Efficient Tag Collection and Defense Against DDoS Attacks in the Internet of Things
博士 === 國立成功大學 === 電腦與通信工程研究所 === 105 === Recently, the Internet of Things (IoT) has been maturing. Many devices including personal computers, smart devices, electronic tags, etc. can now connect to the Internet. Users may conveniently monitor and control objects remotely. Some devices have location...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2017
|
Online Access: | http://ndltd.ncl.edu.tw/handle/7tpgcn |
id |
ndltd-TW-105NCKU5652034 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-105NCKU56520342019-05-15T23:47:01Z http://ndltd.ncl.edu.tw/handle/7tpgcn Efficient Tag Collection and Defense Against DDoS Attacks in the Internet of Things 在物聯網中有效的蒐集標籤及防禦分散式阻斷服務攻擊之研究 Shuen-ChihTsai 蔡舜智 博士 國立成功大學 電腦與通信工程研究所 105 Recently, the Internet of Things (IoT) has been maturing. Many devices including personal computers, smart devices, electronic tags, etc. can now connect to the Internet. Users may conveniently monitor and control objects remotely. Some devices have location and network capabilities, and send information to a data center independently. Many physical objects without complex electronic equipment connect to the Internet and be traced by electronic tags. The more popular the IoT is, the more physical objects connect to it, resulting in an ever-increasing number of electronic tags. When the number of electronic tags is large, the time used for tag-collection is substantially different from algorithms. Therefore, this study proposes an efficient tag collection method for a large scale RFID system. The objects will send information to data center, when the environmental parameters change. With popularity of cloud computing recently, IoT and cloud computing are becoming integrated and is attracting more attention. Related technologies are also hot research topics. Virtual switches are deployed in the cloud network. Some factors of virtual switches affect network throughput. This study analyzes the virtual network and finds the critical factors. In addition to transmission capability, a cloud computing service is susceptible to network attacks. There are many malicious internet attacks. Distributed Denial-of-Service Attack (DDoS) is one of the most difficult to defend. This study proposes defending by using Software-Defined Networking (SDN) which effectively prevents attacks before the network melts down. Jung-Shian Li 李忠憲 2017 學位論文 ; thesis 62 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
博士 === 國立成功大學 === 電腦與通信工程研究所 === 105 === Recently, the Internet of Things (IoT) has been maturing. Many devices including personal computers, smart devices, electronic tags, etc. can now connect to the Internet. Users may conveniently monitor and control objects remotely. Some devices have location and network capabilities, and send information to a data center independently. Many physical objects without complex electronic equipment connect to the Internet and be traced by electronic tags. The more popular the IoT is, the more physical objects connect to it, resulting in an ever-increasing number of electronic tags. When the number of electronic tags is large, the time used for tag-collection is substantially different from algorithms. Therefore, this study proposes an efficient tag collection method for a large scale RFID system.
The objects will send information to data center, when the environmental parameters change. With popularity of cloud computing recently, IoT and cloud computing are becoming integrated and is attracting more attention. Related technologies are also hot research topics. Virtual switches are deployed in the cloud network. Some factors of virtual switches affect network throughput. This study analyzes the virtual network and finds the critical factors. In addition to transmission capability, a cloud computing service is susceptible to network attacks. There are many malicious internet attacks. Distributed Denial-of-Service Attack (DDoS) is one of the most difficult to defend. This study proposes defending by using Software-Defined Networking (SDN) which effectively prevents attacks before the network melts down.
|
author2 |
Jung-Shian Li |
author_facet |
Jung-Shian Li Shuen-ChihTsai 蔡舜智 |
author |
Shuen-ChihTsai 蔡舜智 |
spellingShingle |
Shuen-ChihTsai 蔡舜智 Efficient Tag Collection and Defense Against DDoS Attacks in the Internet of Things |
author_sort |
Shuen-ChihTsai |
title |
Efficient Tag Collection and Defense Against DDoS Attacks in the Internet of Things |
title_short |
Efficient Tag Collection and Defense Against DDoS Attacks in the Internet of Things |
title_full |
Efficient Tag Collection and Defense Against DDoS Attacks in the Internet of Things |
title_fullStr |
Efficient Tag Collection and Defense Against DDoS Attacks in the Internet of Things |
title_full_unstemmed |
Efficient Tag Collection and Defense Against DDoS Attacks in the Internet of Things |
title_sort |
efficient tag collection and defense against ddos attacks in the internet of things |
publishDate |
2017 |
url |
http://ndltd.ncl.edu.tw/handle/7tpgcn |
work_keys_str_mv |
AT shuenchihtsai efficienttagcollectionanddefenseagainstddosattacksintheinternetofthings AT càishùnzhì efficienttagcollectionanddefenseagainstddosattacksintheinternetofthings AT shuenchihtsai zàiwùliánwǎngzhōngyǒuxiàodesōujíbiāoqiānjífángyùfēnsànshìzǔduànfúwùgōngjīzhīyánjiū AT càishùnzhì zàiwùliánwǎngzhōngyǒuxiàodesōujíbiāoqiānjífángyùfēnsànshìzǔduànfúwùgōngjīzhīyánjiū |
_version_ |
1719154975171411968 |