无线传感器网络及其应用中的身份验证

V. K. Murthy, N. Volkovs, M. Sethumadhvan
{"title":"无线传感器网络及其应用中的身份验证","authors":"V. K. Murthy, N. Volkovs, M. Sethumadhvan","doi":"10.1145/2185216.2185324","DOIUrl":null,"url":null,"abstract":"The potential of wireless sensor networks lies in the ease of their deployment, often in unknown topologies which cannot be accessed in any other way. However, they also pose new problems in terms of security. In particular, there is the problem of authenticating the nodes in the network so that we can rely on the information that they are providing. The problem is complicated by the severely resource-constrained nature of the nodes.\n In this talk we will discuss some of these challenges and propose possible solutions, based on novel authentication techniques that have been recently developed. In particular, we will discuss the notion of 'forward secure schemes' as introduced by Gunther and other authors, and the notion of ASHA, an authentication scheme based on the ERINDALE algorithm developed by Murty and Volkovs.","PeriodicalId":180836,"journal":{"name":"International Conference on Wireless Technologies for Humanitarian Relief","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Authentication in wireless sensor networks and applications\",\"authors\":\"V. K. Murthy, N. Volkovs, M. Sethumadhvan\",\"doi\":\"10.1145/2185216.2185324\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The potential of wireless sensor networks lies in the ease of their deployment, often in unknown topologies which cannot be accessed in any other way. However, they also pose new problems in terms of security. In particular, there is the problem of authenticating the nodes in the network so that we can rely on the information that they are providing. The problem is complicated by the severely resource-constrained nature of the nodes.\\n In this talk we will discuss some of these challenges and propose possible solutions, based on novel authentication techniques that have been recently developed. In particular, we will discuss the notion of 'forward secure schemes' as introduced by Gunther and other authors, and the notion of ASHA, an authentication scheme based on the ERINDALE algorithm developed by Murty and Volkovs.\",\"PeriodicalId\":180836,\"journal\":{\"name\":\"International Conference on Wireless Technologies for Humanitarian Relief\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Wireless Technologies for Humanitarian Relief\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2185216.2185324\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Wireless Technologies for Humanitarian Relief","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2185216.2185324","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

无线传感器网络的潜力在于其易于部署,通常是在未知的拓扑结构中,无法以任何其他方式访问。然而,它们也带来了安全方面的新问题。特别是,存在对网络中的节点进行身份验证的问题,以便我们可以依赖它们提供的信息。节点严重的资源约束特性使问题变得复杂。在本次演讲中,我们将讨论其中的一些挑战,并基于最近开发的新型身份验证技术提出可能的解决方案。特别地,我们将讨论Gunther和其他作者引入的“前向安全方案”的概念,以及ASHA的概念,ASHA是基于Murty和Volkovs开发的ERINDALE算法的认证方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Authentication in wireless sensor networks and applications
The potential of wireless sensor networks lies in the ease of their deployment, often in unknown topologies which cannot be accessed in any other way. However, they also pose new problems in terms of security. In particular, there is the problem of authenticating the nodes in the network so that we can rely on the information that they are providing. The problem is complicated by the severely resource-constrained nature of the nodes. In this talk we will discuss some of these challenges and propose possible solutions, based on novel authentication techniques that have been recently developed. In particular, we will discuss the notion of 'forward secure schemes' as introduced by Gunther and other authors, and the notion of ASHA, an authentication scheme based on the ERINDALE algorithm developed by Murty and Volkovs.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A simultaneous routing and localization algorithm for wireless sensor networks in emergency scenario Monitoring Schumann resonance and other electromagnetic precursors of an earthquake with a virtual MIMO wireless sensor network Some comments on wireless sensor networks for natural hazards KARSHIK: agricultural information monitoring and reference based on wireless networks Robust RF fingerprinting techniques in 4G networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1