[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Gesellschaft für Informatik e.V.

Lecture Notes in Informatics


Informatik 2004, Informatik verbindet, Band 2, Beiträge der 34. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Ulm, 20.-24. September 2004 P-51, 385-389 (2004).

GI, Gesellschaft für Informatik, Bonn
2004


Editors

Peter Dadam, Manfred Reichert (eds.)


Copyright © GI, Gesellschaft für Informatik, Bonn

Contents

User Authentication in Sensor Networks

Zinaida Benenson , Felix Gärtner and Dogan Kesdogan

Abstract


If the data collected within a sensor network is valuable or should be kept confidential then security measures should protect the access to this data. We focus on user authentication, a central problem when trying to build access control mechanisms for sensor networks. We first sketch some security issues in the context of user authentication in sensor networks. We then introduce the notion of n-authentication, a special form of authentication which is more adequate to sensor networks than previous forms of authentication. We finally present and analyze a protocol for n-authentication.


Full Text: PDF

GI, Gesellschaft für Informatik, Bonn
ISBN 3-88579-3080-6


Last changed 24.01.2012 21:47:24