English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 18076/20274 (89%)
造訪人次 : 5240356      線上人數 : 748
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    請使用永久網址來引用或連結此文件: https://ir.cnu.edu.tw/handle/310902800/34069


    標題: An Authentication Information Exchange Scheme in WSN for IoT Applications
    作者: Yang, Sheng-Kai
    Shiue, Ya-Ming
    Su, Zhi-Yuan
    Liu, I-Hsien
    Liu, Chuan-Gang
    貢獻者: Chia Nan Univ Pharm & Sci, Dept Informat Management
    Chia Nan Univ Pharm & Sci, Dept Appl Informat & Multimedia
    Natl Cheng Kung Univ, Inst Comp & Commun Engn, Dept Elect Engn
    關鍵字: Authentication protocol
    node captured attack
    IoT
    wireless sensor networks
    日期: 2020
    上傳時間: 2022-11-18 11:22:40 (UTC+8)
    出版者: Ieee-Inst Electrical Electronics Engineers Inc
    摘要: Recently, in IoT, wireless sensor network has become a critical technology with which many applications in industries and human life can achieve smart IoT control. However, for those daily applications using WSN technology, malicious users can capture the sensor nodes much easily since these wireless sensor nodes are usually deployed in easily touched places. Once this node captured attack occurs, wireless sensor network soon faces various security risks. In this paper, in order to resist node captured attack, we propose a novel authentication information exchange scheme in WSN, which is very different from the previous authentication researches. Our idea is to add an authentication information exchange scheme in previous authentication scheme but not propose new one. We develop this scheme based on the idea of the association scheme of Home GWN and local sensor nodes. In this study, HGWN should contact all local sensor nodes and meanwhile is responsible for performing an authentication information exchange scheme for resisting security risk. In order to prevent the attacker from guessing communication period between HGWN and the sensor, we also design a dynamic contacting mechanism. We give a detail discussion of this scheme and validate it by three ways, security evaluation, BAN logic and performance evaluation, which proves that our authentication information exchange scheme can achieve security features and goals.
    關聯: Ieee Access, v.8, pp.11
    顯示於類別:[資訊管理系] 期刊論文
    [多媒體與遊戲發展系] 期刊論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    10.1109_ACCESS.2020.2964815.pdf8350KbAdobe PDF218檢視/開啟
    index.html0KbHTML692檢視/開啟


    在CNU IR中所有的資料項目都受到原著作權保護.

    TAIR相關文章

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