Defending Against Multiple Attacks in Cluster-based Wireless Sensor Networks

碩士 === 國立新竹教育大學 === 資訊科學研究所 === 97 === The data of wireless sensor networks are liable to eavesdropping and tampering due to wireless transmission, but complicated encryption technologies can not be used for prevention due to the hardware limitation of sensor nodes. Therefore, the researches of key...

Full description

Bibliographic Details
Main Authors: Yang, Cheng-Lung, 楊正隆
Other Authors: Tarng , Wen-Hua
Format: Others
Language:zh-TW
Online Access:http://ndltd.ncl.edu.tw/handle/34689901332856648320
id ndltd-TW-097NHCT5394003
record_format oai_dc
spelling ndltd-TW-097NHCT53940032016-05-04T04:26:30Z http://ndltd.ncl.edu.tw/handle/34689901332856648320 Defending Against Multiple Attacks in Cluster-based Wireless Sensor Networks 在叢集式無線感測網路提供多重防禦機制之研究 Yang, Cheng-Lung 楊正隆 碩士 國立新竹教育大學 資訊科學研究所 97 The data of wireless sensor networks are liable to eavesdropping and tampering due to wireless transmission, but complicated encryption technologies can not be used for prevention due to the hardware limitation of sensor nodes. Therefore, the researches of key management in wireless sensor network mainly focus on symmetric-key encryption by considering its lower computational complexity, in spite of its limited connectivity and scalability. This study proposed a key management mechanism based on elliptic curve cryptography (ECC) to provide certification services for sensor nodes’ identity and message. The mechanism can be use to test physical identity for the defense of multiple attacks in cluster-based wireless sensor network. Analysis of network security is conducted by examples using this mechanism. Tarng , Wen-Hua 唐文華 學位論文 ; thesis 0 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立新竹教育大學 === 資訊科學研究所 === 97 === The data of wireless sensor networks are liable to eavesdropping and tampering due to wireless transmission, but complicated encryption technologies can not be used for prevention due to the hardware limitation of sensor nodes. Therefore, the researches of key management in wireless sensor network mainly focus on symmetric-key encryption by considering its lower computational complexity, in spite of its limited connectivity and scalability. This study proposed a key management mechanism based on elliptic curve cryptography (ECC) to provide certification services for sensor nodes’ identity and message. The mechanism can be use to test physical identity for the defense of multiple attacks in cluster-based wireless sensor network. Analysis of network security is conducted by examples using this mechanism.
author2 Tarng , Wen-Hua
author_facet Tarng , Wen-Hua
Yang, Cheng-Lung
楊正隆
author Yang, Cheng-Lung
楊正隆
spellingShingle Yang, Cheng-Lung
楊正隆
Defending Against Multiple Attacks in Cluster-based Wireless Sensor Networks
author_sort Yang, Cheng-Lung
title Defending Against Multiple Attacks in Cluster-based Wireless Sensor Networks
title_short Defending Against Multiple Attacks in Cluster-based Wireless Sensor Networks
title_full Defending Against Multiple Attacks in Cluster-based Wireless Sensor Networks
title_fullStr Defending Against Multiple Attacks in Cluster-based Wireless Sensor Networks
title_full_unstemmed Defending Against Multiple Attacks in Cluster-based Wireless Sensor Networks
title_sort defending against multiple attacks in cluster-based wireless sensor networks
url http://ndltd.ncl.edu.tw/handle/34689901332856648320
work_keys_str_mv AT yangchenglung defendingagainstmultipleattacksinclusterbasedwirelesssensornetworks
AT yángzhènglóng defendingagainstmultipleattacksinclusterbasedwirelesssensornetworks
AT yangchenglung zàicóngjíshìwúxiàngǎncèwǎnglùtígōngduōzhòngfángyùjīzhìzhīyánjiū
AT yángzhènglóng zàicóngjíshìwúxiàngǎncèwǎnglùtígōngduōzhòngfángyùjīzhìzhīyánjiū
_version_ 1718259083347230720