趙永剛
Zhao, Yong-Gang
論文名稱: 基於權杖之管理平台:以醫療穿戴式裝置為例
The Study on Token-based Management Platform : Using Medical Wearable Device as a Case
指導教授: 楊竹星
Yang, Chu-Sing
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電腦與通信工程研究所
Institute of Computer & Communication Engineering
論文出版年: 2016
畢業學年度: 104
語文別: 中文
論文頁數: 54
中文關鍵詞: 物聯網雲端平台醫療穿戴式裝置Token管理平台
外文關鍵詞: IoT, Mediacl Wearable device, Management Platform, Privacy, Token
相關次數: 點閱:134下載:7
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 物聯網技術,由英國企業家Kevin Ashton於1999年在Auto-ID實驗室首次提出,一直發展至今。隨著德國政府的高科技計劃——工業4.0的提出,讓這個已經發展了十幾年的技術又一次成為了大家研究的熱門話題。伴隨著無線通訊技術與感測器技術的不斷發展,物聯網構建出了感知層,網路層和應用層三層架構,為物聯網的應用提供了堅實的理論基礎。但是物聯網裝置具有低功耗、存儲空間有限和計算能力不足等特點,讓裝置的可靠性,運算性能,安全性以及保密性受到了影響。面對物聯網裝置產生的資料無法得到很好的處理、存儲以及管理等挑戰與問題,另一項技術的應用,恰恰彌補了上述的不足,這項技術就是雲端平台技術。雲端平台技術利用其存儲、計算、可靠和安全上的優勢為物聯網應用帶來了新的發展。
    科技的產生就是為瞭解決社會問題,IoT與Cloud兩種技術整合下的發展,應用在了人類社會的多個領域,在醫療領域的應用尤為有意義。當今社會人口老年化問題日益嚴重以及醫療資源分佈不均等問題不斷凸顯,面對這樣的社會問題,恰恰可以利用物聯網技術來實現,以達到方便、快捷的就診或者身體檢查的目的。通過穿戴式裝置上的感測器,獲知使用者的身體生理特徵,配合雲端平台技術,將這些生理特徵進行有效的存儲、管理與計算,為使用者和醫生提供可供參考的意見。但是,便捷的同時,也隱藏著危險,穿戴式裝置的使用者的隱私保護在沒有保護下及其容易洩露。因此,本研究就提出了一種基於Token的醫療穿戴式裝置管理平台架構,利用Token的不可逆性為使用者提供了一套安全的隱私保護機制,並針對醫療領域的特殊性,設置了不同的服務類別、優先級別、安全級別等屬性。不但保護了使用者的安全隱私,還能提供更好的服務。
    本研究在理論基礎之上,根據資料庫的合理規劃、功能的合理設計,完成了管理平台的建設,並且通過網路模擬工具對本研究的機制進行了逐一驗證,配合平台管理詳細地展現了所連接裝置的狀態資訊。

    With the rapid development of IoT technology, it has been applied in many fields. Using the IoT technology, the more and more traditional things become wisdom. The issues of computing, storage space, the stability of the system, and the security of the system have become more and more important. The researchers developed the technology of network platform which makes an excellent complement to the IoT. Applying the perfect integration of the two technologies in the medical field, remote medical, mobile medical used to solve the social issues of old man treatment, and the distribution of medical resources etc. The wearable device as the infrastructure of these intelligent medical systems is convenient to use, and the management platform provides a visual Graphical interface to the users and doctors, that the collections of physical signs are clearly displayed. But there is a challenge that is the user's privacy protection.
    In order to protect personal privacy, a mechanism for solving this issue that is a token-based management platform concept is proposed in this dissertation. The personal information will be replaced by a token when the user employs a wearable medical device. Along with the division of services, the token is equipped with priority, service category, security level properties. In this dissertation, the management platform is realized through the rational planning data relationship and the mechanism functions showing as the website. And also the network simulation tool is utilized to verify the project.

