Other formats:
BibTeX
LaTeX
RIS
@inproceedings{1360600, author = {Ošťádal, Radim and Švenda, Petr and Matyáš, Václav}, address = {Německo}, booktitle = {International Conference on Cryptology and Network Security}, doi = {http://dx.doi.org/10.1007/978-3-319-48965-0_34}, keywords = {attacker model; wireless sensor networl; crypto protocol}, howpublished = {tištěná verze "print"}, language = {eng}, location = {Německo}, isbn = {978-3-319-48964-3}, pages = {552-561}, publisher = {Springer International Publishing}, title = {Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping – Secrecy Amplification Case}, url = {http://www.springer.com/us/book/9783319489643}, year = {2016} }
TY - JOUR ID - 1360600 AU - Ošťádal, Radim - Švenda, Petr - Matyáš, Václav PY - 2016 TI - Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping – Secrecy Amplification Case PB - Springer International Publishing CY - Německo SN - 9783319489643 KW - attacker model KW - wireless sensor networl KW - crypto protocol UR - http://www.springer.com/us/book/9783319489643 N2 - Partially compromised network is a pragmatic assumption in many real-life scenarios. Secrecy amplification protocols provide a significant increase in the number of secure communication links by re-establishing new keys via different communication paths. Our paper shows that research in the area of secrecy amplification protocols for ad-hoc networks has been based on rather simplified foundations w. r. t. attacker models. The attacker does not behave randomly and different attacker capabilities and behaviour have to be considered. We provide means to experimental work with parametrisable attacker capabilities and behaviour in realistic simulations, and evaluate the impact of the realistic attacker properties on the performance of major amplification protocols. ER -
OŠŤÁDAL, Radim, Petr ŠVENDA and Václav MATYÁŠ. Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping – Secrecy Amplification Case. In \textit{International Conference on Cryptology and Network Security}. Německo: Springer International Publishing, 2016, p.~552-561. ISBN~978-3-319-48964-3. Available from: https://dx.doi.org/10.1007/978-3-319-48965-0\_{}34.
|