Title page for etd-0606116-124615


[Back to Results | New Search]

URN etd-0606116-124615
Author Min-Hao Chang
Author's Email Address No Public.
Statistics This thesis had been viewed 5580 times. Download 575 times.
Department Computer Science and Engineering
Year 2015
Semester 2
Degree Master
Type of Document
Language English
Title A Privacy-Trust-Confidentiality Scheme for Sensor Layer of IoT
Date of Defense 2016-06-20
Page Count 72
Keyword
  • Wireless sensor networks (WSN)
  • Privacy-Trust-Confidentiality (PTC)
  • Random key pre-distribution (RKP)
  • Internet of Things (IoT)
  • Random secret pre-distribution (RSP)
  • Identity based cryptograph (IBC)
  • Abstract With the progress of time, a kind of technology was developed to connect the independent things. It is internet of things (IoT) which has many abilities including transferring, sharing, connecting the information between things and many more. How to confirm the privacy, trust and confidentiality will be an important issue.
    IoT constitute from wireless sensor networks (WSN) that full of lots of sensor nodes which can forward the sensed information to base station (BS). In transferring time, sensor nodes may be attacked, modified, interrupted and so on. The proposed scheme has fully anonymous, less negotiation, revoked and confident communications. Previously, people proposed a random key pre-distribution (RKP) to make mutual but it was suffered from the compromise attacking. To overcome this weakness, people combine the technique of RKP and identity based cryptograph (IBC) to be as random secret pre-distribution (RSP) but it can’t revoke the malicious nodes. In this thesis, we add a common secret into RSP. Firstly, BS will send a lot of keys that are embedded many secrets including one common secret and other secrets to be the private key. The common secret is used to make communication between BS and sensor nodes and remain secrets are used to make mutual trust. To revoke the malicious nodes, group key chain is used by us. With the trust type and pairing value, one secure path can be built.     
    In IoT, all behaviors of intelligent are based on WSN then send to network layer. With the rigorous computation and the proof of security, this scheme is superior to other related works and we hope it can be used in IoT effectively.
    Advisory Committee
  • Wu-Chih Hu - chair
  • Bao-Rong Chang - co-chair
  • Chungnan Lee - co-chair
  • Lung-jen Wang - co-chair
  • Wen-Shyong Hsieh - advisor
  • Files
  • etd-0606116-124615.pdf
  • indicate access worldwide
    Date of Submission 2016-07-06

    [Back to Results | New Search]


    Browse | Search All Available ETDs

    If you have more questions or technical problems, please contact eThesys