Show/Hide Menu
Hide/Show Apps
anonymousUser
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Açık Bilim Politikası
Açık Bilim Politikası
Frequently Asked Questions
Frequently Asked Questions
Browse
Browse
By Issue Date
By Issue Date
Authors
Authors
Titles
Titles
Subjects
Subjects
Communities & Collections
Communities & Collections
Password based secure user authentication protocols in wireless sensor networks
Download
index.pdf
Date
2019
Author
Şen, Uğur
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
8
views
5
downloads
A wireless sensor network (WSN) is a network, which consists of resource-constrained devices like sensors. Using these sensors, it is possible to monitor and track wide environments. WSNs have become widespread as a promising technology in the context of Internet of Things. One of the biggest disadvantages of these networks, which are used in many different systems and environments is the difficulty of providing their security. In WSNs, standard algorithms used for encryption, authentication and data integrity are too complex to be used in sensors. Designing algorithms and protocols to ensure the safety of WSNs by working efficiently on resource constrained devices such as sensors is one of the top agenda items of information security. In the literature, there are many studies and analyses on the subject. WSN security is analyzed under six main aspects and one of the most important of these is user authentication. Generally prescribed methods for user authentication are examined under two main headings: asymmetric encryption and password-based protocols. In this thesis, password based user authentication protocols in WSNs are examined. The security features of these protocols, the attacks on the protocols and the measures that can be taken against these attacks are mentioned. We also investigate the security proof of a designed protocol and the implementation of automatic security validation. Finally, an exemplary protocol from the literature is described and its weaknesses are examined.
Subject Keywords
Data encryption (Computer science).
,
Resource constrainedness
,
Internet of Things security
,
password based authentication.
URI
http://etd.lib.metu.edu.tr/upload/12623939/index.pdf
https://hdl.handle.net/11511/45498
Collections
Graduate School of Applied Mathematics, Thesis