首页--工业技术论文--自动化技术、计算机技术论文--自动化技术及设备论文--自动化元件、部件论文--发送器(变换器)、传感器论文--传感器的应用论文

ECC-based User Authentication Scheme for Wireless Sensor Networks

Abstract第4页
Acknowledgement第6-12页
Chapter 1 Introduction第12-23页
    1.1 Introduction第12-21页
        1.1.1 Introduction to Wireless Sensor Networks (WSNs)第13-16页
        1.1.2 Security issue in WSNs第16-21页
    1.2 The Research Objectives第21页
    1.3 The Novelty of the Research第21-22页
    1.4 The Arrangement of the Thesis第22页
    1.5 Summary第22-23页
Chapter 2 Introduction to Authentication Scheme and Cryptography第23-31页
    2.1 Introduction第23-24页
    2.2 Elliptic Curve Cryptography第24-27页
    2.3 Hash function第27-28页
    2.4 Message authentication codes第28页
    2.5 Digital signatures第28-30页
    2.6 Summary第30-31页
Chapter 3 Review of Previous Work Related to Authentication Protocols in WSNs第31-42页
    3.1 Survey of previous work and analysis第31-41页
    3.2 Summary第41-42页
Chapter 4 Introduction to Formal Verification Logics第42-52页
    4.1 Introduction第42-43页
    4.2 The Coffey-Saidha (CS) Logic第43-44页
    4.3 The Logic Language第44-45页
    4.4 Inference Rules第45页
    4.5 Axioms第45-47页
    4.6 The Coffey-Saidha-Newe (CSN) Logic第47-48页
    4.7 Language Additions第48页
    4.8 Additional Axioms第48-51页
    4.9 Summary第51-52页
Chapter 5 Security Analysis of Akansha S. et al.’s Protocol第52-57页
    5.1 Introduction第52-53页
    5.2 Registration Phase第53-54页
    5.3 Login Phase第54页
    5.4 Authentication Phase第54页
    5.5 Password Changing Phase第54-55页
    5.6 Security analysis and flaws detection第55-56页
    5.7 Summary第56-57页
Chapter 6 A New Proposed User Authentication Scheme for WSNs第57-64页
    6.1 Introduction第57-58页
    6.2 Refined protocol design第58页
    6.3 Proposed Scheme第58-59页
    6.4 Registration Phase第59-61页
    6.5 Login and Authentication Phase第61-62页
    6.6 Summary第62-64页
Chapter 7 Security Evaluation of the Proposed Authentication Protocol第64-71页
    7.1 Security Analysis第64-65页
    7.2 Formal Verification of the Proposed Protocol第65-70页
    7.3 Summary第70-71页
Chapter 8 Implementation of User Authentication Protocol第71-81页
    8.1 Introduction第71页
    8.2 WSN System Setup第71-73页
    8.3 Programming Environment第73页
    8.4 Architecture of the Implementation第73-78页
    8.5 Gateway Module第78-80页
    8.6 Summary第80-81页
Chapter 9 Evaluation and Results第81-92页
    9.1 Introduction第81页
    9.2 Methodology and Experimental Setup第81-82页
        9.2.1 Methodology第81-82页
        9.2.2 Experimental Setup第82页
    9.3 Evaluation Measurements第82-85页
    9.4 Evaluation of Results第85-86页
    9.5 Evaluation Results on TI cc2530 Mote第86-89页
        9.5.1 Execution Time第86-87页
        9.5.2 Memory Usage第87-88页
        9.5.3 Energy Consumption第88-89页
    9.6 Performance Analysis第89-91页
        9.6.1 Execution Time第89页
        9.6.2 Memory Usage第89-90页
        9.6.3 Energy Consumption第90-91页
    9.7 Summary第91-92页
Chapter 10 Conclusion第92-94页
Future Work第94-95页
References第95-100页
Published Papers During Postgraduate Years第100页

论文共100页,点击 下载论文
上一篇:基于SDN负载均衡系统的研究
下一篇:基于深度神经网络的舌苔体质辨识