Please use this identifier to cite or link to this item:
標題: 應用於無線感測網路之非同步安全測距研究
Secure Asynchronous Ranging for Wireless Sensor Networks
作者: 林世昌
Lin, Shih-Chang
關鍵字: Wireless Sensor Networks
Secure Distance Estimation
Secure Localization
出版社: 電機工程學系所
引用: 參考文獻 [1] 方煒, "無所不在的網路與無線感測" ,台灣農業資訊科技發展協會,Taita 電子報第1期, 2006年,。 [2] 陳俊國, "直接序列超寬頻與多頻帶正交分頻多工訊號在無線感測網路 中分散式測距上之應用",國立中興大學電機工程學系95年度碩士論 文。 [3] Chih-Yu Wen, Robin D. Morris, and William A. Sethares, “Distance Estimation Using Bidirectional Communications Without Synchronous Clocking,” IEEE Transactions on Signal Processing, vol. 55, no. 5, Part I, pp. 1927-1939, May 2007. (SCI) [4] D. Liu, P. Ning, and W. Du, “Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks,” 25th ICDCS, 2005, pp.609–19. [5] ANTONIO A. F. LOUREIRO, AZZEDINE BOUKERCHE, ORACIO A. B. F. OLIVEIRA “Secure Localization Algorithms for Wireless Sensor Networks” IEEE Communications Magazine ‧ April 2008 [6] H. A. Oliveira et al., “Directed Position Estimation: A Recursive Localization Approach for Wireless Sensor Networks,” 14th IEEE Int’l. Conf. Comp. Commun. and Networks, San Diego, CA, Oct. 2005, pp.557–62. [7] T. He et al., “Range-Free Localization Schemes for Large Scale Sensor Networks,” MobiCom ’03: Proc. 9th Annual Int’l. Conf. Mobile Comp. and Networking, New York: ACM Press, 2003, pp. 81–95. [8] J. Albowicz, A. Chen, and L. Zhang, “Recursive Position Estimation in Sensor Networks,” 9th Int’l. Conf. Network Protocols, Nov. 2001, pp.35–41. [9] D. Niculescu and B. Nath, “Ad Hoc Positioning System (APS),” IEEE GLOBECOM ’01), San Antonio, TX, Nov. 2001, pp. 2926–31. [10] L.Lazos and R. Poovendran, “Hirloc: High-Resolution Robust Localization for Wireless Sensor Networks,” IEEE JSAC, vol. 24, Feb.2006, pp. 233–46. [11] L. Lazos and R. Poovendran, “Serloc: Secure Range Independent Localization for Wireless Sensor Networks,” Proc. WiSe ’04, 2004, pp.21–30. [12] L. Lazos, R. Poovendran, and S. Capkun, “Rope: Robust Position Estimation in Wireless Sensor Networks,” Proc.IPSN, Apr. 2005, pp.44 324–31. [13] S. Capkun and J.-P. Hubaux, “Secure Positioning of Wireless Devices with Application to Sensor Networks,” INFOCOM ’05, Miami, FL, Mar. 2005. [14] A. Srinivasan, J. Teitelbaum, and J. Wu, “DRBTS: Distributed Reputation-Based Beacon Trust System,” 2nd IEEE DASC, 2006, pp.277–83. [15] Z. Li et al., “Robust Statistical Methods for Securing Wireless Localization in Sensor Networks,” IPSN ’05,2005, pp. 12. [16] D. Liu, P. Ning, and W. Du, “Attack-Resistant Location Estimation in Sensor Networks,” IPSN ’05: Proc. 4th Int’l.Symp. Info. Processing in Sensor Networks, 2005, pp. 13. [17] W. Du, L. Fang, and P. Ning, “Lad: Localization Anomaly Detection for Wireless Sensor Networks,” 19th IPDPS, 2005, pp. 41.1. [18] N. Sastry, U. Shankar, and D. Wagner, “Secure Verification of Location Claims,” WiSe ’03, N2003, pp. 1–10. [19] S. Gezici, T. Zhi, G. B. Giannakis, H. Kobayashi, A. F. Molisch, H. V. Poor, and Z. Sahinoglu, “Localization via ultra-sideband radios: A look at positioning aspects for future sensor networks,” IEEE Signal Process. Mag., vol. 22, no. 4, pp. 70–84, Jul. 2005. [20] E. C. Fieller, “The distribution of the index in a normal bivariate population,”Biometrika, vol. 24, no. 3–4, pp. 428–440, 1932. [21] D. V. Hinkley, “On the ratio of two correlated normal random variables,” Biometrika, vol. 56, no. 3, pp. 635–639, 1969. [22] R.Ware and F. Lad, “Approximating the distribution for sum of product of normal variables,” Math. and Statis. Dept., Canterbury Univ.,Canterbury,U.K.,2003. [23] Crossbow Technology Inc. Wireless sensor networks. /Products/Wireless Sensor_Networks.htm. Accessed in February 2004. [24] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. S. J. Pister.System architecture directions for networked sensors. In Architectural Support for Programming Languages and Operating Systems, pages 93–104, 2000. [25] C.-Y. Wen, J.-K. Chen, and W. A. Sethares, “Joint Distributed Clustering and Ranging for Wireless Ad-Hoc Sensor Networks,” (to appear in Proceedings of IEEE VTC2007-Spring, Dublin, April 45 2007). [26] F. Zhao and L. Guibas, Wireless Sensor Networks: An Information Processing Approach, Morgan Kaufmann, CA, 2004.
摘要: 中文摘要 在無線感測網路的環境,無線感測器位置資訊的取得必須仰賴定位技 術。然而,精準的定位又必須以距離量測技術做為基礎。由於網路安全在 無線感測網路中是非常重要的議題,因此安全的測距,能提供無線感測網 路在運算感測器位置時一個安全上的基礎。本論文以非同步測距技術 (Distance Estimation Via Asynchronous Clocks,DEVAC)為理論基礎,提 出了一個非同步安全測距(Secure Distance Estimation Via Asynchronous Clocks (SDEVAC))方法,利用非同步無線感測器間通訊延遲之物理特性 (如:內部元件延遲、時鐘不同步的差異及感測器通訊等待延遲時間等) 來檢查無線感測器身份是否正確,並更新網路節點資訊,以提高測距資訊 的可靠度及準確性,進而達到安全測距之目的。由模擬實驗可知, SDEVAC 方法能提供無線感測網路一個安全的距離量測機制。 關鍵詞:無線感測網路、安全距離量測、安全定位技術
Abstract A fundamental problem when locating sensors in a network is to estimate the distance between pairs of sensors. Since security of sensor networks is vulnerable in the wireless environment, this thesis proposes a secure ranging scheme which can provide secure position information for wireless sensor applications. By generalizing the asynchronous distance estimation technology (Distance Estimation Via Asynchronous Clocks; DEVAC), a secure asynchronous distance estimation method (Secure Distance Estimation Via Asynchronous Clocks; SDEVAC) is presented. Based on the physical property of a device, the communication delay (for example: internal component delay, difference of the clocks, and the sensor waiting time) between two wireless sensors may be used to identify the normal wireless sensors, to renew the network node information, to enhance the reliability of distance estimation, and to achieve the aim of secure ranging. The method is shown to be feasible for identifying malicious sensor nodes in the network. Keywords: Wireless Sensor Networks、Secure Distance Estimation、 Secure Localization
其他識別: U0005-0802201016330000
Appears in Collections:電機工程學系所



Show full item record
TAIR Related Article

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.