Dissertation > Excellent graduate degree dissertation topics show

Design of the Authentication and Key Management in the Internet of Things

Author: LongXiao
Tutor: WangJingCheng
School: Shanghai Jiaotong University
Course: Control Theory and Control Engineering
Keywords: Internet of Things wireless sensor network authentication key management elliptic curve
CLC: TN918.82
Type: Master's thesis
Year: 2012
Downloads: 379
Quote: 0
Read: Download Dissertation


With the continuous development of the Internet of Things (IoT), the security has gotten more attention. Concern the telemedicine applications and wireless sensor network which is part of the IoT, in this paper, describes the course of the security development, image processing, and quantitative techniques. And this paper analyzes the applicability of different technologies in the IoT.In the study of the authentication, this thesis analyzes the advantage and defect of the sinusoidal projection and feature extraction of the authenticate schemes. And combine the advantages of the two schemes, design a variable algorithm of authenticate scheme. It uses the quantification to simplify the input, and add the physical layer parameters to the authenticate elements. The scheme improves the security, reduce the time cost. Meanwhile uses the more ROM to replace the less RAM.In the study of the key management, this thesis analyzes the advantage and defect of the time function and elliptical projection of the key management. And combine the advantages of the two schemes, design high security scheme of the key management. It achieves the self‐update, parameter update, and key update. These modules constitute the direct key update course and indirect update course. And on this basis, this thesis uses the physical later parameters to replace the time function which has a high cost, so further reduce the time consumption of key management.At last, this thesis implements the simulation and verification of a variable algorithm of authenticate scheme and a high security scheme of the key management in the MICAz notes, and analysis the applicability of the schemes in the large‐scale notes situation.

Related Dissertations

  1. Research on Transparent Security of JPEG Image,TP391.41
  2. Technology for Localization Attack Detection in Wireless Sensor Networks,TP212.9
  3. Multiple Pairwise Keys Management Protocol of Function Node-Based for Wireless Sensor Networks,TP212.9
  4. The Internet of Things Applied Research in Clothing Industry,TN929.5
  5. Drip Irrigation Control System Based on Pulse Width Modulation (PWM),S152.7
  6. The Design of Computer Forensics Model Based on Windows Log,D918.2
  7. An Adaptive Processing Node Selection Based Spatio-Temporal Query Alogrithm,TN929.5
  8. Study on Time Synchronization Method for Urban Lighting Management System,TM923
  9. The Study of Mine Gas Monitoring System Based on Wireless Sensor Networks,TN929.5
  10. Short-Range Wireless Localization Algorithms for Internet of Things,TN929.5
  11. Region-based wireless sensor network key management scheme for research,TP212.9
  12. The Research on Routing Protocol of Agricultural Environmental Monitoring System Based on Wir Eless Sensor Networks,TN915.04
  13. Study on Legal Issues in Concluding Electronic Commerce Contract,D923
  14. The Lightweight Group Key Management Protocol for Body Area Network,TN918.1
  15. Design and Realization of the AAC ZigBeePRO Development System,TN929.5
  16. The Research on Coverage Control Algorithm in Wireless Sensor Network,TN929.5
  17. The Research and Application of IPTV Terminal System Based on the Next Generation of Internet,TN949.292
  18. Research on LEACH-based Clustering Routing Protocol in Sensor Networks,TP212.9
  19. Image Restoration Method Research and Its Application Based on Probability PCA,TP391.41
  20. Voronoi diagram of its nature and application of wireless sensor networks,TP212.9
  21. Improvement and Realization of AODV in Wireless Sensor Networks,TP212.9

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Secure Communication : sub- transmission line > Wireless secure communication
© 2012 www.DissertationTopic.Net  Mobile