Logo des Repositoriums
 

A new approach towards authenticated key agreement schemes for resource-constrained devices

dc.contributor.authorGorecki, Christian
dc.contributor.authorBehrens, Christian
dc.contributor.authorLaur, Rainer
dc.contributor.editorCremers, Armin B.
dc.contributor.editorManthey, Rainer
dc.contributor.editorMartini, Peter
dc.contributor.editorSteinhage, Volker
dc.date.accessioned2019-10-11T07:57:51Z
dc.date.available2019-10-11T07:57:51Z
dc.date.issued2005
dc.description.abstractThis paper describes a novel solution for authenticated key agreement for wireless sensor networks (WSN) in logistics. The retrieved data may not be spoofed as it is used to generate information about the quality of the freight, especially for sensitive freight like food. Instead of relying on pre-configuration, every sensor node is authenticated immediately before deployment (e.g. loading into a container) by adding an RFID-interface to every WSN node.en
dc.identifier.isbn3-88579-397-0
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/28185
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofInformatik 2005 – Informatik Live! Band 2
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-68
dc.titleA new approach towards authenticated key agreement schemes for resource-constrained devicesen
dc.typeText/Conference Paper
gi.citation.endPage157
gi.citation.publisherPlaceBonn
gi.citation.startPage155
gi.conference.date19. bis 22. September 2005
gi.conference.locationBonn
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
GI-Proceedings.68-31.pdf
Größe:
310.98 KB
Format:
Adobe Portable Document Format