题名

適用於無線感測網路之分散重新編程協定之改進

作者

蔡國裕;余浩宇;呂崇富

关键词

無線感測網路 ; 重新編程 ; 秘密金鑰破解

期刊名称

資訊安全通訊

卷期/出版年月

19卷4期(2013 / 10 / 01)

页次

42 - 50

内容语文

繁體中文

中文摘要

在無線感測網路(wireless sensor network,簡稱WSN)中,無線重新編程(wireless reprogramming)乃為更新感測節點之程式碼或改變其功能的程序。2012年,He等人於提出適用於感測網路之可重新編程協定(發表於IEEE Transactions on Industrial Electronics,Vol. 59,No. 11,2012)。同年,He等人(發表於IEEE Transactions on Industrial Electronics,Vol. 60,No. 11,2013)指出存在秘密金鑰破解問題(private key compromised problem),並提出兩種改進方法。Yeo等人隨後指出He等人所提出之第一種改進方法亦遭受秘密金鑰破解(發表於IEEE Communication Letters,2013)。本篇論文將基於身分基底橢圓曲線密碼系統,設計一個適用於無線感測網路之分散重新編程安全協定。再者,基於橢圓曲線離散對問題(elliptic curve discrete logarithm problem,簡稱ECDLP),我們將分析所提出之協定達到程式映像之真確性(authenticity of program image)、程式映像之完整性(integrity of program image)、更新性(freshness)及容錯性。

主题分类 基礎與應用科學 > 資訊科學
参考文献
  1. Blake, I.,Seroussi, G.,Smart, N.(1999).Elliptic Curves in Cryptography.Cambridge:Cambridge University Press.
  2. Bui, N.,Ugus, O.,Dissegna, M.,Rossi, M.,Zorzi, M.(2010).An integrated system for secure code distribution in wireless sensor networks.Proceedings of the 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops),Mannheim, Germany:
  3. Doh, I.,Lim, J.,Chae, K.(2013).Code updates based on minimal backbone and group key management for secure sensor networks.Mathematical and Computer Modelling,57(11-12),2801-2813.
  4. Dutta, P. K.,Hui, J. W.,Chu, D. C.,Culler, D. E.(2006).Securing the deluge network programming system.Proceedings of the 5th International Conference on Information Processing in Sensor Networks (IPSN'06),Nashville, Tennessee, United States:
  5. He, D.,Chan, S.,Chen, C.,Bu, J.(2012).Secure and efficient dynamic program update in wireless sensor networks.Security and Communication Networks,5(7),823-830.
  6. He, D.,Chen, C.,Chan, S.,Bu, J.(2012).SDRP: A secure and efficient reprogramming protocol for wireless sensor networks.IEEE Transaction on Industrial Electronics,59(11),4155-4163.
  7. He, D.,Chen, C.,Chan, S.,Bu, J..Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks.IEEE Transaction on Industrial Electronics,60(11),5348-5354.
  8. Hyun, S.,Ning, P.,Liu, A.,Du, W.(2008).Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks.Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN'08),St. Louis, Missouri, United States:
  9. Law, Y.,Zhang, Y.,Jin, J.,Palaniswami, M.,Havinga, P.(2011).Secure rateless deluge: Pollution-resistant reprogramming and data dissemination for wireless sensor networks.EURASIP Journal on Wireless Communications and Networking,2011,1-22.
  10. Lim, C.(2011).Secure code dissemination and remote image management using short-lived signatures in WSNs.IEEE Communication Letter,15(4),362-364.
  11. Luo, R. C.,Chen, O.(2012).Mobile sensor node deployment and asynchronous power management for wireless sensor networks.IEEE Transaction on Industrial Electronics,59(5),2377-2385.
  12. Menezes, A.(1993).Elliptic Curve Public Key Cryptosystems.Norwell, MA, USA:Kluwer Academic Publishers.
  13. Merkle, R.(1980).Protocols for public key cryptosystems.Proceedings of the IEEE Symposium on Security and Privacy,Oakland, California, United States:
  14. Parra, C.,Garcia-Macias, J.(2009).A protocol for secure and energy-aware reprogramming in WSN.Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly (IWCMC'09),Leipzig, Germany:
  15. Schneier, B.(1996).Applied Cryptography: Protocols, Algorithms, and Source Code in C.New York:John Wiley & Sons.
  16. Tan, H.,Zic, J.,Jha, S.,Ostry, D.(2011).Secure multihop network programming with multiple one-way key chains.IEEE Transactions on Mobile Computing,10(1),16-31.
  17. Yeo, S.L.,Yap, W.S.,Liu, J.K.,Henricksen, M.(2013).Comments on analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions.IEEE Communication Letters,17(8),1521-1523.
  18. Zhang, R.,Zhang, Y.,Ren, K.(2009).DP2AC: Distributed privacy-preserving access control in sensor networks.Proceedings of IEEE INFORCOM 2009 (the 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies),Rio de Janeiro, Brazil: