§ 瀏覽學位論文書目資料
  
系統識別號 U0002-2607201700405100
DOI 10.6846/TKU.2017.00945
論文名稱(中文) 認證機制應用於無線感測網路與遠距醫療之研究
論文名稱(英文) Study of Authentication Mechanisms for Wireless Sensor Networks and Telecare Medicine Information Systems
第三語言論文名稱
校院名稱 淡江大學
系所名稱(中文) 資訊工程學系碩士班
系所名稱(英文) Department of Computer Science and Information Engineering
外國學位學校名稱
外國學位學院名稱
外國學位研究所名稱
學年度 105
學期 2
出版年 106
研究生(中文) 洪偉程
研究生(英文) Wei-Chang HUNG
學號 604411081
學位類別 碩士
語言別 繁體中文
第二語言別
口試日期 2017-06-22
論文頁數 77頁
口試委員 指導教授 - 洪文斌
委員 - 范俊海
委員 - 彭建文
關鍵字(中) 認證
無線感測網路
遠端醫療信息系統
BAN logic
關鍵字(英) Authentication
wireless sensor network
telecare medicine information systems
BAN logic
第三語言關鍵字
學科別分類
中文摘要
在此篇論文中,我們將探討認證機制在無線感測網路與遠距醫療系統中如何保持其安全性,並依照各個環境的不同,使用不同的認證機制。
  在本論文中,我們首先發現2016年Khemissa和Tandjaoui的無線感測網路認證議題中,其安全表格過於毫無防備,此缺失可能造成數種認證機制上的不安全。另外,2016年Roy等人遠距醫療系統認證機制中,我們推敲出其機制過於仰賴特定參數,此漏洞可能造成數種認證機制上的不安全。因此,在各自不同的環境領域中,我們使用雜湊函數與模糊提取器強化並改變其演算法,強化認證機制,並藉由BAN logic證明我們改進的認證機制為可行,並能提供更高的安全效果
英文摘要
In this thesis, we will explore how the authentication mechanism are safety maintained in the wireless sensor network and telemedicine system. In addition, according to different circumstances, different authentication mechanism are used.

  In this study, we first discovered that the authentication mechanism in the wireless sensor networks proposed by Khemissa and Tandjaoui in 2016 lacks the protection of its security table. Then we found that the authentication scheme in telemedicine systems presented by Roy et al. in 2016 depends on some specific parameters too much. Due to these drawbacks, these authentication mechanism are vulnerable to different attacks. Therefore, in different environments, we use the hash function and fuzzy extractor to strengthen and change their algorithms such that the authentication protocols are enhanced. In addition, with the BAN logic, we prove that our proposed authentication mechanism are feasible and can provide a higher security effect.
第三語言摘要
論文目次
目錄

第一章	緒論	        1
第一節	研究背景與動機	1
第二節	研究目的	        1
第三節	論文架構	        2
第二章	背景知識	        3
第一節	何謂認證	        3
第二節	相關使用算法	3
一、	雜湊函數	        3
二、	對稱加密與非對稱加密	5
三、	模糊提取器	6
四、	切比雪夫映射	7
第三節	BAN logic介紹	9
第四節	在認證安全中應注意的攻擊模式	12
第三章	相關文獻探討	                14
第一節	於無線感測網路的認證相關研究	14
第二節	無線感測網路相關研究之缺點	19
第三節	於遠端醫療信息系統的認證相關研究	22
第四節	遠端醫療信息系統相關研究之缺點	31
第四章	研究方法 	33
第一節	無線感測網路	33
一、	如何改善	        33
二、	提出新演算法	33
第二節	遠端醫療信息系統	40
一、	如何改善	        40
二、	提出新演算法	41
第五章	研究成果與分析	51
第一節	無線感測網路	51
一、	抵禦攻擊與安全性	51
二、	BAN logic推導	53
第二節	遠端醫療信息系統	59
一、	抵禦攻擊與安全性	59
二、	BAN logic推導	64
第六章 結論	        68
第一節	特色與優點	68
一、	無線感測網路	68
二、	遠端醫療信息系統	68
第二節	未來展望	        69
參考資料         	70


