透過您的圖書館登入
IP:3.149.233.6
  • 學位論文

於導入物聯網概念之異質性隨意無線感測網路中建立安全身分驗證暨金鑰協議方法之研究

A Research on Designing a Secure User Authentication and Key Agreement Protocol for Heterogeneous Ad Hoc Wireless Sensor Networks Based on the Internet of Things

指導教授 : 張雅芬

摘要


無線感測網路在需要收集資料的應用中扮演重要的角色。在2014年,Turkanović等學者應用物聯網的概念在無線感測網路裡,並且於異質性隨意無線感測網路中提出使用者身分驗證及金鑰協議方法,遠端的使用者與一般的感測節點間藉由使用輕量金鑰協議方案去安全地協商出回合金鑰。在分析他們的方法後,我們發現他們的方法有四個缺點。在本研究中,將會詳細地介紹所有發現的缺點並將提出改善這些安全性缺失的方法。

並列摘要


Wireless sensor networks (WSNs) play an important role in applications when information collection is needed. In 2014, Turkanović et al. applied the Internet of Things (IOT) notion to WSNs and proposed a user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks to have a remote user to securely negotiate a session key with a general sensor node by using a lightweight key agreement protocol. After analyzing their scheme, we find that their scheme suffers from four drawbacks. In this thesis, the found drawbacks will be shown in detail, and we aim to propose an improvement to overcome these security drawbacks.

參考文獻


[4]N. S. Fayed, E. M. Daydamoni, and A. Atwan, “Efficient combined security system for wireless sensor network,” Egyptian Informatics Journal, Vol. 13, 2012, pp. 185-190.
[5]G. Yang, C.-M. Rong, C. Veigner, J.-T. Wang, and H.-B. Cheng, “Identity-based key agreement and encryption for wireless sensor networks,” The Journal of China Universities of Posts and Telecommunications, Vol. 13, 2006, pp. 54-60.
[6]A. R. Chowdhury, T. Chatterjee, and S. DasBit, “LOCHA: A light-weight one-way cryptographic hash algorithm for wireless sensor network”, Procedia Computer Science, Vol. 32, 2014, pp. 497-504.
[7]M. Turkanović, B. Brumen, and M. Hölbl, “A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion,” Ad Hoc Networks, Vol. 20, 2014, pp. 96-112.
[8]K. Xue, C. Ma, P. Hong, and R. Ding, “A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks,” Journal of Network and Computer Applications, Vol. 36, No. 1, 2013, pp. 316-323.

延伸閱讀