Detailed Information on Publication Record
2016
Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping – Secrecy Amplification Case
OŠŤÁDAL, Radim, Petr ŠVENDA and Václav MATYÁŠBasic information
Original name
Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping – Secrecy Amplification Case
Authors
OŠŤÁDAL, Radim (203 Czech Republic, belonging to the institution), Petr ŠVENDA (203 Czech Republic, belonging to the institution) and Václav MATYÁŠ (203 Czech Republic, guarantor, belonging to the institution)
Edition
Německo, International Conference on Cryptology and Network Security, p. 552-561, 10 pp. 2016
Publisher
Springer International Publishing
Other information
Language
English
Type of outcome
Stať ve sborníku
Field of Study
10201 Computer sciences, information science, bioinformatics
Country of publisher
Germany
Confidentiality degree
není předmětem státního či obchodního tajemství
Publication form
printed version "print"
References:
Impact factor
Impact factor: 0.402 in 2005
RIV identification code
RIV/00216224:14330/16:00088336
Organization unit
Faculty of Informatics
ISBN
978-3-319-48964-3
ISSN
UT WoS
000389953600034
Keywords in English
attacker model; wireless sensor networl; crypto protocol
Tags
International impact, Reviewed
Změněno: 14/5/2020 15:30, RNDr. Pavel Šmerk, Ph.D.
Abstract
V originále
Partially compromised network is a pragmatic assumption in many real-life scenarios. Secrecy amplification protocols provide a significant increase in the number of secure communication links by re-establishing new keys via different communication paths. Our paper shows that research in the area of secrecy amplification protocols for ad-hoc networks has been based on rather simplified foundations w. r. t. attacker models. The attacker does not behave randomly and different attacker capabilities and behaviour have to be considered. We provide means to experimental work with parametrisable attacker capabilities and behaviour in realistic simulations, and evaluate the impact of the realistic attacker properties on the performance of major amplification protocols.
Links
GBP202/12/G061, research and development project |
|