 
圖目錄     
圖1. 以MD5實例雜湊函數	        4
圖2. 雜湊訊息驗證碼(HMAC)工作原理	4
圖3. 非對稱加解密簡易過程說明	5
圖4. 模糊提取器	                6
圖5. 使用模糊提取器進行一個簡易的對稱式加解密過程	 7
圖6. 無線感測網路架構	                        14
圖7. Khemissa和Tandjaoui之註冊階段	        16
圖8. Khemissa和Tandjaoui之認證與金鑰交換階段      19
圖9. 重送攻擊示意圖	                        20
圖10. 遠端醫療信息系統網路模型	22
圖11. Roy等人之議題註冊階段	25
圖12. Roy等人之議題登入階段	26
圖13. Roy等人之議題認證階段	28
圖14. Roy等人之議題金鑰交換階段階段	30
圖15. 我們的提議註冊階段(無線感測網路)	35
圖16. 我們的提議認證階段(無線感測網路)	39
圖17. 我們的提議密鑰交換階段(無線感測網路)	40
圖18. 我們的提議註冊階段(遠端醫療系統)	43
圖19. 我們的提議登入階段(遠端醫療系統)	45
圖20. 我們的提議認證階段(遠端醫療系統)	47
圖21. 我們的提議密鑰交換階段(遠端醫療系統)	49
圖22. 我們的提議更新資訊階段(遠端醫療系統)	50

 
表目錄
表1. BAN logic符號表	                10
表2. Khemissa和Tandjaoui使用之符號	15
表3. 安全相關信息表	                17
表4. Roy等人使用之符號	                23
表5. 我們的提議方案符號(無線感測網路)	34
表6. 我們提議的遠程使用者的安全表	        36
表7. 我們提議的閘道器節點的安全表	        37
表8. 我們的提議方案符號(遠端醫療系統)	42
表9. 智慧卡與伺服器儲存資訊(遠端醫療系統)	44
參考文獻
[1] Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data,” Journal on Computing, vol. 38, no. 1, pp.97-139(1), 2008.

[2]  P. Bergamo, P. D’Arco, A. De Santis, and L. Kocarev, “Security of public-key cryptosystems based on Chebyshev polynomials,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 52, no. 7, 2005.

[3]  L. Kocarev, and Z. Tasev, “Public-key encryption based on Chebyshev maps,” Proceedings of the 2003 International Symposium on Circuits and Systems, ISCAS '03, 2003.

[4]  D. Xiao, X. Liao, G. Tang, and C. Li, “Using Chebyshev chaotic map to construct infinite length hash chains,” 2004 International Conference on Communications, Circuits and Systems, ICCCAS 2004, 2004

[5]  M. Burrows, M. Abadi, and R. Needham, “A logic of authentication,” Journal ACM Transactions on Computer Systems (TOCS), vol. 8 no. 1, pp. 18-36, 1990.

[6]  L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,” Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010.

[7]  M. Turkanovic, B. Brumen, and M. Holbl, “A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion,” Ad Hoc Network, vol. 20,pp. 96–112, Sep. 2014

[8]  K. H. M.Wong, Y. Zheng, J. Cao, and S.Wang, “A dynamic user authentication scheme for wireless sensor networks,” Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 1, pp. 244–251, 2006.

[9]  H. R. Tseng, R. H. Jan, and W. Yang, “An improved dynamic user authentication scheme for wireless sensor networks,” Proceedings of the Global Communications Conference, 2007, pp. 986–990, 2007.

[10] M. L. Das, “Two-factor user authentication in wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp. 1086–1090, 2009.

