Please use this identifier to cite or link to this item:
DC FieldValueLanguage
dc.contributorChih-Yu Wenen_US
dc.contributor.advisorYen-Chieh Ouyangen_US
dc.contributor.authorChang, Hung-Chaoen_US
dc.identifier.citation[1]M. Eltoweissy, M. Moharrum. and R. Mukkamala” Dynamic key management in sensor networks”, Communications Magazine, IEEE, Vol. 44, pp. 122 - 130, 2006. [2]H. Huang and K. Liu,” A New Dynamic Access Control in Wireless Sensor Networks”, Asia-Pacific Services Computing Conference, pp. 901 - 906, 2008. [3]Z. Zhao, Y. Liu, H. Li and Y. Yang, “An Efficient User-to-User Authentication Scheme in Peer-to-Peer System”, First International Conference on Intelligent Networks and Intelligent Systems, pp. 263 - 266, 2008. [4]A. S. Poornima and B. B. Amberker, “Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks”, International Journal of Recent Trends in Engineering, Vol 1, No. 1, May 2009 [5]B. Maala, H. Bettahar and A. Bouabdallah, “Performances of Key Management schemes in Wireless Sensor Networks”, World Scientific Review Volume-9.75in*6.5in, May 28, 2008 [6]P. Mohanty, S. Panigrahi, N. Sarma and S.S. Satapathy, “A symmetric key based secured data gathering protocol for WSN”, International Conference on Anti-counterfeiting, Security, and Identification in Communication, pp. 138 - 143, 2009. [7]C. Hsueh, Y. Li, C. Wen and Y. Quyang, “Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks”, Journal of Sensors, pp. 1251-1278, 2010 [8]J. Zhang and V. Varadharajan, “A New Security Scheme for Wireless Sensor Networks”, Global Telecommunications Conference, pp. 1-5, 2008. [9]S. Muhammad Khaliq-ur-Rahman Raazi, Z. Pervez and S. Lee; ” Key Management Schemes of Wireless Sensor Networks: A Survey”, Department of Computer Engineering, Kyung Hee University, Global Campus, Korea [10]L. Li, J. Li, L. Tie and J. Pan, ”ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks”, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Vol.2, pp. 262-267, 2007. [11]L. SHEN and X. SHI, “A Dynamic Cluster-based Key Management Protocol in Wireless Sensor Networks”, INTERNATIONAL JOURNAL OF INTELLIGENT CONTROL AND SYSTEMS, Vol. 13, No. 2, pp. 146-151, 2008, [12]M.F. Younis, K. Ghumman, and M. Eltoweissy, ”Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks”, IEEE Transactions on Parallel and Distributed Systems, Vol. 17, No. 8, August 2006. [13]J. Kim, J. Cho, S. Jung and T. Chung; “An Energy-Efficient Dynamic Key Management in Wireless Sensor Networks”, Conference on Advanced Communication Technology, The 9th International, Vol.3, pp. 2148 - 2153, 2007. [14]J. Zhou, C. Li, Q. Cao and Y. An, ”Intrusion-tolerant Secure Routing Protocol with Key Exchange for Wireless Sensor Network”, International Conference on Information and Automation, pp. 1547 - 1552, 2008. [15]A. S. Poornima, B. B. Amberker and H. B. Jadhav, “An energy efficient deterministic key establishment scheme for clustered Wireless Sensor Networks”, International Conference on High Performance Computing, pp. 189 - 194, 2009. [16]B. Bruhadeshwar, K. Kothapalli, M. Poornima and M. Divya, “Routing Protocol Security Using Symmetric Key Based Techniques”, International Conference on Availability, Reliability and Security, pp. 193 - 200, 2009 [17]I. H. Chuang, W. T. Su, C. Y. Wu, J. P. Hsu and Y. H. Kuo, “Two-layered Dynamic Key Management in Mobile and Long-lived Cluster-based Wireless Sensor Networks”, Wireless Communications and Networking Conference, pp.4145 - 4150, 2007. [18]T. Samuel and Jr. Redwine, “A Logic for the Exclusion Basis System”, The 37th Hawaii International Conference on System Sciences, 2004. [19]M. Rahman, S. Sampalli and S. Hussain, “A robust pair-wise and group key management protocol for wireless sensor network”, GLOBECOM Workshops, pp. 1528 - 1532, 2010. [20]D. Niu, Y. Y. Yao and T. T. Wang, “Improved Group-key-management Scheme for WSN”, International Colloquium on Computing, Communication, Control, and Management, Vol. 4, pp.330 - 333, 2009. [21]N.F.P 180-1. Secure hash standard. Draft, NIST, May 1994 [22]R.Rivest The MD5 message-digest algorithm. RFC 1321, April 1992.zh_TW
