Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/52797
標題: 建構一安全的無線感測網路商業應用環境之研究
The Study of Constructing a Secure Business Application Environment for Wireless Sensor Network.
作者: 林詠章
關鍵字: 資訊科學軟體;應用研究
摘要: 
由於近年來無線感測節點的快速發展,例如感測節點的成本、功能、微處理器等。因此無線感測網路在近年來在商業上有著非常大量的應用,例如:生產線品管控制、盜竊預防、物件追蹤…等等。在本計劃中,我們將會建構一個安全的無線感測網路商業應用環境,為了維持使用者傳送資料的機密性,首先將提出一個安全有效率的無線感測網路的金鑰管理機制,包含感測節點加入和離開時的金鑰分配與階層式結構下節點的分群機制。接著提出一個多使用者廣播鑑別機制,多個使用者可以在無線感測網路範圍中漫遊,並且發送請求封包至感測網路中,收到此請求封包之感測節點將會回傳使用者所想要的資訊給使用者。由於可能會有惡意使用者的存在,因此對於使用者的群播訊息必須進行認證。解決了金鑰管理與使用者鑑別的問題後,我們預計發展一個應用在無線感測網路的環境下的安全計價機制。使用者通過登入驗證機制後,可向節點傳送感測需求,節點在傳送訊息時以廣播加密的方式,只有合法的使用者才有辦法解開秘密資訊。並提出依照使用者使用服務的計價機制,根據使用者的服務記錄去計費,能有效防止合法使用者把授權憑證任意散布的問題。我們將針對整個無線感測網路架構的資訊安全以及計算量做深入探討,並確保所需花費的計算量在合理的範圍之內。

Recently, there is a great quantity of applications in wireless sensor network due to therapid development of sensors, such as cost, capability, microprocessor, and so on. Wirelesssensor networks have a large number of commercial applications, such as: production linequality control, theft prevention, Object Tracking ... and more. In our proposal, we will build asecure business applications in wireless sensor network. First we propose a key managementscheme conclude solving the problem of key distribution and Clustering of sensor nodes, italso proposed a method called multi-user broadcast authentication, which users can roamaround in the sensor network and send queries to the sensor network. Sensor nodes whichreceive the queries can reply with information which users want to know. The messageswhich users send have to be verified by nodes because of the existence of malicious users. Atthe same time, the cost of computation can be minimal. Furthermore, we propose a securevaluating-institution of hierarchical sensor networks. After user passes thelogin-authentication, it can send query to nodes. The node sends the message in broadcastencryption method, and only legitimate users have a way to decrypt the secret information.The valuating-institution we proposed, according the service record to the billing and it canprevent legitimate users to distribute authorized certification to any other user. We willfocus on the wireless sensor network architecture and do in-depth discussion for informationsecurity and the amount of calculating, and ensure that the required computational cost of areasonable range.
URI: http://hdl.handle.net/11455/52797
其他識別: NSC100-2410-H005-046
Appears in Collections:資訊管理學系

Show full item record
 
TAIR Related Article

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.