[11] K. Xue, C. Ma, P. Hong, and R. Ding, “A temporal-credential-based mutual authentication and key agreement scheme for wireless sensornetworks,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 316–323, 2013.

[12] M. K. Khan, and K. Alghathbar, “Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks,” Sensors, vol. 10, no. 3, pp. 2450–2459, 2010.

[13] H. Khemissa, D. Tandjaoui, “A Novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of internet of things” Wireless Telecommunications Symposium (WTS), 2016.

[14] H. Krawczyk, R. Canetti, and M. Bellare, “Hmac: Keyed-hashing for message authentication,” RFC Editor, United States, 1997.

[15] S. Roy, S. Chatterjee, S. Chattopadhyay, and A. K. Gupta, “A biometrics-based robust and secure user authentication protocol for e-healthcare service,” 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2016.

[16] Z.Y. Wu, Y. Chung, F. Lai, and T.S. Chen, “A password-based user authentication scheme for the integrated EPR information system,” Journal of Medical Systems, vol. 36, no. 2, pp. 631–638, 2012.

[17] Z.Y. Wu, Y.J. Tseng, Y. Chung, Y.C. Chen, and Feipei Lai, “A reliable user authentication and key agreement scheme for web-based hospital-acquired infection surveillance information system,” Journal of Medical Systems,vol.36, no. 4, pp.2547-2555, 2011.

[18] T.F. Lee, I.P. Chang, T.H. Lin, and C.C. Wang, “A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system,” Journal of Medical Systems, vol. 33, no. 3, pp. 9941, 2013.

[19] Z.Y. Wu, Y.C. Lee, F. Lai, H.C. Lee, and Y. Chung, “A secure authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 36, no. 3, pp. 1529–1535, 2012.

[20] J. Wei, X. Hu, and W. Liu, “An improved authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 36, no. 6, pp. 3597–3604, 2012.

[21] Z. Zhu, “An efficient authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 36, no. 6, pp. 3833–3838, 2012.

[22] H. Debiao, C. Jianhua, Z. Rui, “A more secure authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 36, no. 3, pp. 1989–1995, 2012.

[23] H.M. Chen, J.W. Lo, and C.K. Yeh, “An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems,” Journal of Medical Systems, vol. 36, no. 6, pp. 3907–3915, 2012.

[24] T. Cao, and J. Zhai, “Improved dynamic ID-based authentication scheme for telecare medical information systems,” Journal of Medical Systems, vol.37, no. 2, pp. 9912, 2013.

[25] T.F. Lee, C.M. Liu, “A Secure Smart-Card Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems,” Journal of Medical Systems, vol. 37, no. 3, pp.9933, 2013.

[26] A.K. Das, and B. Bruhadeshwar, “An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system,” Journal of Medical Systems, vol. 37, no. 5, pp. 9969, 2013.

[27] C. Guo, and C.C. Chang, “Chaotic maps-based password-authenticated key agreement using smart cards,” Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 6, pp. 1433–1440, 2013.

[28] X. Hao, J. Wang, Q. Yang, X. Yan, and P. Li, “A chaotic map-based authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 37, no. 2, pp.9919, 2013.

[29] Q. Jiang, J. Ma, X. Lu, and Y. Tian, “Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems,” Journal of Medical Systems, vol. 38, no. 2, pp. 12,  2014.

[30] W.C. Yau, and R.C. Phan, “Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 37, no. 6, pp.9993, 2013.

[31] T.F. Lee, “An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems,” Journal of Medical Systems, vol. 37, no. 6, pp.9985, 2013.

[32] C.T. Li, C.C. Lee, and C.Y. Weng, “A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems,” Journal of Medical Systems, vol. 38, no. 9, pp.77, 2014.
論文全文使用權限
校內
校內紙本論文立即公開
同意電子論文全文授權校園內公開
校內電子論文立即公開
校外
同意授權
校外電子論文立即公開

如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信