OŠŤÁDAL, Radim, Petr ŠVENDA and Václav MATYÁŠ. A New Approach to Secrecy Amplification in Partially Compromised Networks. In Rajat Subhra Chakraborty. Security, Privacy, and Applied Cryptography Engineering - 4th International Conference. Heidelberg: Springer, 2014, p. 92-109. ISBN 978-3-319-12059-1. Available from: https://dx.doi.org/10.1007/978-3-319-12060-7_7.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name A New Approach to Secrecy Amplification in Partially Compromised Networks
Authors OŠŤÁDAL, Radim (203 Czech Republic), Petr ŠVENDA (203 Czech Republic, guarantor, belonging to the institution) and Václav MATYÁŠ (203 Czech Republic, belonging to the institution).
Edition Heidelberg, Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, p. 92-109, 18 pp. 2014.
Publisher Springer
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Germany
Confidentiality degree is not subject to a state or trade secret
Publication form printed version "print"
Impact factor Impact factor: 0.402 in 2005
RIV identification code RIV/00216224:14330/14:00073940
Organization unit Faculty of Informatics
ISBN 978-3-319-12059-1
ISSN 0302-9743
Doi http://dx.doi.org/10.1007/978-3-319-12060-7_7
Keywords in English Secrecy Amplification; Wireless Sensor Networks; Partially Compromised Networks
Tags International impact, Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 27/4/2015 05:59.
Abstract
Usage of various key (pre-)distribution schemes (KDSs) in networks with an active attacker results in a partially compromised network where some fraction of keys used to protect link communication is known to the attacker. The secrecy amplification protocols were proposed to secure again some previously compromised communication links by using non-compromised paths to deliver new secure keys. Design of suitable secrecy amplification protocols remains a challenge in scenarios where a trade-off between necessary resources (e.g., energy necessary for transmission of message) and improvement in the number of secure links must be balanced. We inspect classes of secrecy amplification protocols known as node-oriented and group-oriented protocols proposed for use in wireless sensor networks (WSN). We combine analysis of given protocol participant placement via a simulator and manual post-processing to provide a simpler, practically usable hybrid protocol with less steps and lower communication overhead, yet still better in terms of re-secured links than previously proposed protocols.
Links
GAP202/11/0422, research and development projectName: Bezpečnostní protokoly podporující soukromí a detekce průniku v bezdrátových senzorových sítích (Acronym: P202/11/0422)
Investor: Czech Science Foundation
PrintDisplayed: 24/4/2024 17:31