User authentication in sensor networks
dc.contributor.author | Benenson, Zinaida | |
dc.contributor.author | Gärtner, Felix | |
dc.contributor.author | Kesdogan, Dogan | |
dc.contributor.editor | Dadam, Peter | |
dc.contributor.editor | Reichert, Manfred | |
dc.date.accessioned | 2019-10-11T11:37:48Z | |
dc.date.available | 2019-10-11T11:37:48Z | |
dc.date.issued | 2004 | |
dc.description.abstract | If the data collected within a sensor network is valuable or should be kept confidential then security measures should protect the access to this data. We focus on user authentication, a central problem when trying to build access control mechanisms for sensor networks. We first sketch some security issues in the context of user authentication in sensor networks. We then introduce the notion of n-authentication, a special form of authentication which is more adequate to sensor networks than previous forms of authentication. We finally present and analyze a protocol for n-authentication. | en |
dc.identifier.isbn | 3-88579-380-6 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/28800 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Informatik 2004, Informatik verbindet, Band 2, Beiträge der 34. Jahrestagung der Gesellschaft für Informatik e.V. (GI) | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-51 | |
dc.title | User authentication in sensor networks | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 389 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 385 | |
gi.conference.date | 20.-24. September 2004 | |
gi.conference.location | Ulm | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1
Lade...
- Name:
- GI-Proceedings.51-85.pdf
- Größe:
- 268.02 KB
- Format:
- Adobe Portable Document Format