博碩士論文 108426019 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:8 、訪客IP:3.135.247.188
姓名 周劭鴻(Shao-Hung Chou)  查詢紙本館藏   畢業系所 工業管理研究所
論文名稱 以流程導向設計區塊鏈支援的智能車聯網平台
(Process-oriented design of a Blockchain-Supported Smart Vehicle-to-Everything Platform)
相關論文
★ 應用MFM 與PPM 監控協同設計之執行流程★ 應用DSM與DRFT於汽車電子之協同開發流程
★ 一協同設計專案團隊組成方法- 以安全監視器產品為例★ 應用認知工程開發全球化光纖通訊系統
★ 羽絨產業策略規劃-應用品質機能展開分析法★ 重電業協同專案管理績效之研究-以變電所統包工程為例
★ 以屬性導向新產品開發之流程塑模與分析– 以醫療器材產業為案例★ 以品質機能展開法應用於主管管理職能之建構
★ 應用參考模型以及流程建模改善供應鏈績效-以投影機產業為例★ 協同產品開發之流程管理 - 以汽車零件為例
★ 配電系統之高壓電纜接頭供應商評選★ 應用品質機能展開於產品開發之流程分析-以刀鋒式伺服器為例
★ 實施精實六標準差改進製程良率-以機頂盒表面黏著技術為例★ 太陽能模組產業之決策營運研究
★ 新產品開發階段導入替代料之流程建模及潛在風險分析★ 應用實驗設計研發PET複合膜及改善厚膜翹曲問題
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 (2025-7-10以後開放)
摘要(中) 從第一台汽車的出現至今為止,汽車的歷史已達百年以上。配合電腦軟硬體設備的提升,汽車的躍進發展成了自動化、智能化汽車、信 息娛樂和遠程信息處理的階段。電腦協助執行眾多新功能的同時,使現在的人們享受著更為方便的駕駛環境。
近年車聯網( Internet of Vehicles)的興起,使具有網路功能的車輛,從原本基礎的交通運輸功能,搖身成了結合通訊、娛樂與生活的行動總部。駕駛僅須在車內便能透過資訊平台隨時掌握車輛所有資訊,其中資訊平台包含了多樣的服務,例如:高速公路車載流量平台、車載娛樂系統平台、車內資訊平台。然而通訊技術的成熟,卻也留下了網路威脅的伏筆。若 網路駭客遠端操控車輛,甚至駭入系統,同時操作多台車輛,
竊取企業機密或駕駛資 訊,危害將遠遠大於你我想像。 因此為了保護汽車駕駛人及車載相關資料的隱私,如何利用相關的技術保護車載網路不受到惡意駭客入侵和竊取車載資訊,變得極其重要。
本研究將以資通業者的角度,運用新穎的區塊鏈技術以解決資訊安全問題的風險。本研究以 智能 汽 車為主設計的整合資訊平台為例。藉由統一塑模語言( Unified Modeling Language, UML),使平台的開發達成具體化、視覺化及文件化的效果。並透過流程的結果建立設計結構矩陣( Design Structure Matrix, DSM),利用矩陣和圖形的方法來 呈現各平台的關聯性。藉此了解平台之間的獨立性、相依性與交互耦合性之關聯屬性以利 設計出一套兼具安全與便利的平台,達成 智能汽 車資訊及駕駛資料保護的目標。
摘要(英) With the rise of the Internet of Vehicles in recent years, vehicles with network functions have transformed from their original basic transportation functions into a mobile headquarters that combines communications, entertainment, and life. Drivers only need to be in the car to grasp all the information of the vehicle at any time through the information platform, which contains a variety of services. However, the maturity of communication technology has also left behind the foreshadowing of cyber threats. If a cyber hacker remotely controls a vehicle, or even hacks into the system, and operates multiple vehicles at the same time to steal corporate secrets or driving information, the harm will be far greater than you or I imagined. Therefore, in order to protect the privacy of car drivers and car-related data, how to use relevant technologies to protect the car network from malicious hackers and steal car information becomes extremely important.
This research will use novel blockchain technology to solve the risks of information security issues from the perspective of information providers. This research takes as an example an integrated information platform designed mainly for smart cars. By unifying the modeling language, the development of the platform can achieve the effects of concrete, visual, and documented. And through the results of the process, the design structure matrix is established, and the matrix and graphics are used to show the relevance of each platform. In this way, we can understand the related attributes of the independence, interdependence, and interaction coupling between platforms to facilitate the design of a safe and convenient platform to achieve the goal of intelligent vehicle information and driving data protection.
