English  |  正體中文  |  简体中文  |  Items with full text/Total items : 52047/87178 (60%)
Visitors : 8706498      Online Users : 240
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/105711

    Title: 無線感測網路中安全資料收集技術之研究
    Other Titles: The study of secure data collection scheme for wireless sensor network
    Authors: 黃彥智;Hwang, Yan-Zhi
    Contributors: 淡江大學資訊工程學系碩士班
    Keywords: 感測網路;使用者身分鑑別;資料收集;Sensor Network;User authentication;Data Collection
    Date: 2015
    Issue Date: 2016-01-22 15:03:19 (UTC+8)
    Abstract: 無線感測網路透過感測器與網路的連結,提供環境的監控以及安全分析,目前已廣泛的使用於各種行業與環境上,例如;車輛流量監控、醫療上的健康管理。但是,由於無線感測網路是處於在一個無線通訊的網路開放環境中,必定易遭受到安全威脅與攻擊,所以必須鑑別合法性,避免攻擊者竊取或破壞資訊;本論文提出的方法是在無線感測網路中不再依靠閘道節點(Gateway node)檢驗智慧卡擁有者的合法身分,讓感測節點鑑別收集器為合法智慧卡所啟動再透過安全通道傳送感測資料給收集器,收集器亦能鑑別資料確實來自合法感測節點。本論文方法可以減少通訊成本且達到如通訊方彼此身分鑑別、具資料完整性與資料私密性的安全通道等功能,並且能夠抵抗惡意內部人攻擊、通行碼猜測攻擊以及重送攻擊。
    Wireless Sensor Networks is widely used in many industries and environments through the connection between sensors and network to provide environmental monitoring and security analysis disaster risk management such as real-time traffic monitoring, healthcare. Wireless Sensor Networks is in an open wireless communication network, it will suffer some security threats and attacks. It has to authenticate user identity to avoid an attacker stealing or destroying data. This paper proposes a secure data collection scheme for wireless sensor networks. The collector authenticates the identity of smart card owner and assures its validity without gateway node. Sensor nodes verify the collector which is activated by an authorized smart card owner and transmit data to collector through secure channel. The collector also authenticates the collecting data is come from validity sensor nodes. This paper reduce communication cost and provide a secure channel to achieve data integrity and data confidentiality, mutual authentication and resisting malicious insider attack, password guessing attack and replay attack.
    Appears in Collections:[資訊工程學系暨研究所] 學位論文

    Files in This Item:

    File Description SizeFormat

    All items in 機構典藏 are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback