HANÁČEK, Petr and Petr ŠVENDA. Cryptography for (partially) compromised sensor networks. In Eva Racková. Information Security Summit - Crisis Plans and Security. Praha: DSM - data security management, 2011, p. 102-118. ISBN 978-80-86813-22-6.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Cryptography for (partially) compromised sensor networks
Authors HANÁČEK, Petr (203 Czech Republic) and Petr ŠVENDA (203 Czech Republic, guarantor, belonging to the institution).
Edition Praha, Information Security Summit - Crisis Plans and Security, p. 102-118, 17 pp. 2011.
Publisher DSM - data security management
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Czech Republic
Confidentiality degree is not subject to a state or trade secret
Publication form printed version "print"
RIV identification code RIV/00216224:14330/11:00065747
Organization unit Faculty of Informatics
ISBN 978-80-86813-22-6
Keywords in English wireless sensor networks; cryptographic smart cards
Changed by Changed by: doc. RNDr. Petr Švenda, Ph.D., učo 4085. Changed: 13/12/2013 16:50.
Abstract
This paper will introduce the technology of wireless sensor networks with a special focus on its security issues. This relatively young technology started to evolve together with the advance in miniaturization of electronic devices, decreasing costs and general spread of wireless communication. Data sensed by the miniature devices in a target area (e.g., temperature, pressure, movement) are locally processed and then transmitted to end user who obtains the possibility to continuously monitor target environment. The usage of the technology starts from medical monitoring of the patients over agriculture and industrial monitoring or early warning emergency systems, ending with uses for military purposes as well – that is where the technology originally started. We will cover the issue of design of a key distribution and establishment protocols secure against the partial network compromise in more details. Special focus will be given to possibility for its automated generation of protocols for particular network scenario. Opposite direction will be covered as well – automated search for attacker's. We will also cover possibility to introduce low-cost tamper resistant hardware to sensor nodes without increasing the node cost and battery consumption significantly – the scenario usually not assumed in current research papers in the field.
Links
VG20102014031, research and development projectName: Experimentální vývoj bezpečnostní softwarové platformy se systémem detekce průniku a režimy ochrany soukromí pro bezdrátové senzorové sítě (Acronym: WSNSec)
Investor: Ministry of the Interior of the CR
PrintDisplayed: 22/8/2024 01:16