User Authentication on Wireless Sensor Networks
碩士 === 國立成功大學 === 資訊工程學系碩博士班 === 96 === Wireless sensor networks (WSN) have been comprehensively appied. Aiming at protecting the resource constrained sensors against unauthorized access and providing the data reliability for the authenticated user, we propose the mutual user authentication scheme....
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/66106431950858321640 |
id |
ndltd-TW-096NCKU5392080 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096NCKU53920802015-11-23T04:03:10Z http://ndltd.ncl.edu.tw/handle/66106431950858321640 User Authentication on Wireless Sensor Networks 無線感測網路下之使用者認證協定 Yung-ting Chen 陳沅廷 碩士 國立成功大學 資訊工程學系碩博士班 96 Wireless sensor networks (WSN) have been comprehensively appied. Aiming at protecting the resource constrained sensors against unauthorized access and providing the data reliability for the authenticated user, we propose the mutual user authentication scheme. The scheme employs the idea underlying LEAP+ (Localized Encryption and Authentication Protocol) to provide the blacklist for authenticated user to detect malicious sensors and make the sensor verify the user efficiently. Comparing with the previous research, our scheme not only achieves the mutual authentication but has the more efficient utilization of sensor’s energy, and further provides the ability to control the access time of each authorized user without the support of server. Tzonelih Hwang 黃宗立 2008 學位論文 ; thesis 68 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立成功大學 === 資訊工程學系碩博士班 === 96 === Wireless sensor networks (WSN) have been comprehensively appied. Aiming at protecting the resource constrained sensors against unauthorized access and providing the data reliability for the authenticated user, we propose the mutual user authentication scheme. The scheme employs the idea underlying LEAP+ (Localized Encryption and Authentication Protocol) to provide the blacklist for authenticated user to detect malicious sensors and make the sensor verify the user efficiently. Comparing with the previous research, our scheme not only achieves the mutual authentication but has the more efficient utilization of sensor’s energy, and further provides the ability to control the access time of each authorized user without the support of server.
|
author2 |
Tzonelih Hwang |
author_facet |
Tzonelih Hwang Yung-ting Chen 陳沅廷 |
author |
Yung-ting Chen 陳沅廷 |
spellingShingle |
Yung-ting Chen 陳沅廷 User Authentication on Wireless Sensor Networks |
author_sort |
Yung-ting Chen |
title |
User Authentication on Wireless Sensor Networks |
title_short |
User Authentication on Wireless Sensor Networks |
title_full |
User Authentication on Wireless Sensor Networks |
title_fullStr |
User Authentication on Wireless Sensor Networks |
title_full_unstemmed |
User Authentication on Wireless Sensor Networks |
title_sort |
user authentication on wireless sensor networks |
publishDate |
2008 |
url |
http://ndltd.ncl.edu.tw/handle/66106431950858321640 |
work_keys_str_mv |
AT yungtingchen userauthenticationonwirelesssensornetworks AT chényuántíng userauthenticationonwirelesssensornetworks AT yungtingchen wúxiàngǎncèwǎnglùxiàzhīshǐyòngzhěrènzhèngxiédìng AT chényuántíng wúxiàngǎncèwǎnglùxiàzhīshǐyòngzhěrènzhèngxiédìng |
_version_ |
1718133993631645696 |