關鍵字(中) ★ 車聯網
★ 區塊鏈技術
★ 統一塑模語言
關鍵字(英) ★ Internet of Vehicles,
★ Blockchain Technology
★ UML
★ DSM
論文目次 摘要.....................................................i
Abstract................................................ii
目錄...................................................iii
圖目錄..................................................vi表目錄................................................viii
第一章 緒論............................................1
1-1 研究背景..........................................1
1-2 研究目的..........................................2
1-3 研究架構..........................................3
第二章 文獻探討........................................4
2-1 智能汽車相關之技術.................................4
2-1-1 車內系統控制平台.................................4
2-1-2 車載隨意網路.....................................6
2-1-3 車用行動商務.....................................7
2-2 智能汽車之要求.....................................7
2-2-1 對智能汽車的安全要求..............................7
2-2-2 智能車之安全威脅.................................9
2-3 區塊鏈技術........................................12
2-3-1 區塊鏈之核心技術................................13
2-3-2 區塊鏈構.......................................18
2-3-3 區塊鏈特性......................................19
2-3-4 區塊鏈技術的應用................................20
第三章 研究方法.......................................22
3-1 統一塑模語言......................................22
3-1-1 UML之簡介......................................22
3-1-2 UML之圖形介紹...................................23
3-2 設計結構矩陣......................................43
3-2-1 設計結構矩陣之簡介..............................43
3-2-2 設計結構矩陣之構造..............................43
3-2-3 相關性.........................................44
3-2-4 建模流程.......................................45
3-2-5 設計結構矩陣之類型與型態.........................46
3-2-6 設計結構矩陣之分析法.............................47
第四章 研究方法應用...................................49
4-1. 平台描述........................................49
4-2. 應用統一塑模語言.................................50
4-2-1. 使用案例圖.....................................51
4-2-2. 活動圖........................................53
4-2-3. 類別圖........................................53
4-2-4. 循序圖........................................55
4-2-5. 元件圖........................................58
4-2-6. 佈署圖........................................59
4-3. 應用設計結構矩陣.................................60
4-3-1. 初始設計結構矩陣建立............................61
4-3-2. 集群化後之設計結構矩陣..........................62
第五章 結論與建議.....................................65
5-1. 研究結論........................................65
5-2. 研究限制........................................66
5-3. 後續研究建議.....................................66
參考文獻................................................67
參考文獻 [1]游峰碩(2017)。UML物件導向系統分析與設計 第三版。博碩文化。7-2-7-5。
[2]黃仁伯(2009)。物件導向系統分析與設計。旗標出版股份有限公司。
[3]鄭炳強(2007)。軟體工程從實務出發 初版。智勝文化事業有限公司。
[4]藍崑展、黃崇明(2011)。車載通訊原理、服務與應用。台灣東華書局股份有限公司。
[5]Ahl, A., Yarime, M., Tanaka, K., & Sagawa, D. (2019). Review of blockchain-based distributed energy: Implications for institutional development. Renewable and Sustainable Energy Reviews, 107, 200-211.
[6]Antonopoulos, A. M. (2014). Mastering Bitcoin: unlocking digital cryptocurrencies. " O′Reilly Media, Inc.".
[7]Bernardini, C., Asghar, M. R., & Crispo, B. (2017). Security and privacy in vehicular communications: Challenges and opportunities. Vehicular Communications, 10, 13-28.
[8]Bhushan, B., Khamparia, A., Sagayam, K. M., Sharma, S. K., Ahad, M. A., & Debnath, N. C. (2020). Blockchain for smart cities: A review of architectures, integration trends and future research directions. Sustainable Cities and Society, 61, 102360.
[9]Browning, T. R. (2001). Applying the design structure matrix to system decomposition and integration problems: a review and new directions. IEEE Transactions on Engineering management, 48(3), 292-306.
[10]Casey, M. J., & Vigna, P. (2018). The truth machine: the blockchain and the future of everything. St. Martin′s Press.
[11]Chang, S. E., Chen, Y.-C., & Wu, T.-C. (2019). Exploring blockchain technology in international trade. Industrial Management & Data Systems.
[12]Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., & Kohno, T. (2011). Comprehensive experimental analyses of automotive attack surfaces. USENIX Security Symposium,
[13]Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). Blockchain technology: Beyond bitcoin. Applied Innovation, 2(6-10), 71.
[14]El-Rewini, Z., Sadatsharan, K., Selvaraj, D. F., Plathottam, S. J., & Ranganathan, P. (2020). Cybersecurity challenges in vehicular communications. Vehicular Communications, 23, 100214.
[15]Eppinger, S. D., & Browning, T. R. (2012). Design structure matrix methods and applications. MIT press.
[16]Hamida, E. B., Brousmiche, K. L., Levard, H., & Thea, E. (2017). Blockchain for enterprise: overview, opportunities and challenges. The Thirteenth International Conference on Wireless and Mobile Communications (ICWMC 2017),
[17]Helmig, E. (2014). Legal aspects of ISO 26262. ISO26262 Conference,
[18]Hoppe, T., Kiltz, S., & Dittmann, J. (2008). Security threats to automotive CAN networks–practical examples and selected short-term countermeasures. International Conference on Computer Safety, Reliability, and Security,
[19]Kang, J., Yu, R., Huang, X., Maharjan, S., Zhang, Y., & Hossain, E. (2017). Enabling localized peer-to-peer electricity trading among plug-in hybrid electric vehicles using consortium blockchains. IEEE Transactions on Industrial Informatics, 13(6), 3154-3164.
