A Light Improved Remote User Autherntication Scheme for Wireless Sensor Networks in the Context of Internet of Thing

碩士 === 中國文化大學 === 資訊管理學系 === 106 === With the rapid development of the network. Internet of things (IoT) and Wireless Sensor Network (WSN) widely used in a variety of services such as the smart house, healthcare and monitor management. Nowadays, in almost an era smartphone, users can quickly and con...

Full description

Bibliographic Details
Main Authors: LEE, YU-WEI, 李祐瑋
Other Authors: YU, PING
Format: Others
Language:zh-TW
Published: 2018
Online Access:http://ndltd.ncl.edu.tw/handle/8bgjej
id ndltd-TW-106PCCU0396009
record_format oai_dc
spelling ndltd-TW-106PCCU03960092019-05-30T03:50:41Z http://ndltd.ncl.edu.tw/handle/8bgjej A Light Improved Remote User Autherntication Scheme for Wireless Sensor Networks in the Context of Internet of Thing 輕量增強之 IoT 無線感測網路的遠端使用者認證機制 LEE, YU-WEI 李祐瑋 碩士 中國文化大學 資訊管理學系 106 With the rapid development of the network. Internet of things (IoT) and Wireless Sensor Network (WSN) widely used in a variety of services such as the smart house, healthcare and monitor management. Nowadays, in almost an era smartphone, users can quickly and conveniently connect their device to the IoT node for supervision or management. To protect user information, the remote user authentication scheme of IoT becomes more critical.The past two-factor authentication based on passwords and smart cards is easier to attack. Many scholars proposed their schemes that are three-factors authentications based on the password, smart card, and biometric. Among them, Dhillon et al. proposed a lightweight biometrics based remote user authentication scheme. However, we found that Dhillon et al. authentication has several flaws such as stolen/lost smart device attacks, impersonation attacks, denial-of-service attacks, parallel session attacks, and no user anonymity. In addition, Jiang et al. improved Amin et al.'s three-factor authentication scheme for WSN and proposed a remote user authentication scheme based on the Rabin cryp-tosystem. We also found that their scheme has suffered IoT node impersonation attacks and session key attacks.In this study, we also propose a light improved protocol of Dhillon et al.'s scheme to increase the security that can prevent possible security attack of theirs. After security and efficiency analysis, we can find that the proposed scheme will be more suitable for remote user authentication of wireless sensor networks in the context of the Internet of Thing. YU, PING 余平 2018 學位論文 ; thesis 54 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 中國文化大學 === 資訊管理學系 === 106 === With the rapid development of the network. Internet of things (IoT) and Wireless Sensor Network (WSN) widely used in a variety of services such as the smart house, healthcare and monitor management. Nowadays, in almost an era smartphone, users can quickly and conveniently connect their device to the IoT node for supervision or management. To protect user information, the remote user authentication scheme of IoT becomes more critical.The past two-factor authentication based on passwords and smart cards is easier to attack. Many scholars proposed their schemes that are three-factors authentications based on the password, smart card, and biometric. Among them, Dhillon et al. proposed a lightweight biometrics based remote user authentication scheme. However, we found that Dhillon et al. authentication has several flaws such as stolen/lost smart device attacks, impersonation attacks, denial-of-service attacks, parallel session attacks, and no user anonymity. In addition, Jiang et al. improved Amin et al.'s three-factor authentication scheme for WSN and proposed a remote user authentication scheme based on the Rabin cryp-tosystem. We also found that their scheme has suffered IoT node impersonation attacks and session key attacks.In this study, we also propose a light improved protocol of Dhillon et al.'s scheme to increase the security that can prevent possible security attack of theirs. After security and efficiency analysis, we can find that the proposed scheme will be more suitable for remote user authentication of wireless sensor networks in the context of the Internet of Thing.
author2 YU, PING
author_facet YU, PING
LEE, YU-WEI
李祐瑋
author LEE, YU-WEI
李祐瑋
spellingShingle LEE, YU-WEI
李祐瑋
A Light Improved Remote User Autherntication Scheme for Wireless Sensor Networks in the Context of Internet of Thing
author_sort LEE, YU-WEI
title A Light Improved Remote User Autherntication Scheme for Wireless Sensor Networks in the Context of Internet of Thing
title_short A Light Improved Remote User Autherntication Scheme for Wireless Sensor Networks in the Context of Internet of Thing
title_full A Light Improved Remote User Autherntication Scheme for Wireless Sensor Networks in the Context of Internet of Thing
title_fullStr A Light Improved Remote User Autherntication Scheme for Wireless Sensor Networks in the Context of Internet of Thing
title_full_unstemmed A Light Improved Remote User Autherntication Scheme for Wireless Sensor Networks in the Context of Internet of Thing
title_sort light improved remote user autherntication scheme for wireless sensor networks in the context of internet of thing
publishDate 2018
url http://ndltd.ncl.edu.tw/handle/8bgjej
work_keys_str_mv AT leeyuwei alightimprovedremoteuserauthernticationschemeforwirelesssensornetworksinthecontextofinternetofthing
AT lǐyòuwěi alightimprovedremoteuserauthernticationschemeforwirelesssensornetworksinthecontextofinternetofthing
AT leeyuwei qīngliàngzēngqiángzhīiotwúxiàngǎncèwǎnglùdeyuǎnduānshǐyòngzhěrènzhèngjīzhì
AT lǐyòuwěi qīngliàngzēngqiángzhīiotwúxiàngǎncèwǎnglùdeyuǎnduānshǐyòngzhěrènzhèngjīzhì
AT leeyuwei lightimprovedremoteuserauthernticationschemeforwirelesssensornetworksinthecontextofinternetofthing
AT lǐyòuwěi lightimprovedremoteuserauthernticationschemeforwirelesssensornetworksinthecontextofinternetofthing
_version_ 1719195469840646144