透過您的圖書館登入
IP:3.147.103.8
  • 學位論文

無線感測網路中安全資料收集技術之研究

The Study of Secure Data Collection Scheme for Wireless Sensor Network

指導教授 : 黃仁俊

摘要


無線感測網路透過感測器與網路的連結,提供環境的監控以及安全分析,目前已廣泛的使用於各種行業與環境上,例如;車輛流量監控、醫療上的健康管理。但是,由於無線感測網路是處於在一個無線通訊的網路開放環境中,必定易遭受到安全威脅與攻擊,所以必須鑑別合法性,避免攻擊者竊取或破壞資訊;本論文提出的方法是在無線感測網路中不再依靠閘道節點(Gateway node)檢驗智慧卡擁有者的合法身分,讓感測節點鑑別收集器為合法智慧卡所啟動再透過安全通道傳送感測資料給收集器,收集器亦能鑑別資料確實來自合法感測節點。本論文方法可以減少通訊成本且達到如通訊方彼此身分鑑別、具資料完整性與資料私密性的安全通道等功能,並且能夠抵抗惡意內部人攻擊、通行碼猜測攻擊以及重送攻擊。

並列摘要


Wireless Sensor Networks is widely used in many industries and environments through the connection between sensors and network to provide environmental monitoring and security analysis disaster risk management such as real-time traffic monitoring, healthcare. Wireless Sensor Networks is in an open wireless communication network, it will suffer some security threats and attacks. It has to authenticate user identity to avoid an attacker stealing or destroying data. This paper proposes a secure data collection scheme for wireless sensor networks. The collector authenticates the identity of smart card owner and assures its validity without gateway node. Sensor nodes verify the collector which is activated by an authorized smart card owner and transmit data to collector through secure channel. The collector also authenticates the collecting data is come from validity sensor nodes. This paper reduce communication cost and provide a secure channel to achieve data integrity and data confidentiality, mutual authentication and resisting malicious insider attack, password guessing attack and replay attack.

參考文獻


[4] T.C. Hsiao, Y.T. Liao, T.S. Chen, and G.B. Horng, “Secure Authentication Scheme for Supporting Healthcare in Wireless Sensor Networks”, Advanced Information Networking and Applications Workshops (WAINA); 2012, pp.502-507.
[8] H.R. Tseng, R.H. Jan, and W. Yang, “An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks”, Proceedings of IEEE Globecom, Washington, DC, USA, 2007, pp. 986–990.
[10] L.C. Ko, “A Novel Dynamic User Authentication Scheme for Wireless Sensor Networks”, Proceedings of IEEE ISWCS, Reykjavik, Iceland; 2008, pp. 608–612.
[11] V. Binod, S.S. Jorge, and J.P.C.R. Joel, “Robust Dynamic User Authentication Scheme for Wireless Sensor Networks”, Proceedings of ACM Q2SWinet, Canary Islands, Spain; 2009, pp. 88–91.
[12] M.L. Das, “Two-Factor User Authentication in Wireless Sensor Networks”, IEEE Trans. Wireless Comm 2009, 8, 1086–1090.

延伸閱讀