skip to main content
10.1145/2185216.2185324acmconferencesArticle/Chapter ViewAbstractPublication PagesacwrConference Proceedingsconference-collections
research-article

Authentication in wireless sensor networks and applications

Published:18 December 2011Publication History

ABSTRACT

The potential of wireless sensor networks lies in the ease of their deployment, often in unknown topologies which cannot be accessed in any other way. However, they also pose new problems in terms of security. In particular, there is the problem of authenticating the nodes in the network so that we can rely on the information that they are providing. The problem is complicated by the severely resource-constrained nature of the nodes.

In this talk we will discuss some of these challenges and propose possible solutions, based on novel authentication techniques that have been recently developed. In particular, we will discuss the notion of 'forward secure schemes' as introduced by Gunther and other authors, and the notion of ASHA, an authentication scheme based on the ERINDALE algorithm developed by Murty and Volkovs.

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    ACWR '11: Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
    December 2011
    517 pages
    ISBN:9781450310116
    DOI:10.1145/2185216

    Copyright © 2011 Authors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 18 December 2011

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
  • Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader