OŠŤÁDAL, Radim, Petr ŠVENDA and Václav MATYÁŠ. Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping – Secrecy Amplification Case. In International Conference on Cryptology and Network Security. Německo: Springer International Publishing, 2016, p. 552-561. ISBN 978-3-319-48964-3. Available from: https://dx.doi.org/10.1007/978-3-319-48965-0_34.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping – Secrecy Amplification Case
Authors OŠŤÁDAL, Radim (203 Czech Republic, belonging to the institution), Petr ŠVENDA (203 Czech Republic, belonging to the institution) and Václav MATYÁŠ (203 Czech Republic, guarantor, belonging to the institution).
Edition Německo, International Conference on Cryptology and Network Security, p. 552-561, 10 pp. 2016.
Publisher Springer International Publishing
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Germany
Confidentiality degree is not subject to a state or trade secret
Publication form printed version "print"
WWW URL
Impact factor Impact factor: 0.402 in 2005
RIV identification code RIV/00216224:14330/16:00088336
Organization unit Faculty of Informatics
ISBN 978-3-319-48964-3
ISSN 0302-9743
Doi http://dx.doi.org/10.1007/978-3-319-48965-0_34
UT WoS 000389953600034
Keywords in English attacker model; wireless sensor networl; crypto protocol
Tags firank_B
Tags International impact, Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 14/5/2020 15:30.
Abstract
Partially compromised network is a pragmatic assumption in many real-life scenarios. Secrecy amplification protocols provide a significant increase in the number of secure communication links by re-establishing new keys via different communication paths. Our paper shows that research in the area of secrecy amplification protocols for ad-hoc networks has been based on rather simplified foundations w. r. t. attacker models. The attacker does not behave randomly and different attacker capabilities and behaviour have to be considered. We provide means to experimental work with parametrisable attacker capabilities and behaviour in realistic simulations, and evaluate the impact of the realistic attacker properties on the performance of major amplification protocols.
Links
GBP202/12/G061, research and development projectName: Centrum excelence - Institut teoretické informatiky (CE-ITI) (Acronym: CE-ITI)
Investor: Czech Science Foundation
PrintDisplayed: 20/7/2024 19:13