跳到主要內容

簡易檢索 / 詳目顯示

研究生: 林栢全
Po-Chuan Lin
論文名稱: 無線感測網路試驗環境之分析和實作安全程式更新協定
Analysis and Implementation of Secure Reprogramming Protocols on Wireless Sensor Networks
指導教授: 許健平
Jand-Ping Sheu
口試委員:
學位類別: 碩士
Master
系所名稱: 資訊電機學院 - 資訊工程學系
Department of Computer Science & Information Engineering
畢業學年度: 96
語文別: 英文
論文頁數: 23
中文關鍵詞: 程式擴散作業系統程式更新協定安全機制無線感測網路
外文關鍵詞: Code dissemination, operating systems, reprogramming protocols, security, wireless sensor networks
相關次數: 點閱:8下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在無線感測環境中,無線遠端更新協定是很重要的議題。當感測器散佈在網路中時,我們必須要確定每一個感測器能夠透過無線接收到應用程式的更新。在這篇論文中,我們在自己設計的第一代感測器(Octopus I)上實作三個最近提出的安全程式更新協定。這三個安全程式更新協定的作業系統使用的是微型作業系統(TinyOS),三種協定都是在洪水(Deluge)程式更新協定上建立安全機制。因此我們需要把微型作業系統
    (TinyOS)和洪水(Deluge)程式更新協定移植到我們設計的感測器平台(Octopus I)上。最後,我們使用我們的感測平台來展現三種安全程式更新協定的效能。


    Remote reprogramming protocol is an important issue in wireless sensor networks. As a remote code is distributed to the networks, we need to be sure that each sensor node can
    receive the remote code securely through wireless medium. In this paper, we implement three recently proposed secure reprogramming protocols on our self-designed sensor nodes,
    named Octopus. The three secure reprogramming protocols are implemented on TinyOS with Deluge reprogramming protocol. Therefore, we need to port the TinyOS and Deluge protocol on our Octopus platform. Finally, we present the performance of the three reprogramming protocols executed on Octopus sensor nodes.

    Chapter 1 Introduction............................1 Chapter 2 Related Work..............................................3 Chapter 3 Implementations Three Secure Reprogramming Protocols.........................................6 3.1 Porting TinyOS on Octopus Sensor Node........ 6 3.2 Implementation of Three Secure Reprogramming Protocols ....................................... 11 Chapter 4 Experiment and Evaluation of Secure Reprogramming Protocols........................................ 16 Chapter 5 Conclusion............................. 21 References....................................... 22

    [1] A. Dunkels, B. Gr‥onvall, and T. Voigt, “Contiki - a lightweight and_exible operating system for tiny networked sensors,” in Proceedings of the First IEEE Workshop on Embedded Networked Sensors, Tampa, Florida, USA, November 2004.
    [2] C.-C. Han, R. Kumar, R. Shea, E. Kohler and M. Srivastava, “A Dynamic Operating System for Sensor Nodes,” in Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, pp. 163-176, New York, NY, USA, 2005.
    [3] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, “System Architecture Directions for Networked Sensors”, in Proceedings of International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 93-104, Cambridge, MA, USA, November 2000.
    [4] J. W. Hui and D. Culler, “The dynamic behavior of a data dissemination protocol for network programming at scale,” in Proceedings of the 2th ACM Conference on Embedded Networked Sensor Systems, Baltimore, Maryland, USA, November 2004.
    [5] J. Deng, R. Han, and S. Mishra, “Secure code distribution in dynamically programmable wireless sensor networks,” in Proceedings of the Fifth International Conference on Information Processing in Sensor Networks , TN, USA, April 2006.
    [6] J. -P. Sheu, B. -K. Hsu, P. -C. Lin, and C. -J. Chang, “Design and Implementation of a Lightweight Operating System for Wireless Sensor Networks,” in Proceeding of International Computer Symposium, Taipei, Taiwan, December 2006
    [7] L. A. Phillips, “Aqueduct: Robust and efficient code propagation in heterogeneous wireless sensor networks,” Master’s thesis, University of Colorado at Boulder, 2005.
    [8] P. Levis, N. Patel, D. Culler, and S. Shenker, “Trickle: A self-regulating algorithm for code propagation,” in Proceedings of the First USENIX/ACM Symposium on Networked
    23 Systems Design and Implementation, San Francisco, USA, March 2004.
    [9] S. -S. Kulkarni and M. Arumugam, “INFUSE: A TDMA based data dissemination protocol for sensor networks,” Technical report, Michigan State Uni., East Lansing, MI, USA, 2004.
    [10] S. -S. Kulkarni and L. Wang, “Mnp: Multihop network reprogramming service for sensor networks.” In 25th International Conference on Distributed Computing Systems ,
    Columbus, OH, June 2005.
    [11] P. -K. Dutta, J. -W. Hui, D. -C. Chu, and D. -E. Culler, “Securing the Deluge network programming system,” in Proceedings of the Fifth International Conference on
    Information Processing in Sensor Networks , TN, USA, April 2006.
    [12] P. -E. Langigan, R. Gandhi and P. Narasimhan, “Sluice: Secure Dissemination of Code Updates in Sensor Networks,” In the 26th International Conference on Distributed Computing Systems, July 2006.
    [13] R. Gennaro and P. Rohatgi, “How to sign digital streams,” Information and Computation, 165(1):100–116, 2001.
    [14] T. Stathopoulos, J. Heidemann, and D. Estrin, “A remote code update mechanism for wireless sensor networks,” Technical Report CENS-TR-30, University of California, Los Angeles, Center for Embedded Networked Computing, November 2003.
    [15] IEEE 802.15.4 Standard, http://www.ieee802.org/15/pub/TG4.html
    [16] AVR JTAGICE mkII, http://www.atmel.com/
    [17] AVR ISP mkII, http://www.atmel.com/

    QR CODE
    :::