User Authentication on Wireless Sensor Networks

碩士 === 國立成功大學 === 資訊工程學系碩博士班 === 96 === Wireless sensor networks (WSN) have been comprehensively appied. Aiming at protecting the resource constrained sensors against unauthorized access and providing the data reliability for the authenticated user, we propose the mutual user authentication scheme....

Full description

Bibliographic Details
Main Authors: Yung-ting Chen, 陳沅廷
Other Authors: Tzonelih Hwang
Format: Others
Language:zh-TW
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/66106431950858321640
id ndltd-TW-096NCKU5392080
record_format oai_dc
spelling ndltd-TW-096NCKU53920802015-11-23T04:03:10Z http://ndltd.ncl.edu.tw/handle/66106431950858321640 User Authentication on Wireless Sensor Networks 無線感測網路下之使用者認證協定 Yung-ting Chen 陳沅廷 碩士 國立成功大學 資訊工程學系碩博士班 96 Wireless sensor networks (WSN) have been comprehensively appied. Aiming at protecting the resource constrained sensors against unauthorized access and providing the data reliability for the authenticated user, we propose the mutual user authentication scheme. The scheme employs the idea underlying LEAP+ (Localized Encryption and Authentication Protocol) to provide the blacklist for authenticated user to detect malicious sensors and make the sensor verify the user efficiently. Comparing with the previous research, our scheme not only achieves the mutual authentication but has the more efficient utilization of sensor’s energy, and further provides the ability to control the access time of each authorized user without the support of server. Tzonelih Hwang 黃宗立 2008 學位論文 ; thesis 68 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立成功大學 === 資訊工程學系碩博士班 === 96 === Wireless sensor networks (WSN) have been comprehensively appied. Aiming at protecting the resource constrained sensors against unauthorized access and providing the data reliability for the authenticated user, we propose the mutual user authentication scheme. The scheme employs the idea underlying LEAP+ (Localized Encryption and Authentication Protocol) to provide the blacklist for authenticated user to detect malicious sensors and make the sensor verify the user efficiently. Comparing with the previous research, our scheme not only achieves the mutual authentication but has the more efficient utilization of sensor’s energy, and further provides the ability to control the access time of each authorized user without the support of server.
author2 Tzonelih Hwang
author_facet Tzonelih Hwang
Yung-ting Chen
陳沅廷
author Yung-ting Chen
陳沅廷
spellingShingle Yung-ting Chen
陳沅廷
User Authentication on Wireless Sensor Networks
author_sort Yung-ting Chen
title User Authentication on Wireless Sensor Networks
title_short User Authentication on Wireless Sensor Networks
title_full User Authentication on Wireless Sensor Networks
title_fullStr User Authentication on Wireless Sensor Networks
title_full_unstemmed User Authentication on Wireless Sensor Networks
title_sort user authentication on wireless sensor networks
publishDate 2008
url http://ndltd.ncl.edu.tw/handle/66106431950858321640
work_keys_str_mv AT yungtingchen userauthenticationonwirelesssensornetworks
AT chényuántíng userauthenticationonwirelesssensornetworks
AT yungtingchen wúxiàngǎncèwǎnglùxiàzhīshǐyòngzhěrènzhèngxiédìng
AT chényuántíng wúxiàngǎncèwǎnglùxiàzhīshǐyòngzhěrènzhèngxiédìng
_version_ 1718133993631645696