dc.description.abstract金鑰管理主要目標,是在通信節點之間動態建立及維持安全的通道。所以針對感測網路,已提出無數的金鑰管理架構。在感測網路中,金鑰管理預期的特點,是包含能源效率意識、局部影響攻擊,並且能擴展運用到大規模的節點網路,而最主要挑戰,是如何在管理中求取平衡,提供可接受的安全等級以及保留少數資源間,特別是能源管理,對於網路運作是非常需要的,因為感測節點所能擁有的能源非常非常有限。 許多架構中,如果已採用金鑰預先分配為主要原則,及基本假設一個相對靜態的暫時存在網路,也就是網路節點不常擴充,而且金鑰的生命期不時常更換或縮短,則被稱為靜態架構。另外一種新興起的架構級別,稱為動態金鑰管理架構,是假設一個頻繁新增節點的長態性存在網路,為了維持網路安全性及存活能力,需要要求網路內部不斷重新產生金鑰,用以因應網路型態的改變與調整。 在這篇文章中,我們將首先描述在感測網路中不同型式的攻擊,因為無線網路通常應用於軍隊的應用及無人看管的無線環境,所以在提出新的金鑰架構前,先分析攻擊型態,加強架構的安全性。動態金鑰管理方式非常適合於感測網路中,因為感測網路為了符合環境需求,網路型態經常需要予以調整至最佳狀態。所以為了配合網路節點數量的增、減,我們將採用動態金鑰管理架構,並加上我們所提出改良的互斥基底系統(The Exclusion Basis System, EBS)金鑰組預置方式,也就是集群式EBS系統,可隨時配合感測網路規模調整金鑰組設置方式及數量,用以保留感測節點中稀有的儲存空間。之後再以區域組合式金鑰方式,也就是將大型感測網路,劃分為數個叢集所組成,在以叢集基礎下,再劃分成兩個層級,也就是叢集首領與節點為一個層級,通信閘道與通信閘道為另外一個層級,分別進行金鑰認證,加強其安全性及效率。最後將探討其效能及安全性,並與其他現行金鑰架構比較,來證明我們所提出的架構可符合金鑰管理架構預期的目標。zh_TW
dc.description.abstractThe objective of key management is to dynamically establish and maintain secure channels among communicating nodes, so a lot of key management schemes have been proposed for sensor networks. Desired features of key management in sensor networks include energy awareness, localized impact of attacks, and scaling to a large number of nodes. A primary challenge is how to make a balance in management between providing acceptable levels of security and conserving scarce resources, in particular energy, needed for network operations. Many schemes, key pre-distribution is used as the main principles and basic assumptions of short-term existence of a relatively static network, which is not often expended network node, and the key is to replace or shorten the life of the infrequent, referred to as static schemes. In addition the rise of a new architecture-level, known as dynamic key management scheme, a frequent assumption that the long-term existence of new network nodes in order to maintain network security and survivability, thus requiring network re-generate the key, in response to network type of change and adjustment. In this article, we will first describe the wireless sensor networks of different types of attacks, because wireless networks are usually used in military applications and wireless unattended environment, so the new key in the proposed scheme before analysis attack patterns, strengthening the scheme for security. Dynamic key management is very suitable for sensor networks because sensor networks to comply with environmental requirements, network types often need to be adjusted to the optimum condition. So in order to meet the increasing number of network nodes, subtract, we will use dynamic key management scheme, plus an improved system of EBS (The Exclusion Basis System) preset mode key group, which is the cluster EBS systems, sensor network at any time with the key group of settings to adjust the size and number of ways to keep the node in the rare storage space. After the key combination to the regional approach is the large-scale sensor network, divided into several clusters formed in the cluster basis, and then divided into two levels, that is, a cluster head and node level, the cluster leader and communications gateway to another level, key certification, respectively, to enhance the safety and efficiency. Finally, we discuss the issues about the efficacy and safety, and with other existing key scheme for comparison, to prove that our proposed scheme can meet the key management scheme of the desired objectives.en_US
dc.description.tableofcontents誌謝辭 i 中文摘要 ii Abstract iv 目錄 vi 圖目錄 viii 表目錄 ix 第一章 緒論 1 1.1 研究背景與動機 1 1.2 架構新構想 4 1.3 論文組織架構 5 第二章 研究背景 6 2.1 單一集群式金鑰(Single Group Key for a Network) 6 2.2 配對金鑰架構(Pair-wise Key Establishment) 6 2.3 隨機配對金鑰(Random Pair-wise Key Establishment) 7 2.4 網格基礎的金鑰預置(Grid-based Key Pre-distribution) 7 2.5 互斥基底系統(The Exclusion Basis System,EBS) 7 2.6 SHELL 金鑰管理架構 10 2.7 區域組合金鑰 (Localized Combinatorial Keying, LOCK) 12 第三章 兩階層動態金鑰架構 15 3.1 集群式EBS系統(Grouping EBS,G-EBS) 16 3.1.1 Grouping EBS under One-Way Hash Function 16 3.1.2 Grouping Based EBS under Cluster Distribution 18 3.2 新的金鑰認證協定規劃原則 19 3.3 新的金鑰認證協定內容 23 3.3.1 符號說明 23 3.3.2 環境條件說明 24 3.3.3 金鑰預置階段 25 3.3.4 各叢集節點與叢集首領間金鑰認證 27 3.3.5 通信閘道與通信閘道金鑰認證 30 3.3.6 增加或刪除節點階段 32 3.3.7 跨叢集訊息傳遞 32 第四章 安全性與效能分析 35 4.1 安全性分析 35 4.2. 特性分析 37 4.2.1 延展性 37 4.2.2 節點硬體需求及通訊成本分析 38 4.2.3 訊息傳遞效能分析 39 4.2.4 與其他EBS認證架構比較 40 第五章 結論與未來研究 41 5.1 結論 41 5.2 未來研究 41 參考文獻 42zh_TW
dc.subjectWireless Sensor Networksen_US
dc.subjectstatic key managementen_US
dc.subjectdynamic key managementen_US
dc.subjectcluster headen_US
dc.subjectExclusion Basis Systemen_US
dc.titleA Two layers Dynamic Key Management Schemes for Cluster-Based Wireless Sensor Networksen_US
dc.typeThesis and Dissertationzh_TW
item.openairetypeThesis and Dissertation-
item.fulltextno fulltext-
Appears in Collections:電機工程學系所
Show simple item record

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.