簡易檢索 / 詳目顯示

研究生: 柳智文
Leou, Chih-Wen
論文名稱: 水下移動式感測器網路中以MAD鄰近資訊為基礎之疊代型金鑰佈署
Iterative Key Distribution Based on MAD Neighborhood in Underwater Mobile Sensor Networks
指導教授: 李忠憲
Li, Jung-Shian
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電腦與通信工程研究所
Institute of Computer & Communication Engineering
論文出版年: 2010
畢業學年度: 98
語文別: 英文
論文頁數: 64
中文關鍵詞: 水底移動式感測網路水流模組金鑰佈署安全性
外文關鍵詞: underwater mobile sensor networks, mobility model, key distribution, security
相關次數: 點閱:124下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著水下探測技術的蓬勃發展,分散式的水底無線感測網路扮演起重要角色。但感測器存在被敵方攻擊的風險,未受到保護的傳輸通道也使資訊容易被非法存取。故在使用感測結點探測時,加入安全性的考量成為重要的研究課題。
    本論文針對水底移動式感測器網路的安全性議題,提出相對其他安全性機制節能的金鑰佈署機制。我們使用一個水流模組模擬感測器在海水中的移動,根據感測器所在水流模組的流動特性使用金鑰佈署知識,即分配子金鑰匙中的金鑰共享數目,以達到感測器網路在水流模組中有較強的連結性與安全性,並降低金鑰的浪費。經由場景模擬驗證,我們提出的機制在水流模組中有較好的連結性,並能同時兼顧安全性。

    As underwater monitoring technology is well-developed, the distributed underwater sensor network plays an important role for the exploration of the oceans. But there exists probability that nodes are captured by adversaries. The transmissions in the public underwater channel can be illegally accessed. As a result, it is vital to take the security issue into account while nodes are monitoring the underwater environment.
    Our paper proposed a key distribution scheme which considers the security issue for underwater mobile sensor networks. We adopt a mobility model that catches the movement of the sensors floating with ocean current. Our key distribution scheme with deployment knowledge is designed to fit the characteristics of sensors’ movement. In other words, we assign the common keys between sub-key pools, so that the connection and security can be improved in underwater sensor networks. Our scheme can also reduce redundant keys in the system. The simulation results show our scheme possesses better connectivity and maintain the security.

    Chapter 1 Introduction ................................... 1 1.1 Overview of Underwater Sensor Networks ............... 1 1.2 The Key Agreement Schemes of Network ................. 2 1.3 Motivation ........................................... 4 1.4 Organization ......................................... 5 Chapter 2 Related Work ................................... 6 2.1 Properties of Underwater Sensor Networks.............. 7 2.1.1 Challenges of Underwater Sensor Networks............ 7 2.1.2 Communication Architecture of Underwater Sensor Networks ................................................. 8 2.1.3 The Network Layer for Underwater Sensors .......................................................... 9 2.1.4 Mobility Model .................................... 13 2.1.5 Secure Underwater Communication ................... 15 2.2 The Key Pre-distribution Schemes .................... 16 2.2.1 Fully Pairwise Keys Scheme ........................ 16 2.2.2 Eschenauer-Gligor (EG) Scheme ..................... 16 2.2.3 q-Composite Scheme (CPS) .......................... 17 2.2.4 Random Pairwise Key Scheme ........................ 18 2.2.5 λ-Secure n × n Key Establishment Scheme ........... 19 2.2.6 The Du-Deng-Han-Varshney (DDHV) Scheme ............ 20 2.3 Deployment Knowledge ................................ 21 2.3.1 Setting Up Key Space Pool ......................... 22 Chapter 3 Communication Architecture and Underwater Mobility Model ................................................... 26 3.1 Communication Architecture .......................... 26 3.2 Underwater Mobility Model ........................... 28 Chapter 4 Iterative Key Distribution Scheme for Underwater Sensor Networks ......................................... 35 4.1 Sub-key Pool Generation Phase ....................... 36 4.2 Iterative Key Distribution for Mobile Underwater Sensor Networks ................................................ 40 4.3 Routing Protocol for Secure Underwater Sensor Networks ......................................................... 42 Chapter 5 Simulation Results and Performance Analysis ... 46 5.1 Assumptions and Parameters .......................... 46 5.2 Local Connectivity Result ........................... 48 5.3 Availability of Path Key ............................ 51 5.4 Resilience Analysis ................................. 53 5.5 Routing Result ...................................... 57 Chapter 6 Conclusion .................................... 60 References .............................................. 61

