DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bornholdt, Lorenz | - |
dc.contributor.author | Reher, Julian | - |
dc.contributor.author | Skwarek, Volker | - |
dc.date.accessioned | 2020-10-01T11:28:20Z | - |
dc.date.available | 2020-10-01T11:28:20Z | - |
dc.date.issued | 2019-05 | - |
dc.identifier.isbn | 978-3-8007-4961-4 | en_US |
dc.identifier.issn | 0341-0196 | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12738/9888 | - |
dc.description.abstract | This research paper proposes an algorithm to establish trust among the nodes of a lightweight wireless sensor-network using principles of Byzantine fault tolerance (BFT). Basing on BFT communication schemes and the location as part of the node’s identity, malicious nodes, traitors and attackers can be identified and potentially excluded from communication to ensure honest behaviour. Sybil- and man-in-the-middle-attacks by can be prevented as a sender’s identity particularly bases on network observations and therefore cannot be copied or imitated. Using multilateral communication, the origin of a message and the unchanged (signed) content can be checked by all network participants. Consequently, identity, authenticity and accountability of the extended CIA-triad are preserved. | en_US |
dc.language.iso | en | en_US |
dc.publisher | VDE Verlag GmbH | en_US |
dc.relation.ispartof | ITG-Fachbericht | en_US |
dc.subject.ddc | 620: Ingenieurwissenschaften | en_US |
dc.title | Proof-of-Location: A method for securing sensor-data-communication in a Byzantine fault tolerant way | en_US |
dc.type | inProceedings | en_US |
dc.relation.conference | ITG-Symposium Mobile Communication - Technologies and Applications 2019 | en_US |
local.contributorCorporate.editor | Hochschule Osnabrück | - |
local.contributorCorporate.editor | Verband Deutscher Elektrotechniker | - |
local.contributorCorporate.editor | Informationstechnische Gesellschaft | - |
openaire.rights | http://purl.org/coar/access_right/c_14cb | en_US |
tuhh.oai.show | true | en_US |
tuhh.publication.institute | Department Wirtschaftsingenieurwesen | en_US |
tuhh.publication.institute | Fakultät Life Sciences | en_US |
tuhh.publication.institute | Forschungs- und Transferzentrum Digitale Wirtschaftsprozesse | en_US |
tuhh.publisher.url | https://ieeexplore.ieee.org/document/8731780/authors#authors | - |
tuhh.publisher.url | https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8731780 | - |
tuhh.relation.ispartofseries | 24. ITG-Symposium Mobile Communication - Technologies and Applications | en_US |
tuhh.type.opus | InProceedings (Aufsatz / Paper einer Konferenz etc.) | - |
dc.type.casrai | Conference Paper | - |
dc.type.dini | contributionToPeriodical | - |
dc.type.driver | contributionToPeriodical | - |
dc.type.status | info:eu-repo/semantics/publishedVersion | en_US |
dcterms.DCMIType | Text | - |
item.languageiso639-1 | en | - |
item.fulltext | No Fulltext | - |
item.creatorGND | Bornholdt, Lorenz | - |
item.creatorGND | Reher, Julian | - |
item.creatorGND | Skwarek, Volker | - |
item.tuhhseriesid | 24. ITG-Symposium Mobile Communication - Technologies and Applications | - |
item.openairetype | inProceedings | - |
item.grantfulltext | none | - |
item.creatorOrcid | Bornholdt, Lorenz | - |
item.creatorOrcid | Reher, Julian | - |
item.creatorOrcid | Skwarek, Volker | - |
item.seriesref | 24. ITG-Symposium Mobile Communication - Technologies and Applications | - |
item.cerifentitytype | Publications | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
crisitem.author.dept | Department Wirtschaftsingenieurwesen | - |
crisitem.author.dept | Department Informatik | - |
crisitem.author.dept | Department Wirtschaftsingenieurwesen | - |
crisitem.author.orcid | 0000-0001-5065-1029 | - |
crisitem.author.parentorg | Fakultät Life Sciences | - |
crisitem.author.parentorg | Fakultät Technik und Informatik | - |
crisitem.author.parentorg | Fakultät Life Sciences | - |
Appears in Collections: | Publications without full text |
Add Files to Item
Note about this record
Export
Items in REPOSIT are protected by copyright, with all rights reserved, unless otherwise indicated.