Defending Against Multiple Attacks in Cluster-based Wireless Sensor Networks
碩士 === 國立新竹教育大學 === 資訊科學研究所 === 97 === The data of wireless sensor networks are liable to eavesdropping and tampering due to wireless transmission, but complicated encryption technologies can not be used for prevention due to the hardware limitation of sensor nodes. Therefore, the researches of key...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Online Access: | http://ndltd.ncl.edu.tw/handle/34689901332856648320 |
id |
ndltd-TW-097NHCT5394003 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-097NHCT53940032016-05-04T04:26:30Z http://ndltd.ncl.edu.tw/handle/34689901332856648320 Defending Against Multiple Attacks in Cluster-based Wireless Sensor Networks 在叢集式無線感測網路提供多重防禦機制之研究 Yang, Cheng-Lung 楊正隆 碩士 國立新竹教育大學 資訊科學研究所 97 The data of wireless sensor networks are liable to eavesdropping and tampering due to wireless transmission, but complicated encryption technologies can not be used for prevention due to the hardware limitation of sensor nodes. Therefore, the researches of key management in wireless sensor network mainly focus on symmetric-key encryption by considering its lower computational complexity, in spite of its limited connectivity and scalability. This study proposed a key management mechanism based on elliptic curve cryptography (ECC) to provide certification services for sensor nodes’ identity and message. The mechanism can be use to test physical identity for the defense of multiple attacks in cluster-based wireless sensor network. Analysis of network security is conducted by examples using this mechanism. Tarng , Wen-Hua 唐文華 學位論文 ; thesis 0 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立新竹教育大學 === 資訊科學研究所 === 97 === The data of wireless sensor networks are liable to eavesdropping and tampering due to wireless transmission, but complicated encryption technologies can not be used for prevention due to the hardware limitation of sensor nodes. Therefore, the researches of key management in wireless sensor network mainly focus on symmetric-key encryption by considering its lower computational complexity, in spite of its limited connectivity and scalability.
This study proposed a key management mechanism based on elliptic curve cryptography (ECC) to provide certification services for sensor nodes’ identity and message. The mechanism can be use to test physical identity for the defense of multiple attacks in cluster-based wireless sensor network. Analysis of network security is conducted by examples using this mechanism.
|
author2 |
Tarng , Wen-Hua |
author_facet |
Tarng , Wen-Hua Yang, Cheng-Lung 楊正隆 |
author |
Yang, Cheng-Lung 楊正隆 |
spellingShingle |
Yang, Cheng-Lung 楊正隆 Defending Against Multiple Attacks in Cluster-based Wireless Sensor Networks |
author_sort |
Yang, Cheng-Lung |
title |
Defending Against Multiple Attacks in Cluster-based Wireless Sensor Networks |
title_short |
Defending Against Multiple Attacks in Cluster-based Wireless Sensor Networks |
title_full |
Defending Against Multiple Attacks in Cluster-based Wireless Sensor Networks |
title_fullStr |
Defending Against Multiple Attacks in Cluster-based Wireless Sensor Networks |
title_full_unstemmed |
Defending Against Multiple Attacks in Cluster-based Wireless Sensor Networks |
title_sort |
defending against multiple attacks in cluster-based wireless sensor networks |
url |
http://ndltd.ncl.edu.tw/handle/34689901332856648320 |
work_keys_str_mv |
AT yangchenglung defendingagainstmultipleattacksinclusterbasedwirelesssensornetworks AT yángzhènglóng defendingagainstmultipleattacksinclusterbasedwirelesssensornetworks AT yangchenglung zàicóngjíshìwúxiàngǎncèwǎnglùtígōngduōzhòngfángyùjīzhìzhīyánjiū AT yángzhènglóng zàicóngjíshìwúxiàngǎncèwǎnglùtígōngduōzhòngfángyùjīzhìzhīyánjiū |
_version_ |
1718259083347230720 |