RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      (A) Secure and Efficient Low-power Bootstrapping and Commissioning Protocol for 6LoWPAN

      한글로보기

      https://www.riss.kr/link?id=T11968510

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      This thesis is devoted to define a novel bootstrapping protocol for 6LoWPAN (IPv6 based Lowpower Wireless Personal Area Network). Bootstrapping is the way of associating a new node with a specific network with or without minimum human intervention and...

      This thesis is devoted to define a novel bootstrapping protocol for 6LoWPAN (IPv6 based Lowpower Wireless Personal Area Network). Bootstrapping is the way of associating a new node with a specific network with or without minimum human intervention and gets connected with the desired network. Generally, the gateway or the Personal Area Network (PAN) coordinator of a 6LoWPAN network is multihop away from new sensor nodes. In this thesis, we propose a novel protocol ?gLow-power Bootstrapping and Commissioning Protocol (LBCP)?h for 6LoWPAN which satisfies multihop property of 6LoWPAN. In our protocol we assume three different kinds of sensor nodes called a new device as LBD, an already bootstrapped device as
      LBA, and the gateway or the PAN coordinator as LBS. An LBA helps an LBD to communicate with the LBS and eventually gets connected with the network. For secure authentication of new sensor nodes we propose to use existing EUI-64 address and ?gjoin key?h which are known by the LBS. We call this method as centralized approach. We also introduce the concept of semidistributed approach where ?gjoin keys?h of new nodes are randomly distributed to agent nodes or LBAs, and LBAs can perform bootstrapping actions without help of the LBS. We propose two novel LBA selection algorithms to select the best LBA in the bootstrapping phase for both
      centralized and semi-distributed approaches. To prevent denial-of-service (DoS) attack in the bootstrapping phase we provide some roles to LABS and already commissioned devices, and define a blacklisting policy in the LBS. To show the effectiveness of our protocol we simulate our protocol in a discrete event simulator called QualNet. The simulation results show that our protocol is scalable as well as efficient in terms of number of control packets exchanged in the bootstrapping phase and average end-to-end delay between LBD and LBS. We compare LBCP with basic flooding scheme where bootstrapping is performed using only broadcast of request and reply messages. Latter, we discuss about various security attacks in bootstrapping phases and how we can provide solution for those attacks. Finally, we argue that the usage of agent nodes is very useful for secure network bootstrapping of 6LoWPAN.

      더보기

      목차 (Table of Contents)

      • Chapter 1: Introduction ....................... ?] 1 ?]
      • 1.1 Contribution ..............................?] 3 ?]
      • 1.2 Organization of This Dissertation ........ ?] 3 ?]
      • Chapter 2: Related Works ...................... ?] 4 ?]
      • Chapter 3: Background ......................... ?] 6 ?]
      • Chapter 1: Introduction ....................... ?] 1 ?]
      • 1.1 Contribution ..............................?] 3 ?]
      • 1.2 Organization of This Dissertation ........ ?] 3 ?]
      • Chapter 2: Related Works ...................... ?] 4 ?]
      • Chapter 3: Background ......................... ?] 6 ?]
      • 3.1 Background of 6LoWPAN .................... ?] 6 ?]
      • 3.2 Neighbor Discovery In 6LoWPAN ............ ?] 6 ?]
      • 3.3 Terminology .............................. ?] 8 ?]
      • 3.4 Routing In 6LoWPAN ....................... ?] 9 ?]
      • Mesh-under Routing .......................... ?] 10 ?]
      • Route-over Routing .......................... ?] 11 ?]
      • Chapter 4: Problem statement and assumptions... ?] 13 ?]
      • 4.1 Problem Statement ........................ ?] 13 ?]
      • 4.2 Assumptions .............................. ?] 13 ?]
      • 4.3 Motivation and design choices ............ ?] 14 ?]
      • Chapter 5 Proposed Protocol ................... ?] 16 ?]
      • 5.1 Centralized Approach ..................... ?] 17 ?]
      • LBA Selection Phase ......................... ?] 17 ?]
      • Network Joining Phase ....................... ?] 19 ?]
      • Short Address Assignment .................... ?] 21 ?]
      • Obtaining IPv6 Address ...................... ?] 21 ?]
      • Preventing DoS Attack ....................... ?] 22 ?]
      • 5.2 Semi?]Distributed Approach .................?] 22 ?]
      • LBA Selection Phase ......................... ?] 22 ?]
      • Network Joining Phase ....................... ?] 26 ?]
      • Short Address Assignment .................... ?] 27 ?]
      • Obtaining IPv6 Address ...................... ?] 27 ?]
      • Preventing DoS Attack ....................... ?] 28 ?]
      • Chapter 6: Evaluation ......................... ?] 29 ?]
      • 6.1 Implementation .......................... ?] 29 ?]
      • 6.2 Evaluation Process ....................... ?] 29 ?]
      • Chapter 7: Security Analysis .................. ?] 33 ?]
      • 7.1 Possible Security Attacks ................ ?] 33 ?]
      • Attacks from LBDs ........................... ?] 33 ?]
      • Attacks From LBAs ........................... ?] 33 ?]
      • Attack From the LBS ......................... ?] 33 ?]
      • 7.2 Countermeasures for The Attacks ......... ?] 33 ?]
      • Attacks From LBDs ............................?] 33 ?]
      • Attacks From LBAs ........................... ?] 34 ?]
      • Attack From the LBS ......................... ?] 34 ?]
      • Chapter 8: Conclusion & Future Works .......... ?] 35 ?]
      • Reference ................................... ?] 36 ?]
      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