D 2014

On Node Capturing Attacker Strategies

JURNEČKA, Filip, Martin STEHLÍK and Václav MATYÁŠ

Basic information

Original name

On Node Capturing Attacker Strategies

Authors

JURNEČKA, Filip (203 Czech Republic, guarantor, belonging to the institution), Martin STEHLÍK (203 Czech Republic, belonging to the institution) and Václav MATYÁŠ (203 Czech Republic, belonging to the institution)

Edition

Německo, Security Protocols XXII - 22nd International Workshop, Revised Selected Papers, p. 300-315, 16 pp. 2014

Publisher

Springer

Other information

Language

English

Type of outcome

Stať ve sborníku

Field of Study

10201 Computer sciences, information science, bioinformatics

Country of publisher

Germany

Confidentiality degree

není předmětem státního či obchodního tajemství

Publication form

printed version "print"

Impact factor

Impact factor: 0.402 in 2005

RIV identification code

RIV/00216224:14330/14:00074030

Organization unit

Faculty of Informatics

ISBN

978-3-319-12399-8

ISSN

UT WoS

000354862400029

Keywords in English

wireless sensor networks; automated evaluation; key management schemes; node capturing; attack strategies
Změněno: 1/11/2014 23:18, RNDr. Filip Jurnečka, Ph.D.

Abstract

V originále

In distributed environments, such as wireless networks, a common adversary is considered to take control over a fraction of the nodes and hence to affect the system behaviour. We have examined several key management schemes for wireless sensor networks where the adversary compromises all the secret keys stored on captured nodes. We propose a number of realistic movement strategies that an actual attacker could pursue to capture nodes and examine the fallout of these attack approaches.

Links

GAP202/11/0422, research and development project
Name: Bezpečnostní protokoly podporující soukromí a detekce průniku v bezdrátových senzorových sítích (Acronym: P202/11/0422)
Investor: Czech Science Foundation