A new approach towards authenticated key agreement schemes for resource-constrained devices
dc.contributor.author | Gorecki, Christian | |
dc.contributor.author | Behrens, Christian | |
dc.contributor.author | Laur, Rainer | |
dc.contributor.editor | Cremers, Armin B. | |
dc.contributor.editor | Manthey, Rainer | |
dc.contributor.editor | Martini, Peter | |
dc.contributor.editor | Steinhage, Volker | |
dc.date.accessioned | 2019-10-11T07:57:51Z | |
dc.date.available | 2019-10-11T07:57:51Z | |
dc.date.issued | 2005 | |
dc.description.abstract | This paper describes a novel solution for authenticated key agreement for wireless sensor networks (WSN) in logistics. The retrieved data may not be spoofed as it is used to generate information about the quality of the freight, especially for sensitive freight like food. Instead of relying on pre-configuration, every sensor node is authenticated immediately before deployment (e.g. loading into a container) by adding an RFID-interface to every WSN node. | en |
dc.identifier.isbn | 3-88579-397-0 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/28185 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Informatik 2005 – Informatik Live! Band 2 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-68 | |
dc.title | A new approach towards authenticated key agreement schemes for resource-constrained devices | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 157 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 155 | |
gi.conference.date | 19. bis 22. September 2005 | |
gi.conference.location | Bonn | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1
Lade...
- Name:
- GI-Proceedings.68-31.pdf
- Größe:
- 310.98 KB
- Format:
- Adobe Portable Document Format