文化大學機構典藏 CCUR:Item 987654321/44072
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 46962/50828 (92%)
造访人次 : 12425426      在线人数 : 843
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    主页登入上传说明关于CCUR管理 到手机版


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/44072


    题名: 輕量增強之 IoT 無線感測網路的遠端使用者認證機制
    A Light Improved Remote User Autherntication Scheme for Wireless Sensor Networks in the Context of Internet of Thing
    作者: 李祐瑋(LEE, YU-WEI)
    贡献者: 資訊管理學系
    关键词: 物聯網
    生物特徵
    遠端認證
    安全性分析
    日期: 2018
    上传时间: 2019-05-10 12:52:22 (UTC+8)
    摘要: 隨著網路科技的快速發展,物聯網(IoT)和無線感測器網路(WSN)被廣泛使用在多種服務,如智慧居家、醫療保健、監測管理等。現在幾乎人手一機的時代,使用者能方便快速的利用通訊裝置連線至IoT節點,可以更便利的監督及管理。為了保護使用者的資訊,遠端安全驗證機制變得相當重要。以往基於密碼和智慧卡的雙因子認證機制較容易被攻擊,許多學者提出改善機制,如Dhillon等人所提出的物聯網遠端基於密碼、智慧卡和生物識別三個因子認證的驗證機制,但本研究發現該機制存在著許多安全漏洞,如智慧裝置遺失/竊取攻擊、仿冒攻擊、拒絕服務攻擊、中間人及平行會話攻擊及不具匿名性等。另外,Jiang等人改善Amin等人基於WSN的三因子認證機制,提出基於Rabin密碼系統的遠端使用者認證機制,但本研究發現該機制也存有安全漏洞,如偽裝感測節點攻擊及會議金鑰的前向私密性等問題。本研究並提出一個基於Dhillon等人機制的IoT無線感測網路的遠端使用者認證機制,透過安全性分析可以證明所提機制可有效的防制可能的安全漏洞,我們並藉由與現有機制的安全性及效能比較,說明新的機制將更適用於IoT的遠端使用者認證。
    With the rapid development of the network. Internet of things (IoT) and Wireless Sensor Network (WSN) widely used in a variety of services such as the smart house, healthcare and monitor management. Nowadays, in almost an era smartphone, users can quickly and conveniently connect their device to the IoT node for supervision or management. To protect user information, the remote user authentication scheme of IoT becomes more critical.The past two-factor authentication based on passwords and smart cards is easier to attack. Many scholars proposed their schemes that are three-factors authentications based on the password, smart card, and biometric. Among them, Dhillon et al. proposed a lightweight biometrics based remote user authentication scheme. However, we found that Dhillon et al. authentication has several flaws such as stolen/lost smart device attacks, impersonation attacks, denial-of-service attacks, parallel session attacks, and no user anonymity.
    In addition, Jiang et al. improved Amin et al.'s three-factor authentication scheme for WSN and proposed a remote user authentication scheme based on the Rabin cryp-tosystem. We also found that their scheme has suffered IoT node impersonation attacks and session key attacks.In this study, we also propose a light improved protocol of Dhillon et al.'s scheme to increase the security that can prevent possible security attack of theirs. After security and efficiency analysis, we can find that the proposed scheme will be more suitable for remote user authentication of wireless sensor networks in the context of the Internet of Thing.
    显示于类别:[資訊管理學系暨資訊管理研究所 ] 博碩士論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    index.html0KbHTML96检视/开启


    在CCUR中所有的数据项都受到原著作权保护.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