Publication Type:

Conference Paper

Source:

ACWR 2011 - Proceedings of the International Conference on Wireless Technologies for Humanitarian Relief, Amritapuri, p.409-410 (2011)

URL:

http://www.scopus.com/inward/record.url?eid=2-s2.0-84860808285&partnerID=40&md5=5fb58f231bd9cf2d10657af482ad3b3e

Keywords:

Authentication, Authentication scheme, Authentication techniques, Forward-secure, Possible solutions, Resource-constrained, Sensor nodes, Wireless telecommunication systems

Abstract:

The potential of wireless sensor networks lies in the ease of their deployment, often in unknown topologies which cannot be accessed in any other way. However, they also pose new problems in terms of security. In particular, there is the problem of authenticating the nodes in the network so that we can rely on the information that they are providing. The problem is complicated by the severely resource-constrained nature of the nodes. In this talk we will discuss some of these challenges and propose possible solutions, based on novel authentication techniques that have been recently developed. In particular, we will discuss the notion of 'forward secure schemes' as introduced by Gunther and other authors, and the notion of ASHA, an authentication scheme based on the ERINDALE algorithm developed by Murty and Volkovs.

Notes:

cited By (since 1996)0; Conference of org.apache.xalan.xsltc.dom.DOMAdapter@6cbb6c87 ; Conference Date: org.apache.xalan.xsltc.dom.DOMAdapter@4d24ad6 Through org.apache.xalan.xsltc.dom.DOMAdapter@a2f2a13; Conference Code:89682

Cite this Research Publication

V. Ka Murthy, Volkovs, Nb, and Sethumadhvan, Mc, “Authentication in wireless sensor networks and applications”, in ACWR 2011 - Proceedings of the International Conference on Wireless Technologies for Humanitarian Relief, Amritapuri, 2011, pp. 409-410.