2011
Cryptography for (partially) compromised sensor networks
HANÁČEK, Petr a Petr ŠVENDAZákladní údaje
Originální název
Cryptography for (partially) compromised sensor networks
Autoři
HANÁČEK, Petr (203 Česká republika) a Petr ŠVENDA (203 Česká republika, garant, domácí)
Vydání
Praha, Information Security Summit - Crisis Plans and Security, od s. 102-118, 17 s. 2011
Nakladatel
DSM - data security management
Další údaje
Jazyk
angličtina
Typ výsledku
Stať ve sborníku
Obor
10201 Computer sciences, information science, bioinformatics
Stát vydavatele
Česká republika
Utajení
není předmětem státního či obchodního tajemství
Forma vydání
tištěná verze "print"
Kód RIV
RIV/00216224:14330/11:00065747
Organizační jednotka
Fakulta informatiky
ISBN
978-80-86813-22-6
Klíčová slova anglicky
wireless sensor networks; cryptographic smart cards
Změněno: 13. 12. 2013 16:50, doc. RNDr. Petr Švenda, Ph.D.
Anotace
V originále
This paper will introduce the technology of wireless sensor networks with a special focus on its security issues. This relatively young technology started to evolve together with the advance in miniaturization of electronic devices, decreasing costs and general spread of wireless communication. Data sensed by the miniature devices in a target area (e.g., temperature, pressure, movement) are locally processed and then transmitted to end user who obtains the possibility to continuously monitor target environment. The usage of the technology starts from medical monitoring of the patients over agriculture and industrial monitoring or early warning emergency systems, ending with uses for military purposes as well – that is where the technology originally started. We will cover the issue of design of a key distribution and establishment protocols secure against the partial network compromise in more details. Special focus will be given to possibility for its automated generation of protocols for particular network scenario. Opposite direction will be covered as well – automated search for attacker's. We will also cover possibility to introduce low-cost tamper resistant hardware to sensor nodes without increasing the node cost and battery consumption significantly – the scenario usually not assumed in current research papers in the field.
Návaznosti
VG20102014031, projekt VaV |
|