Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping – Secrecy Amplification Case

Logo poskytovatele

Varování

Publikace nespadá pod Filozofickou fakultu, ale pod Fakultu informatiky. Oficiální stránka publikace je na webu muni.cz.
Autoři

OŠŤÁDAL Radim ŠVENDA Petr MATYÁŠ Václav

Rok publikování 2016
Druh Článek ve sborníku
Konference International Conference on Cryptology and Network Security
Fakulta / Pracoviště MU

Fakulta informatiky

Citace
www http://www.springer.com/us/book/9783319489643
Doi http://dx.doi.org/10.1007/978-3-319-48965-0_34
Obor Informatika
Klíčová slova attacker model; wireless sensor networl; crypto protocol
Popis Partially compromised network is a pragmatic assumption in many real-life scenarios. Secrecy amplification protocols provide a significant increase in the number of secure communication links by re-establishing new keys via different communication paths. Our paper shows that research in the area of secrecy amplification protocols for ad-hoc networks has been based on rather simplified foundations w. r. t. attacker models. The attacker does not behave randomly and different attacker capabilities and behaviour have to be considered. We provide means to experimental work with parametrisable attacker capabilities and behaviour in realistic simulations, and evaluate the impact of the realistic attacker properties on the performance of major amplification protocols.
Související projekty:

Používáte starou verzi internetového prohlížeče. Doporučujeme aktualizovat Váš prohlížeč na nejnovější verzi.