簡易檢索 / 詳目顯示

研究生: 謝任遠
Hsieh, Jen-Yuan
論文名稱: 在無線感測網路上以感測器集團為基礎的資料集成方法
A Clique-Based Secure Data Aggregation Method for Wireless Sensor Networks
指導教授: 斯國峰
Ssu, Kou-Feng
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電腦與通信工程研究所
Institute of Computer & Communication Engineering
論文出版年: 2010
畢業學年度: 98
語文別: 英文
論文頁數: 25
外文關鍵詞: sensor network, clique, data aggregation
相關次數: 點閱:73下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 資料集成是無線感測網路中的一項重要技術。此技術能減少無線傳輸並節省電力消耗,而電力消耗是無線感測網路中的重要問題。然而資料集成也為攻擊者開啟了一道門戶。受攻擊的集成點可偽造自許多感測器資料所計算出的集成結果,並且使最終的計算結果大幅偏差。此種攻擊方式無法利用資料加密的方式防止,而過去的資料集成協定也難以偵測。這篇論文提出一個新方式以保護資料集成。此種方式在感測網路中建立感測器集團,並利用此架構監測訊息以偵測攻擊行為。模擬結果顯示,此種新方式能夠花費相對較少的額外能量偵測到受攻擊的集成點。

    Data aggregation is an important technology in sensor networks because it reduces the amount of radio transmission and saves energy, which is a critical
    problem in sensor networks. However, data aggregation opens a door to attackers of sensor networks. A compromised aggregator can forge a fake aggregation result standing for a lot of sensor nodes and deviate the final result greatly. Such kind of attacks can not be prevented by data encryption, and are difficult to detect by aggregation protocols before. This thesis proposed a new method to protect data from the attackers. This method constructs cliques over the sensor networks, and uses this structure to monitor messages and detect abnormalities. Simulation results show that this method detect compromised aggregator with relatively small overhead.

    1 Introduction . . . . . 1 2 Related Work . . . . . 4 3 System Model . . . . . 7 3.1 Network Model . . . . . 7 3.2 Attack Model . . . . . 8 4 Secure Data Aggregation Algorithm . . . . . 10 4.1 Aggregation Tree with Cliques . . . . . 10 4.2 Secure Data Aggregation Process . . . . . 12 5 Simulation Evaluation . . . . . 16 5.1 Simulation Environment . . . . . 16 5.2 Simulation Results . . . . . 17 6 Conclusion and Future Work . . . . . 21 6.1 Conclusion . . . . . 21 6.2 Future Work . . . . . 22 References . . . . . 23 Vita . . . . . 25

    [1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A Survey on Sensor Networks," IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, August 2002.
    [2] B. Krishnamachari, D. Estrin, and S. B. Wicker, "The Impact of Data Aggregation in Wireless Sensor Networks," in Proceedings of the 22nd International Conference on Distributed Computing Systems, Washington, DC, USA, July 2002, pp. 575-578.
    [3] C. Intanagonwiwat, D.Estrin, R. Govindan, and J. Heidemann, "Impact of Network Density on Data Aggregation in Wireless Sensor Networks," in Proceedings of the 22nd International Conference on Distributed Computing Systems, vol. 0, Los Alamitos, CA, USA, July 2002, pp. 457-458.
    [4] C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed Diffusion: a Scalable and Robust Communication Paradigm for Sensor Networks," in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, August 2000, pp. 56-67.
    [5] K. Dasgupta, K. Kalpakis, and P. Namjoshi, "An Efficient Clustering-Based Heuristic for Data Gathering and Aggregation in Sensor Networks," in Proceedings of the IEEE Wireless Communications and Networking Conference, vol. 3, March 2003, pp. 1948-1953.
    [6] S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong, "TAG: a Tiny AGgregation Service for Ad-Hoc Sensor Networks," in Proceedings of the 5th Symposium on Operating Systems Design and Implementation, 2002, pp. 131-146.
    [7] Y. Yao and J. Gehrke, "The Cougar Approach to In-Network Query Processing in Sensor Networks," ACM SIGMOD Record, vol. 31, no. 3, pp. 9-18, 2002.
    [8] S. Nath, P. B. Gibbons, S. Seshan, and Z. R. Anderson, "Synopsis Diffusion for Robust Aggregation in Sensor Networks," in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, 2004, pp. 250-262.
    [9] L. Hu and D. Evans, "Secure Aggregation for Wireless Networks," in Proceedings of 2003 Symposium on Applications and the Internet Workshops, vol. 0, Los Alamitos, CA, USA, January 2003, pp. 384-391.
    [10] W. Du, J. Deng, Y. Han, and P. Varshney, "A Witness-Based Approach for Data Fusion Assurance in Wireless Sensor Networks," in Proceedings of Global Telecommunications Conference, 2003, vol. 3, December 2003, pp. 1435-1439.
    [11] K. Wu, D. Dreef, B. Sun, and Y. Xiao, "Secure Data Aggregation without Persistent Cryptographic Operations in Wireless Sensor Networks," in Proceedings of the 25th IEEE International Performance, Computing, and Communications Conference, April 2006, pp. 640-645.
    [12] B. Przydatek, D. Song, and A. Perrig, "SIA: Secure Information Aggregation in Sensor Networks," in Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, November 2003, pp. 255-265.
    [13] Y. Yang, X. Wang, S. Zhu, and G. Cao, "SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks," ACM Transactions on Information and System Security, vol. 11, no. 4, pp. 1-43, 2008.
    [14] D. Westho , J. Girao, and M. Acharya, "Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation," IEEE Transactions on Mobile Computing, vol. 5, pp. 1417-1431, 2006.
    [15] S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," ACM Transactions on Sensor Networks, vol. 2, no. 4, pp. 500-528, 2006.
    [16] "The Keyed-Hash Message Authentication Code (HMAC),"
    http://csrc.nist.gov/publications/PubsFIPS.html, 2008.
    [17] K. Sun, P. Peng, P. Ning, and C. Wang, "Secure Distributed Cluster Formation in Wireless Sensor Networks," in Proceedings of the 22nd Annual Computer Security Applications Conference, December 2006, pp. 131-140.

    下載圖示 校內:2013-02-11公開
    校外:2015-02-11公開
    QR CODE