Sciweavers

GI
2004
Springer

User Authentication in Sensor Networks

14 years 4 months ago
User Authentication in Sensor Networks
d Abstract) Zinaida Benenson Felix G¨artner Dogan Kesdogan RWTH Aachen, Department of Computer Science, D-52056 Aachen, Germany : If the data collected within a sensor network is valuable or should be kept confidential then security measures should protect the access to this data. We focus on user authentication, a central problem when trying to build access control mechanisms for sensor networks. We first sketch some security issues in the context of user authentication in sensor networks. We then introduce the notion of n-authentication, a special form of authentication which is more adequate to sensor networks than previous forms of authentication. We finally present and analyze a protocol for n-authentication.
Zinaida Benenson, Felix C. Gärtner, Dogan Kes
Added 01 Jul 2010
Updated 01 Jul 2010
Type Conference
Year 2004
Where GI
Authors Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan
Comments (0)