    [1] I. F. Akyildiz, D. Pompili, and T. Melodia, “Underwater Acoustic Sensor Networks: Research Challenges,” Ad Hoc Networks, vol. 2, NO. 3, pp. 257–279, March 2005.
    [2] B.C. Neuman T. Tso, “Kerberos: An Authentication Service for Computer Networks, ”IEEE Comm., vol. 32, NO. 9, pp. 33-38, Sept. 1994.
    [3] A. Perrig, R. Szewczyk, V. Wen, D. Cullar and J.D. Tygar, “SPINS: Security Protocols for Sensor Networks,” Proc. Seventh Ann. ACM/ IEEE Int’l Conf. Mobile Computing and Networking (MobiCom), pp. 189-199, July 2001.
    [4] W. Diffie, “The First Ten Years of Public Key Cryptography,” Proc. IEEE, vol. 76, NO. 5, 99. 560-577, May 1988.
    [5] R. L. Rivest, A. Shamir and L. Adleman, “A Method of Obtaining Digital Signatures and Public-key Cryptosystems,” Communications of the ACM, Vol. 21, NO. 2, pp.120-126, February 1978.
    [6] M.O. Rabin, “Digitalized Signatures and Public Key Functions as Intractable as Factoring,” Tech. Rep. 212, Laboratory for Computer Science, Cambridge, Mass., 1979.
    [7] J. Catipovic, D. Brady, and S. Etchemendy, “Development of Underwater Acoustic Modems and Networks,” Oceanography, vol. 6, pp. 112–119, March 1993.
    [8] E. Cayirci, H. Tezcan, Y. Dogan, and V. Coskun, “Wireless Sensor Networks for Underwater Surveillance Systems,” Ad Hoc Networks, vol. 4, NO. 4, pp. 431–446,
    2006.
    [9] J. Jaffe and C. Schurgers, “Sensor Networks of Freely Drifting Autonomous Underwater Explorers,” in WUWNet’06, Los Angeles, CA, USA, 2006, pp. 93–96, 2006.
    [10] S. Roy, P. Arabshahi, D. Rouseff, and W. Fox, “Wide Area Ocean Networks: Architecture and System Design Considerations,” in WUWNet’06. Los Angeles, CA, USA: ACM Press, 2006, pp. 25–32.
    [11] C.E. Perkins, T.J. Watson, “Highly Dynamic Destination Sequenced Distance Vector Routing (DSDV) for Mobile Computers,” in: Proceedings of ACM SIGCOMM_94, London, UK, 1994.
    [12] P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, L. Viennot, “Optimized Link State Routing Protocol for Ad Hoc Networks,” in: Proceedings of IEEE INMIC, Pakistan, 2001.
    [13] C.E. Perkins, E.M. Belding-Royer, S. Das, “Ad Hoc on Demand Distance Vector (AODV) Routing,” IETF RFC 3561.
    [14] D.B. Johnson, D.A. Maltz, J. Broch, “DSR: The Dynamic Source Routing Protocol for Multi-hop Wireless Ad Hoc Networks,” in: C.E. Perkins (Ed.), Ad Hoc Networking, Addison-Wesley, Reading, MA, pp. 139–172, 2001.
    [15] P. Bose, P. Morin, I. Stojmenovic, J. Urrutia, “Routing with Guaranteed Delivery in Ad Hoc Wireless Networks,” ACM Wireless Networks, vol. 7, NO. 6, pp. 609–616, 2001.
    [16] T. Melodia, D. Pompili, I.F. Akyildiz, “Optimal Local Topology Knowledge for Energy Efficient Geographical Routing in Sensor Networks,” in: Proceedings of IEEE INFOCOM04, Hong Kong SAR, PRC, March, 2004.
    [17] E.M. Sozer, M. Stojanovic, J.G. Proakis, “Underwater Acoustic Networks,” IEEE Journal of Oceanic Engineering, vol. 25, NO. 1, pp. 72-83, 2000.
    [18] M. Stojanovic, “On the Relationship between Capacity and Distance in an Underwater Acoustic Channel,” in Proc. First ACM International Workshop on Underwater Networks (WUWNet), September, 2006.
