首页> 中文学位 >ECC-based User Authentication Scheme for Wireless Sensor Networks
【6h】

ECC-based User Authentication Scheme for Wireless Sensor Networks

代理获取

目录

第一个书签之前

Abstract

Chapter 1 Introduction

1.1.1 Introduction to Wireless Sensor Networks (WSNs)

Figure 1-1 Evolution of sensor development

Figure 1-2 Taxonomy of WSN applications

Figure 1-3 Examples of WSN applications deployed in real environment

1.1.2 Security issue in WSNs

Figure 1-4 the components of a sensor node

Chapter 2 Introduction to Authentication Scheme and Cryptography

2.1 Introduction

2.2 Elliptic Curve Cryptography

Figure 2-1 the polynomial equation over the real numbers

Figure 2-2 the set of resolutions to the equation over the real numbers

Figure 2-3 the elliptic curve over the real numbers

2.3 Hash function

2.4 Message authentication codes

2.5 Digital signatures

2.6 Summary

Chapter 3 Review of Previous Work Related to Authentication Protocols in WSNs

3.1 Survey of previous work and analysis

3.2 Summary

Chapter 4 Introduction to Formal Verification Logics

4.1 Introduction

Figure 4-1 Flow chart of formal verification using modal logics

4.2 The Coffey-Saidha (CS) Logic

4.3 The Logic Language

4.4 Inference Rules

4.5 Axioms

4.6 The Coffey-Saidha-Newe (CSN) Logic

4.7 Language Additions

4.8 Additional Axioms

4.9 Summary

Chapter 5 Security Analysis of Akansha S. et al.’s Protocol

5.1 Introduction

5.2 Registration Phase

5.3 Login Phase

5.4 Authentication Phase

5.5 Password Changing Phase

5.6 Security analysis and flaws detection

5.7 Summary

Chapter 6 A New Proposed User Authentication Scheme for WSNs

6.1 Introduction

6.2 Refined protocol design

6.3 Proposed Scheme

6.4 Registration Phase

6.5 Login and Authentication Phase

6.6 Summary

Chapter 7 Security Evaluation of the Proposed Authentication Protocol

7.1 Security Analysis

7.2 Formal Verification of the Proposed Protocol

7.3 Summary

Chapter 8 Implementation of User Authentication Protocol

8.1 Introduction

8.2 WSN System Setup

Figure 8-1: picture of our new nodes

Figure 8-2: IAR workbench

8.3 Programming Environment

8.4 Architecture of the Implementation

Figure 8-3: The flow chart of the proposed protocol implementation

Figure 8-4: The general layout of the components

Figure 8-5: The sequence diagram of the user module

Figure 8-6: Packet structure of the message sent by a user node

8.5 Gateway Module

Figure 8-7: The sequence diagram of the gateway module

Figure 8-9: Packet block diagram for a message sent by gateway

8.6 Summary

Chapter 9 Evaluation and Results

9.1 Introduction

9.2 Methodology and Experimental Setup

9.2.1 Methodology

9.2.2 Experimental Setup

9.3 Evaluation Measurements

Figure 9-1: Measuring execution time using an oscilloscope

Figure 9-2: The Agilent 66321D Mobile Communication DC Source

Figure 9-3: Measuring Energy Consumption using the Agilent 14565B Device Characterisation Software

9.4 Evaluation of Results

9.5 Evaluation Results on TI cc2530 Mote

9.5.1 Execution Time

9.5.2 Memory Usage

9.5.3 Energy Consumption

9.6 Performance Analysis

9.6.1 Execution Time

9.6.2 Memory Usage

9.6.3 Energy Consumption

9.7 Summary

Chapter 10 Conclusion

Future Work

References

Published Papers During Postgraduate Years

展开▼

著录项

  • 作者

    健英;

  • 作者单位

    东华大学;

  • 授予单位 东华大学;
  • 学科 计算机
  • 授予学位 硕士
  • 导师姓名 李悦;
  • 年度 2018
  • 页码
  • 总页数
  • 原文格式 PDF
  • 正文语种 中文
  • 中图分类
  • 关键词

代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号