透過您的圖書館登入
IP:18.188.142.146
  • 學位論文

認證機制應用於無線感測網路與遠距醫療之研究

Study of Authentication Mechanisms for Wireless Sensor Networks and Telecare Medicine Information Systems

指導教授 : 洪文斌

摘要


在此篇論文中,我們將探討認證機制在無線感測網路與遠距醫療系統中如何保持其安全性,並依照各個環境的不同,使用不同的認證機制。   在本論文中,我們首先發現2016年Khemissa和Tandjaoui的無線感測網路認證議題中,其安全表格過於毫無防備,此缺失可能造成數種認證機制上的不安全。另外,2016年Roy等人遠距醫療系統認證機制中,我們推敲出其機制過於仰賴特定參數,此漏洞可能造成數種認證機制上的不安全。因此,在各自不同的環境領域中,我們使用雜湊函數與模糊提取器強化並改變其演算法,強化認證機制,並藉由BAN logic證明我們改進的認證機制為可行,並能提供更高的安全效果

並列摘要


In this thesis, we will explore how the authentication mechanism are safety maintained in the wireless sensor network and telemedicine system. In addition, according to different circumstances, different authentication mechanism are used.   In this study, we first discovered that the authentication mechanism in the wireless sensor networks proposed by Khemissa and Tandjaoui in 2016 lacks the protection of its security table. Then we found that the authentication scheme in telemedicine systems presented by Roy et al. in 2016 depends on some specific parameters too much. Due to these drawbacks, these authentication mechanism are vulnerable to different attacks. Therefore, in different environments, we use the hash function and fuzzy extractor to strengthen and change their algorithms such that the authentication protocols are enhanced. In addition, with the BAN logic, we prove that our proposed authentication mechanism are feasible and can provide a higher security effect.

參考文獻


[1] Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data,” Journal on Computing, vol. 38, no. 1, pp.97-139(1), 2008.
[3] L. Kocarev, and Z. Tasev, “Public-key encryption based on Chebyshev maps,” Proceedings of the 2003 International Symposium on Circuits and Systems, ISCAS '03, 2003.
[4] D. Xiao, X. Liao, G. Tang, and C. Li, “Using Chebyshev chaotic map to construct infinite length hash chains,” 2004 International Conference on Communications, Circuits and Systems, ICCCAS 2004, 2004
[6] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,” Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010.
[7] M. Turkanovic, B. Brumen, and M. Holbl, “A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion,” Ad Hoc Network, vol. 20,pp. 96–112, Sep. 2014

延伸閱讀