Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Password based secure user authentication protocols in wireless sensor networks
Download
index.pdf
Date
2019
Author
Şen, Uğur
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
176
views
82
downloads
Cite This
A wireless sensor network (WSN) is a network, which consists of resource-constrained devices like sensors. Using these sensors, it is possible to monitor and track wide environments. WSNs have become widespread as a promising technology in the context of Internet of Things. One of the biggest disadvantages of these networks, which are used in many different systems and environments is the difficulty of providing their security. In WSNs, standard algorithms used for encryption, authentication and data integrity are too complex to be used in sensors. Designing algorithms and protocols to ensure the safety of WSNs by working efficiently on resource constrained devices such as sensors is one of the top agenda items of information security. In the literature, there are many studies and analyses on the subject. WSN security is analyzed under six main aspects and one of the most important of these is user authentication. Generally prescribed methods for user authentication are examined under two main headings: asymmetric encryption and password-based protocols. In this thesis, password based user authentication protocols in WSNs are examined. The security features of these protocols, the attacks on the protocols and the measures that can be taken against these attacks are mentioned. We also investigate the security proof of a designed protocol and the implementation of automatic security validation. Finally, an exemplary protocol from the literature is described and its weaknesses are examined.
Subject Keywords
Data encryption (Computer science).
,
Resource constrainedness
,
Internet of Things security
,
password based authentication.
URI
http://etd.lib.metu.edu.tr/upload/12623939/index.pdf
https://hdl.handle.net/11511/45498
Collections
Graduate School of Applied Mathematics, Thesis
Suggestions
OpenMETU
Core
Wireless Passive Sensor Networks
Akan, Ozgur B.; Isik, M. Talha; Baykal, Buyurman (Institute of Electrical and Electronics Engineers (IEEE), 2009-08-01)
The primary challenge in wireless sensor network deployment is the limited network lifetime due to finite-capacity batteries. Hence, the vast majority of research efforts thus far have focused on the development of energy-efficient communication and computing mechanisms for WSNs. In this article a fundamentally different approach and hence completely new WSN paradigm, the wireless passive sensor network, is introduced. The objective of the WPSN is to eliminate the limitation on system lifetime of the WSN. I...
Rule-Based In-Network Processing in Wireless Sensor Networks
Sanli, Ozgur; KÖRPEOĞLU, İBRAHİM; Yazıcı, Adnan (2009-07-10)
Wireless sensor networks are application-specific networks, and usually a new network design is required for a new application. In event-driven wireless sensor network applications, the sink node of the network is generally concerned with the higher level information describing the events happening in the network, not the raw sensor data of individual sensor nodes. As the communication is a costly operation in wireless sensor networks, it is important to process the raw data triggering the events inside the...
Life time sensitive weighted clustering on wireless sensor networks
Alizadeh Jarchlo, Elnaz; Bazlamaçcı, Cüneyt Fehmi; Department of Information Systems (2013)
Wireless Sensor Networks typically include wireless sensor nodes with limited energy. Network lifetime and scalability are considered as two significant requirements for sensor network applications. In order to decrease energy consumption and increase network lifetime one can apply an efficient clustering method. The application of the clustering method proposed in this thesis (LTS-WCA) leads to reducing the energy cost and the transmission distance of each node by grouping the nodes in several clusters and...
Path planning for mobile-anchor based wireless sensor network localization: Static and dynamic schemes
Erdemir, Ecenaz; Tuncer, Temel Engin (Elsevier BV, 2018-08-01)
In wireless sensor networks, node locations are required for many applications. Usually, anchors with known positions are employed for localization. Sensor positions can be estimated more efficiently by using mobile anchors (MAs). Finding the best MA trajectory is an important problem in this context. Various path planning algorithms are proposed to localize as many sensors as possible by following the shortest path with minimum number of anchors. In this paper, path planning algorithms for MA assisted loca...
Analysis and modeling of routing and security problems in wireless sensor networks with mathematical programming
İncebacak, Davut; Baykal, Nazife; Bıçakcı, Kemal; Department of Information Systems (2013)
Wireless Sensor Networks (WSNs) are composed of battery powered small sensor nodes with limited processing, memory and energy resources. Self organization property together with infrastructureless characteristics of WSNs make them favorable solutions for many applications. Algorithms and protocols developed for WSNs must consider the characteristics and constraints of WSNs but since battery replenishment is not possible or highly challenging for sensor nodes, one of the major concerns in designing network p...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
U. Şen, “Password based secure user authentication protocols in wireless sensor networks,” Thesis (M.S.) -- Graduate School of Applied Mathematics. Cryptography., Middle East Technical University, 2019.