淡江大學機構典藏:Item 987654321/114710
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 64191/96979 (66%)
Visitors : 8310592      Online Users : 7458
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/114710


    Title: 認證機制應用於無線感測網路與遠距醫療之研究
    Other Titles: Study of authentication mechanisms for wireless sensor networks and telecare medicine information systems
    Authors: 洪偉程;HUNG, Wei-Chang
    Contributors: 淡江大學資訊工程學系碩士班
    洪文斌
    Keywords: authentication;BAN logic;telecare medicine information systems;Wireless sensor networks;無線感測網路;認證;遠端醫療信息系統
    Date: 2017
    Issue Date: 2018-08-03 15:01:30 (UTC+8)
    Abstract: 在此篇論文中,我們將探討認證機制在無線感測網路與遠距醫療系統中如何保持其安全性,並依照各個環境的不同,使用不同的認證機制。
      在本論文中,我們首先發現2016年Khemissa和Tandjaoui的無線感測網路認證議題中,其安全表格過於毫無防備,此缺失可能造成數種認證機制上的不安全。另外,2016年Roy等人遠距醫療系統認證機制中,我們推敲出其機制過於仰賴特定參數,此漏洞可能造成數種認證機制上的不安全。因此,在各自不同的環境領域中,我們使用雜湊函數與模糊提取器強化並改變其演算法,強化認證機制,並藉由BAN logic證明我們改進的認證機制為可行,並能提供更高的安全效果
    In this thesis, we will explore how the authentication mechanism are safety maintained in the wireless sensor network and telemedicine system. In addition, according to different circumstances, different authentication mechanism are used.

      In this study, we first discovered that the authentication mechanism in the wireless sensor networks proposed by Khemissa and Tandjaoui in 2016 lacks the protection of its security table. Then we found that the authentication scheme in telemedicine systems presented by Roy et al. in 2016 depends on some specific parameters too much. Due to these drawbacks, these authentication mechanism are vulnerable to different attacks. Therefore, in different environments, we use the hash function and fuzzy extractor to strengthen and change their algorithms such that the authentication protocols are enhanced. In addition, with the BAN logic, we prove that our proposed authentication mechanism are feasible and can provide a higher security effect.
    Appears in Collections:[Graduate Institute & Department of Computer Science and Information Engineering] Thesis

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML176View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback