Logo des Repositoriums
 

User authentication in sensor networks

dc.contributor.authorBenenson, Zinaida
dc.contributor.authorGärtner, Felix
dc.contributor.authorKesdogan, Dogan
dc.contributor.editorDadam, Peter
dc.contributor.editorReichert, Manfred
dc.date.accessioned2019-10-11T11:37:48Z
dc.date.available2019-10-11T11:37:48Z
dc.date.issued2004
dc.description.abstractIf the data collected within a sensor network is valuable or should be kept confidential then security measures should protect the access to this data. We focus on user authentication, a central problem when trying to build access control mechanisms for sensor networks. We first sketch some security issues in the context of user authentication in sensor networks. We then introduce the notion of n-authentication, a special form of authentication which is more adequate to sensor networks than previous forms of authentication. We finally present and analyze a protocol for n-authentication.en
dc.identifier.isbn3-88579-380-6
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/28800
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofInformatik 2004, Informatik verbindet, Band 2, Beiträge der 34. Jahrestagung der Gesellschaft für Informatik e.V. (GI)
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-51
dc.titleUser authentication in sensor networksen
dc.typeText/Conference Paper
gi.citation.endPage389
gi.citation.publisherPlaceBonn
gi.citation.startPage385
gi.conference.date20.-24. September 2004
gi.conference.locationUlm
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
GI-Proceedings.51-85.pdf
Größe:
268.02 KB
Format:
Adobe Portable Document Format