[20]Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395-411.
[21]Kim, S. (2018). Blockchain for a trust network among intelligent vehicles. In Advances in Computers (Vol. 111, pp. 43-68). Elsevier.
[22]Komalavalli, C., Saxena, D., & Laroiya, C. (2020). Overview of Blockchain Technology Concepts. In Handbook of Research on Blockchain Technology (pp. 349-371). Elsevier.
[23]Momeni, S., & Fathy, M. (2008). VANET′s Communication. 2008 IEEE 10th International Symposium on Spread Spectrum Techniques and Applications,
[24]Morgan, Y. L. (2010). Notes on DSRC & WAVE standards suite: Its architecture, design, and characteristics. IEEE Communications Surveys & Tutorials, 12(4), 504-518.
[25]Raya, M., Papadimitratos, P., Gligor, V. D., & Hubaux, J.-P. (2008). On data-centric trust establishment in ephemeral ad hoc networks. IEEE INFOCOM 2008-The 27th Conference on Computer Communications,
[26]Rippel, E. (2008). Embedded Security Challenges in automotive designs. Proc. Workshop on Embedded Security in Cars,
[27]Ruddle, A., Ward, D., Weyl, B., Idrees, S., Roudier, Y., Friedewald, M., Leimbach, T., Fuchs, A., Gürgens, S., & Henniger, O. (2009). Deliverable D2. 3: Security requirements for automotive on-board networks based on dark-side scenarios. EVITA project.
[28]Schinckus, C. (2020). The good, the bad and the ugly: An overview of the sustainability of blockchain technology. Energy Research & Social Science, 69, 101614.
[29]Shrestha, R., Bajracharya, R., Shrestha, A. P., & Nam, S. Y. (2020). A new type of blockchain for secure message exchange in VANET. Digital communications and networks, 6(2), 177-186.
[30]Talib, M. A., Alnanih, R., & Khelifi, A. (2020). Application of quality in use model to assess the user experience of open source digital forensics tools. International Journal of Electronic Security and Digital Forensics, 12(1), 43-76.
[31]Tuohy, S., Glavin, M., Hughes, C., Jones, E., Trivedi, M., & Kilmartin, L. (2014). Intra-vehicle networks: A review. IEEE Transactions on Intelligent Transportation Systems, 16(2), 534-545.
[32]Varshney, U. (2004). Vehicular mobile commerce. Computer, 37(12), 116-118.
[33]Wang, Q., & Su, M. (2020). Integrating blockchain technology into the energy sector—from theory of blockchain to research and application of energy blockchain. Computer Science Review, 37, 100-275.
[34]https://www.chainbits.com/cryptocurrency-terms/blockchain-definition/
[35]Edgar F. Esteves; Eugénio Oliveira; Rosaldo J. F. Rossetti; João F. B. Goncalves. (2009)Simulating communication in a service-oriented architecture for V2V networks. Computer Science.
[36]Nahri, Mohamed; Boulmakoul, Azedine; Karim, Lamia; Lbath, Ahmed. (2018). IoV distributed architecture for real-time traffic data analytics. Computer Science, 130, 480-487.
[37]GIL DE LA IGLESIA, Jesper ANDERSSON, Marcelo MILRAD. (2010). Mobile Virtual Devices for Collaborative M-Learning. Computer Sciences.
[38]Pustisek, Matevz; Kos, Andrej; Sedlar. (2016). Blockchain Based Autonomous Selection of Electric Vehicle Charging Station. 217-222.
[39]Edgar F. Esteves; Eugénio Oliveira; Rosaldo J. F. Rossetti; João F. B. Goncalves. (2009). Simulating Communication in a Service-Oriented Architecture for V2V Networks.
[40]Jaiboon, Vatin; Thaenthong, Jirawat. (2017). Infotainment Data Dissemination Mechanism Using RSU Cloud Based for Vehicular Networks
[41]Nahri, Mohamed; Boulmakoul, Azedine; Karim, Lamia; Lbath, Ahmed. (2018). IoV distributed architecture for real-time traffic data analytics . Procedia Computer Science, 130, 480-487.
[42]S. Bengochea, A. Talamona, M. Parent. (2005). A Software Framework for Vehicle-Infrastructure Cooperative Applications. Computer Science, 797-800.
[43]WeiA, Christian. (2011). V2X communication in Europe – From research projects towards standardization and field testing of vehicle communication technology. Computer and Telecommunications Networking, 55, 103.
[44]Golestan, Keyvan; Soua, Ridha; Karray, Fakhri; Kamel, Mohamed S. (2016). Situation Awareness Within the Context of Connected Cars: A Comprehensive Review and Recent Trends.
指導教授 高信培(Hsing-Pei Kao) 審核日期 2021-7-14
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明