2014
A New Approach to Secrecy Amplification in Partially Compromised Networks
OŠŤÁDAL, Radim; Petr ŠVENDA and Václav MATYÁŠBasic information
Original name
A New Approach to Secrecy Amplification in Partially Compromised Networks
Authors
OŠŤÁDAL, Radim (203 Czech Republic); Petr ŠVENDA (203 Czech Republic, guarantor, belonging to the institution) and Václav MATYÁŠ ORCID (203 Czech Republic, belonging to the institution)
Edition
Heidelberg, Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, p. 92-109, 18 pp. 2014
Publisher
Springer
Other information
Language
English
Type of outcome
Proceedings paper
Field of Study
10201 Computer sciences, information science, bioinformatics
Country of publisher
Germany
Confidentiality degree
is not subject to a state or trade secret
Publication form
printed version "print"
Impact factor
Impact factor: 0.402 in 2005
RIV identification code
RIV/00216224:14330/14:00073940
Organization unit
Faculty of Informatics
ISBN
978-3-319-12059-1
ISSN
EID Scopus
2-s2.0-84910663953
Keywords in English
Secrecy Amplification; Wireless Sensor Networks; Partially Compromised Networks
Tags
International impact, Reviewed
Changed: 27/4/2015 05:59, RNDr. Pavel Šmerk, Ph.D.
Abstract
In the original language
Usage of various key (pre-)distribution schemes (KDSs) in networks with an active attacker results in a partially compromised network where some fraction of keys used to protect link communication is known to the attacker. The secrecy amplification protocols were proposed to secure again some previously compromised communication links by using non-compromised paths to deliver new secure keys. Design of suitable secrecy amplification protocols remains a challenge in scenarios where a trade-off between necessary resources (e.g., energy necessary for transmission of message) and improvement in the number of secure links must be balanced. We inspect classes of secrecy amplification protocols known as node-oriented and group-oriented protocols proposed for use in wireless sensor networks (WSN). We combine analysis of given protocol participant placement via a simulator and manual post-processing to provide a simpler, practically usable hybrid protocol with less steps and lower communication overhead, yet still better in terms of re-secured links than previously proposed protocols.
Links
GAP202/11/0422, research and development project |
|