    [19] G. Xie, J.H. Gibson, “A Network Layer Protocol for UANs to Address Propagation Delay Induced Performance Limitations,” in: Proceedings of IEEE OCEANS_01, Honolulu, HI, vol. 4, pp. 2087–2094, November 2001.
    [20] S. Das, R. Ragupathy, “Routing in Manet and Sensor Networks - A 3d Position Based Approach,” submitted for publication.
    [21] M. Zorzi, R.R. Rao, “Geographic Random Forwarding (GeRaF) for Ad Hoc and Sensor Networks: Energy and Latency Performance,” IEEE Transactions on Mobile Computing, vol.2, NO.4, pp. 349-365, Oct.-Dec. 2003.
    [22] J. Jornet, M. Stojanovic, and M. Zorzi, "Focused Beam Routing Protocol for Underwater Acoustic Networks," Proc. IEEE INFOCOM, Phoenix, AZ, Apirl 2008.
    [23] E. Chassignet, H. Hurlburt, O. Smedstad, G. Halliwell, A. Wallcraft, E. Metzger, B. Blanton, C. Lozano, D. Rao, P. Hogan, and A. Srinivasan, “Generalized Vertical Coordinates for Eddy-resolving Global and Coastal Ocean Forecasts,” Oceanography, NO. 19, pp. 20–31, 2006.
    [24] A. Caruso, F. Paparella, L. Vieira, M. Erol, and M. Gerla, “Meandering Current Model and its Application to Underwater Sensor Networks,” IEEE INFOCOM’08, Apr. 2008.
    [25] A. S. Bower, “A simple kinematic mechanism for mixing fluid parcels across a meandering jet,” J. Phys. Ocean., vol. 21, NO. 1, pp. 173–180, 1991.
    [26] R. M. Samelson, “Fluid exchange across a meandering jet,” J. Phys. Ocean., vol. 22, NO. 4, pp. 431–440, 1992.
    [27] Y. Liu, J. Jing and J. Yang, “Secure Underwater Acoustic Communication Based on a Robust Key Generation Scheme,” IEEE Proceedings of ICSP2008, pp. 1838-1841, 2008.
    [28] L. Eschenauer and V.D. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proc. Ninth ACM Conf. Computer and Comm. Security, pp. 41-47, 2002.
    [29] H. Chan, A. Perrig and D. Song, “Random Key Preditribution Schemes for Sensor Networks,” IEEE Symp. Security and Privacy, pp. 197-213, 2003.
    [30] H. Chan, V.D. Gligor, A. Perrig and G. Muralidharan, “On the Distribution and Revocation of Cryptographic Keys in Sensor Networks,” IEEE Transactions on Dependable and Secure Computing, vol. 2, NO. 3, July-September 2005.
    [31] R. Blom, “An Optimal Class of Symmertric Key Generation Systems,” Advances in Cryptology: Proc. EROCRYPT ’84, pp. 335-338, 1985.
    [32] C. Blundo, A.D. Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, “Perfectly-Secure Key Distribution for Dynamic Conferences,” Lecture Notes in Computer Science, vol. 740, pp. 471-486, 1993.
    [33] W. Du, J. Deng, Y. Han and P. K. Varshney, “A Pairwise Key Predistribution Scheme for Wireless Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS 2003), pp. 42-51, Oct.2003.
    [34] W. Du, J. Deng, Y. S. Han and P. K. Varshney, “A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge,” IEEE Transactions on Dependable and Secure Computing, vol. 3, NO. 1, January-March 2006.
    [35] J.M. Jornet and M. Stojanovic, "Distributed Power Control for Underwater Acoustic Networks," in Proc. IEEE Oceans'08 Conference, Quebec City, Canada, Sep. 2008.

    無法下載圖示 校內:2020-01-01公開
    校外:不公開
    電子論文尚未授權公開,紙本請查館藏目錄
    QR CODE