DC Element | Wert | Sprache |
---|---|---|
dc.contributor.author | Bornholdt, Lorenz | - |
dc.contributor.author | Reher, Julian | - |
dc.contributor.author | Skwarek, Volker | - |
dc.date.accessioned | 2020-10-01T11:28:20Z | - |
dc.date.available | 2020-10-01T11:28:20Z | - |
dc.date.issued | 2019-05 | - |
dc.identifier.isbn | 978-3-8007-4961-4 | en_US |
dc.identifier.issn | 0341-0196 | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12738/9888 | - |
dc.description.abstract | This research paper proposes an algorithm to establish trust among the nodes of a lightweight wireless sensor-network using principles of Byzantine fault tolerance (BFT). Basing on BFT communication schemes and the location as part of the node’s identity, malicious nodes, traitors and attackers can be identified and potentially excluded from communication to ensure honest behaviour. Sybil- and man-in-the-middle-attacks by can be prevented as a sender’s identity particularly bases on network observations and therefore cannot be copied or imitated. Using multilateral communication, the origin of a message and the unchanged (signed) content can be checked by all network participants. Consequently, identity, authenticity and accountability of the extended CIA-triad are preserved. | en_US |
dc.language.iso | en | en_US |
dc.publisher | VDE Verlag GmbH | en_US |
dc.relation.ispartof | ITG-Fachbericht | en_US |
dc.subject.ddc | 620: Ingenieurwissenschaften | en_US |
dc.title | Proof-of-Location: A method for securing sensor-data-communication in a Byzantine fault tolerant way | en_US |
dc.type | inProceedings | en_US |
dc.relation.conference | ITG-Symposium Mobile Communication - Technologies and Applications 2019 | en_US |
local.contributorCorporate.editor | Hochschule Osnabrück | - |
local.contributorCorporate.editor | Verband Deutscher Elektrotechniker | - |
local.contributorCorporate.editor | Informationstechnische Gesellschaft | - |
openaire.rights | http://purl.org/coar/access_right/c_14cb | en_US |
tuhh.oai.show | true | en_US |
tuhh.publication.institute | Department Wirtschaftsingenieurwesen | en_US |
tuhh.publication.institute | Fakultät Life Sciences | en_US |
tuhh.publication.institute | Forschungs- und Transferzentrum Digitale Wirtschaftsprozesse | en_US |
tuhh.publisher.url | https://ieeexplore.ieee.org/document/8731780/authors#authors | - |
tuhh.publisher.url | https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8731780 | - |
tuhh.relation.ispartofseries | 24. ITG-Symposium Mobile Communication - Technologies and Applications | en_US |
tuhh.type.opus | InProceedings (Aufsatz / Paper einer Konferenz etc.) | - |
dc.type.casrai | Conference Paper | - |
dc.type.dini | contributionToPeriodical | - |
dc.type.driver | contributionToPeriodical | - |
dc.type.status | info:eu-repo/semantics/publishedVersion | en_US |
dcterms.DCMIType | Text | - |
item.languageiso639-1 | en | - |
item.fulltext | No Fulltext | - |
item.creatorGND | Bornholdt, Lorenz | - |
item.creatorGND | Reher, Julian | - |
item.creatorGND | Skwarek, Volker | - |
item.tuhhseriesid | 24. ITG-Symposium Mobile Communication - Technologies and Applications | - |
item.openairetype | inProceedings | - |
item.grantfulltext | none | - |
item.creatorOrcid | Bornholdt, Lorenz | - |
item.creatorOrcid | Reher, Julian | - |
item.creatorOrcid | Skwarek, Volker | - |
item.seriesref | 24. ITG-Symposium Mobile Communication - Technologies and Applications | - |
item.cerifentitytype | Publications | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
crisitem.author.dept | Department Wirtschaftsingenieurwesen | - |
crisitem.author.dept | Department Informatik | - |
crisitem.author.dept | Department Wirtschaftsingenieurwesen | - |
crisitem.author.orcid | 0000-0001-5065-1029 | - |
crisitem.author.parentorg | Fakultät Life Sciences | - |
crisitem.author.parentorg | Fakultät Technik und Informatik | - |
crisitem.author.parentorg | Fakultät Life Sciences | - |
Enthalten in den Sammlungen: | Publications without full text |
Volltext ergänzen
Feedback zu diesem Datensatz
Export
Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt.