第一个书签之前
Abstract
Chapter 1 Introduction
1.1.1 Introduction to Wireless Sensor Networks (WSNs)
Figure 1-1 Evolution of sensor development
Figure 1-2 Taxonomy of WSN applications
Figure 1-3 Examples of WSN applications deployed in real environment
1.1.2 Security issue in WSNs
Figure 1-4 the components of a sensor node
Chapter 2 Introduction to Authentication Scheme and Cryptography
2.1 Introduction
2.2 Elliptic Curve Cryptography
Figure 2-1 the polynomial equation over the real numbers
Figure 2-2 the set of resolutions to the equation over the real numbers
Figure 2-3 the elliptic curve over the real numbers
2.3 Hash function
2.4 Message authentication codes
2.5 Digital signatures
2.6 Summary
Chapter 3 Review of Previous Work Related to Authentication Protocols in WSNs
3.1 Survey of previous work and analysis
3.2 Summary
Chapter 4 Introduction to Formal Verification Logics
4.1 Introduction
Figure 4-1 Flow chart of formal verification using modal logics
4.2 The Coffey-Saidha (CS) Logic
4.3 The Logic Language
4.4 Inference Rules
4.5 Axioms
4.6 The Coffey-Saidha-Newe (CSN) Logic
4.7 Language Additions
4.8 Additional Axioms
4.9 Summary
Chapter 5 Security Analysis of Akansha S. et al.’s Protocol
5.1 Introduction
5.2 Registration Phase
5.3 Login Phase
5.4 Authentication Phase
5.5 Password Changing Phase
5.6 Security analysis and flaws detection
5.7 Summary
Chapter 6 A New Proposed User Authentication Scheme for WSNs
6.1 Introduction
6.2 Refined protocol design
6.3 Proposed Scheme
6.4 Registration Phase
6.5 Login and Authentication Phase
6.6 Summary
Chapter 7 Security Evaluation of the Proposed Authentication Protocol
7.1 Security Analysis
7.2 Formal Verification of the Proposed Protocol
7.3 Summary
Chapter 8 Implementation of User Authentication Protocol
8.1 Introduction
8.2 WSN System Setup
Figure 8-1: picture of our new nodes
Figure 8-2: IAR workbench
8.3 Programming Environment
8.4 Architecture of the Implementation
Figure 8-3: The flow chart of the proposed protocol implementation
Figure 8-4: The general layout of the components
Figure 8-5: The sequence diagram of the user module
Figure 8-6: Packet structure of the message sent by a user node
8.5 Gateway Module
Figure 8-7: The sequence diagram of the gateway module
Figure 8-9: Packet block diagram for a message sent by gateway
8.6 Summary
Chapter 9 Evaluation and Results
9.1 Introduction
9.2 Methodology and Experimental Setup
9.2.1 Methodology
9.2.2 Experimental Setup
9.3 Evaluation Measurements
Figure 9-1: Measuring execution time using an oscilloscope
Figure 9-2: The Agilent 66321D Mobile Communication DC Source
Figure 9-3: Measuring Energy Consumption using the Agilent 14565B Device Characterisation Software
9.4 Evaluation of Results
9.5 Evaluation Results on TI cc2530 Mote
9.5.1 Execution Time
9.5.2 Memory Usage
9.5.3 Energy Consumption
9.6 Performance Analysis
9.6.1 Execution Time
9.6.2 Memory Usage
9.6.3 Energy Consumption
9.7 Summary
Chapter 10 Conclusion
Future Work
References
Published Papers During Postgraduate Years
东华大学;