원문정보
초록
영어
The objects, which can be personal digital assistants, electronic rings, doors or even clothes, offer embedded chips with computation facilities and are generally called artifacts. I later realized that this was not so the real problem is actually authentication. Recent results indicate scalability problems for flat ad hoc networks. Sensor network achieves function that handle surrounding information perception through sensor and sensed information to network that is consisted of sensor nodes of large number. Research about new access control techniques and height administration techniques need authentication information persons' certification assurance level classification in sensor network environment which become necessary different view base with authentication information at node for application of AAA technology in USN environment that must do authentication process using information that is collected from various sensor mountings. So, get base authentication information in sensor type and present weight grant model by security strength about authentication information through information who draw. In this paper collected information of sensor nodes model who give weight drawing security reinforcement as authentication information by purpose present be going to. and Must be able to can grasp special quality of each sensor appliances in various side and use this and decide authentication assurance level for value estimation as authentication information elements. Therefore, do to define item that can evaluate Authentication information elements thus and give simple authentication assurance level value accordingly because applying weight. Present model who give authentication assurance level value and weight for quotation according to security strength.
목차
1 Introduction
1.1 Sensor network Abstract
2 Sensor network Characteristic
2.1 Sensor network Security
2.2 Security requirement of sensor network
3. Sensor network authentication element
3.1 Authentication level abstract
3.2 Authentication level importance
4. Áuthentication power importance
4.1 Authentication power difference by authentication element
4.2 Authentication power difference by authentication element analysis
5. Authentication element weight
5.1 Authentication element weight Model
6. Authentication weight Advantage
7. Conclusions
8. References