本論文已被瀏覽 409 次， [ ] 49 次，[ ] [ ]
The scope of wireless network applications is very wide: from wireless sensor networks (WSN) set up in a small area to collect sensing information, which constitute the sensor layer of the Internet of things (IOT), to Vehicular Ad-Hoc Networks (VANET) established in an entire city, which are the framework of Intelligent Transport System (ITS). The aforementioned applications have two themes in common: security and efficiency.
How to set up a secure path to relaying the sensing information from a sensor node to a gather node or a base station is the main issue concerning the security of WSNs. Meanwhile, the ways to ensure a message received is complete and reliable and that anonymity is protected are equally important issues on the subject.
In the early days, internet security was achieved through the use of traditional symmetric encryption, public key encryption, or public key infrastructure techniques, but all of them are subject to severe computation and storage overload. In recent years, due to its one-way, collision resistant and trapdoor collision-resistant properties, and less time and space required in calculations and storage which enable it to implement with various techniques, the chameleon hash functions have gained traction as one of the hottest techniques applied to network security.
In this dissertation, the research starts with the application of the double-trapdoor chameleon hash function to propose an access control scheme for WSNs and implementing it by Elliptic Curve Cryptography (ECC). The proposed access control scheme can set up a secure path to transmitting sensing information. The use of the single-trapdoor hash function and an exponent arithmetic operation to build a secure environment for VANETs. The structure of proposed schemes and the detailed processes are also covered in the paper. Finally, the results of the security analyses and performance evaluations of these proposed schemes show that they are superior to their counterparts in the related field.