JURNEČKA, Filip, Martin STEHLÍK and Václav MATYÁŠ. On Node Capturing Attacker Strategies. In CHRISTIANSON, Bruce (554 Nový Zéland), James MALCOLM (826 Spojené království), Václav MATYÁŠ (203 Česká republika, garant, domácí), Petr ŠVENDA (203 Česká republika, domácí), Frank STAJANO (380 Itálie) a Jon ANDERSON (124 Kanada). Security Protocols XXII - 22nd International Workshop, Revised Selected Papers. Německo: Springer, 2014, p. 300-315. ISBN 978-3-319-12399-8. Available from: https://dx.doi.org/10.1007/978-3-319-12400-1_29.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name On Node Capturing Attacker Strategies
Authors JURNEČKA, Filip (203 Czech Republic, guarantor, belonging to the institution), Martin STEHLÍK (203 Czech Republic, belonging to the institution) and Václav MATYÁŠ (203 Czech Republic, belonging to the institution).
Edition Německo, Security Protocols XXII - 22nd International Workshop, Revised Selected Papers, p. 300-315, 16 pp. 2014.
Publisher Springer
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Germany
Confidentiality degree is not subject to a state or trade secret
Publication form printed version "print"
WWW On Node Capturing Attacker Strategies
Impact factor Impact factor: 0.402 in 2005
RIV identification code RIV/00216224:14330/14:00074030
Organization unit Faculty of Informatics
ISBN 978-3-319-12399-8
ISSN 0302-9743
Doi http://dx.doi.org/10.1007/978-3-319-12400-1_29
UT WoS 000354862400029
Keywords in English wireless sensor networks; automated evaluation; key management schemes; node capturing; attack strategies
Changed by Changed by: RNDr. Filip Jurnečka, Ph.D., učo 172641. Changed: 1/11/2014 23:18.
Abstract
In distributed environments, such as wireless networks, a common adversary is considered to take control over a fraction of the nodes and hence to affect the system behaviour. We have examined several key management schemes for wireless sensor networks where the adversary compromises all the secret keys stored on captured nodes. We propose a number of realistic movement strategies that an actual attacker could pursue to capture nodes and examine the fallout of these attack approaches.
Links
GAP202/11/0422, research and development projectName: Bezpečnostní protokoly podporující soukromí a detekce průniku v bezdrátových senzorových sítích (Acronym: P202/11/0422)
Investor: Czech Science Foundation
PrintDisplayed: 12/9/2024 12:52