    論文證明書 I 摘要 II Abstract III 誌謝 V 表目錄 VIII 圖目錄 IX 第一章 緒論 1 1.1 研究背景 1 1.2 研究動機與目的 3 1.3 論文架構 4 第二章 文獻探討 5 2.1 物聯網及其在醫療領域的應用 5 2.1.1 物聯網 5 2.1.2 雲端平台與物聯網的整合 8 2.1.3 移動醫療 9 2.2 物聯網安全現狀 10 2.2.1 物聯網安全 10 2.2.2 隱私保護 11 第三章 平台架構 14 3.1 平台介紹 14 3.2 資料庫規劃 15 3.2.1 Token Management Center資料庫模式 16 3.2.2 Cloud Server資料庫模式 17 3.3 平台功能設計 20 3.3.1 Token註冊功能設計 20 3.3.2 Token更新功能設計 21 3.3.3 Token的服務類別功能設計 22 3.3.4 Token的優先級別功能設計 24 3.3.5 Token的安全級別功能設計 25 3.3.6 Sensor Data上傳功能設計 27 3.3.7 Bulk-Data上傳功能設計 28 3.3.8 異常事件處理功能設計 30 3.4 API 介面協議 32 第四章 平台實現與實驗 34 4.1 平台環境介紹 34 4.2 平台實現展示 35 4.3 驗證Token機制 40 4.3.1 Token 註冊功能 40 4.3.2 資料上傳功能 41 4.3.3 Token的優先級別功能 43 4.3.4 Token的服務類別功能 44 4.3.5 Token的安全級別功能 45 4.3.6 異常事件處理功能 45 4.3.7 Token更新功能 49 第五章 結論與未來工作 50 5.1 結論 50 5.2 未來工作 50 參考文獻 52

    [1] Industry 4.0. https://en.wikipedia.org/wiki/Industry_4.0
    [2] Auto-Id Labs. http://www.autoidlabs.org/
    [3] M. Aazam, I. Khan, A. A. Alsaffar, and E.-N. Huh, "Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved," in 11th International Bhurban Conference on Applied Sciences and Technology, 2014, pp. 414-419.
    [4] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions," Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013.
    [5] I. Peña-López, "ITU Internet report 2005: the internet of things," 2005.
    [6] T. Fei, C. Ying, X. Li Da, Z. Lin, and L. Bo Hu, "CCIoT-CMfg: Cloud Computing and Internet of Things-Based Cloud Manufacturing Service System," IEEE Transactions on Industrial Informatics, vol. 10, no. 2, pp. 1435-1442, 2014.
    [7] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, no. 4, pp. 393-422, 2002.
    [8] G. Kortuem, F. Kawsar, V. Sundramoorthy, and D. Fitton, "Smart objects as building blocks for the Internet of things," IEEE Internet Computing, vol. 14, no. 1, pp. 44-51, 2010.
    [9] S. Haykin, "Cognitive radio: brain-empowered wireless communications," IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201-220, 2005.
    [10] F. Michahelles, F. Thiesse, A. Schmidt, and J. R. Williams, "Pervasive RFID and Near Field Communication Technology," IEEE Pervasive Computing, vol. 6, no. 3, pp. 94-96, 2007.
    [11] S. Dobson, S. Denazis, A. Fernández, D. Gaïti, E. Gelenbe, F. Massacci, et al., "A survey of autonomic communications," ACM Transactions on Autonomous and Adaptive Systems, vol. 1, no. 2, pp. 223-259, 2006.
    [12] L. Chen, M. Tseng, and X. Lian, "Development of foundation models for Internet of Things," Frontiers of Computer Science in China, vol. 4, no. 3, pp. 376-385, 2010.
    [13] R. Khan, S. U. Khan, R. Zaheer, and S. Khan, "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges," in 10th International Conference on Frontiers of Information Technology 2012, pp. 257-260.
    [14] J. Zhou, T. Leppänen, E. Harjula, M. Ylianttila, T. Ojala, C. Yu, et al., "Cloudthings: A common architecture for integrating the internet of things with cloud computing," in 17th International Conference on Computer Supported Cooperative Work in Design, 2013, pp. 651-657.
    [15] P. Zikopoulos and C. Eaton, Understanding big data: Analytics for enterprise class hadoop and streaming data: McGraw-Hill Osborne Media, 2011.
    [16] S. Aguzzi, D. Bradshaw, M. Canning, M. Cansfield, P. Carter, G. Cattaneo, et al., "Definition of a Research and Innovation Policy Leveraging Cloud Computing and IoT Combination," European Commission, Directorate-General of Communications Networks, Content & Technology, Brussels, Belgium, Rep. SMART, no. 2013/0037, 2014.
    [17] K.-D. Chang, C.-Y. Chen, J.-L. Chen, and H.-C. Chao, "Internet of things and cloud computing for future internet," in Security-Enriched Urban Computing and Smart Grid, Springer, 2011, pp. 1-10.
    [18] B. P. Rao, P. Saluia, N. Sharma, A. Mittal, and S. V. Sharma, "Cloud computing for Internet of Things & sensing based applications," in Sixth International Conference on Sensing Technology, 2012, pp. 374-380.
    [19] G. C. Fox, S. Kamburugamuve, and R. D. Hartman, "Architecture and measured characteristics of a cloud based internet of things," in International Conference on Collaboration Technologies and Systems 2012, pp. 6-12.
    [20] A. Zaslavsky, C. Perera, and D. Georgakopoulos, "Sensing as a service and big data," arXiv preprint arXiv:1301.0159, 2013.
    [21] P. Parwekar, "From internet of things towards cloud of things," in 2nd International Conference on Computer and Communication Technology, 2011, pp. 329-333.
