Detailed Information on Publication Record
2014
On Node Capturing Attacker Strategies
JURNEČKA, Filip, Martin STEHLÍK and Václav MATYÁŠBasic information
Original name
On Node Capturing Attacker Strategies
Authors
JURNEČKA, Filip (203 Czech Republic, guarantor, belonging to the institution), Martin STEHLÍK (203 Czech Republic, belonging to the institution) and Václav MATYÁŠ (203 Czech Republic, belonging to the institution)
Edition
Německo, Security Protocols XXII - 22nd International Workshop, Revised Selected Papers, p. 300-315, 16 pp. 2014
Publisher
Springer
Other information
Language
English
Type of outcome
Stať ve sborníku
Field of Study
10201 Computer sciences, information science, bioinformatics
Country of publisher
Germany
Confidentiality degree
není předmětem státního či obchodního tajemství
Publication form
printed version "print"
References:
Impact factor
Impact factor: 0.402 in 2005
RIV identification code
RIV/00216224:14330/14:00074030
Organization unit
Faculty of Informatics
ISBN
978-3-319-12399-8
ISSN
UT WoS
000354862400029
Keywords in English
wireless sensor networks; automated evaluation; key management schemes; node capturing; attack strategies
Změněno: 1/11/2014 23:18, RNDr. Filip Jurnečka, Ph.D.
Abstract
V originále
In distributed environments, such as wireless networks, a common adversary is considered to take control over a fraction of the nodes and hence to affect the system behaviour. We have examined several key management schemes for wireless sensor networks where the adversary compromises all the secret keys stored on captured nodes. We propose a number of realistic movement strategies that an actual attacker could pursue to capture nodes and examine the fallout of these attack approaches.
Links
GAP202/11/0422, research and development project |
|