    [22] K. Patrick, W. G. Griswold, F. Raab, and S. S. Intille, "Health and the mobile phone," American journal of preventive medicine, vol. 35, no. 2, pp. 177-181, 2008.
    [23] Jawbone. https://jawbone.com/
    [24] Apple Watch. http://www.apple.com/watch/
    [25] C. Wang, W. Lu, M. R. Narayanan, S. J. Redmond, and N. H. Lovell, "Low-power technologies for wearable telecare and telehealth systems: A review," Biomedical Engineering Letters, vol. 5, no. 1, pp. 1-9, 2015.
    [26] H. Ding, Y. Moodley, Y. Kanagasingam, and M. Karunanithi, "A mobile-health system to manage chronic obstructive pulmonary disease patients at home," in 2012 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012, pp. 2178-2181.
    [27] S. Patel, B. r. Chen, T. Buckley, R. Rednic, D. McClure, D. Tarsy, et al., "Home monitoring of patients with Parkinson's disease via wearable technology and a web-based application," in 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology, 2010, pp. 4411-4414.
    [28] W. Yang, K. Yang, H. Jiang, Z. Wang, Q. Lin, and W. Jia, "Fetal heart rate monitoring system with mobile internet," in International Symposium on Circuits and Systems, 2014, pp. 443-446.
    [29] L. Lan, "Study on security architecture in the Internet of Things," in Measurement, Information and Control 2012, pp. 374-377.
    [30] J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Wireless sensor network security: A survey," in Security in distributed, grid, mobile, and pervasive computing, Y. Xiao, Ed., Auerbach Publications, CRC Press, 2006.
    [31] E. Korkmaz and A. Ustundag, "Standards, Security & Privacy Issues about Radio Frequency Identification (RFID)," in 1st Annual RFID Eurasia, 2007, pp. 1-10.
    [32] Y. Ping, "Privacy Security in Mobile RFID Networks," Journal of Chongqing College of Electronic Engineering, vol. 19, no. 1, pp. 34-35, 2010.
    [33] O. Savry and F. Vacherand, "Security and privacy protection of contactless devices," in The Internet of Things, Springer, 2010, pp. 409-419.
    [34] S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt, and U. Roedig, "Securing communication in 6LoWPAN with compressed IPsec," in International Conference on Distributed Computing in Sensor Systems and Workshops, 2011, pp. 1-8.
    [35] C. M. Medaglia and A. Serbanati, "An overview of privacy and security issues in the internet of things," in The Internet of Things, Springer, 2010, pp. 389-395.
    [36] B. V. Sundaram, M. Ramnath, M. Prasanth, and J. Varsha Sundaram, "Encryption and hash based security in Internet of Things," in 3rd International Conference on Signal Processing, Communication and Networking, 2015, pp. 1-6.
    [37] H. Kumarage, I. Khalil, A. Alabdulatif, Z. Tari, and X. Yi, "Secure Data Analytics for Cloud-Integrated Internet of Things Applications," IEEE Cloud Computing, vol. 3, no. 2, pp. 46-56, 2016.
    [38] A. Görlach, A. Heinemann, and W. W. Terpstra, "Survey on location privacy in pervasive computing," in Privacy, Security and Trust within the Context of Pervasive Computing, Springer, 2005, pp. 23-34.
    [39] K. Wang, J. Bao, M. Wu, and W. Lu, "Research on security management for Internet of things," in International Conference on Computer Application and System Modeling, 2010.
    [40] Internet_Security_Association_and_Key_Management_Protocol. https://en.wikipedia.org/wiki/Internet_Security_Association_and_Key_Management_Protocol
    [41] C. Karlof, N. Sastry, U. Shankar, and D. Wagner, "TinySec: TinyOS link layer security proposal- version 1.0," July 2002.
    [42] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: Security protocols for sensor networks," Wireless networks, vol. 8, no. 5, pp. 521-534, 2002.
    [43] F. Delgosha, E. Ayday, and F. Fekri, "MKPS: a multivariate polynomial scheme for symmetric key-establishment in distributed sensor networks," in International conference on Wireless communications and mobile computing, 2007, pp. 236-241.
    [44] W. Conway, "How Enterprises Can Use Tokenization to Reduce Risk and Minimize the Cost of PCI DSS Compliance," 2011.
    [45] Z. C. Nxumalo, P. Tarwireyi, and M. O. Adigun, "Towards privacy with tokenization as a service," in 6th International Conference on Adaptive Science & Technology, 2014, pp. 1-6.
    [46] B. ODUSOTE, S. Misra, and M. Adigun, "Towards Developing Grid-based Portals for E-Commerce on-Demand Services on a Utility Computing Platform," in Electronic Engineering and Computer Science, 2013, pp. 81-87.

    下載圖示 校內:2021-09-01公開
    校外:2021-09-01公開
    QR CODE