OŠŤÁDAL, Radim, Petr ŠVENDA and Václav MATYÁŠ. Reconsidering Attacker Models in Ad-Hoc Networks. In J Anderson, V Matyáš, B Christianson, F Stajano. Security Protocols XXIV - 24th International Workshop. LNCS 10368. Heidelberg: Springer International Publishing AG, 2017, p. 219-227. ISBN 978-3-319-62032-9. Available from: https://dx.doi.org/10.1007/978-3-319-62033-6_25.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Reconsidering Attacker Models in Ad-Hoc Networks
Authors OŠŤÁDAL, Radim (203 Czech Republic, belonging to the institution), Petr ŠVENDA (203 Czech Republic, belonging to the institution) and Václav MATYÁŠ (203 Czech Republic, guarantor, belonging to the institution).
Edition LNCS 10368. Heidelberg, Security Protocols XXIV - 24th International Workshop, p. 219-227, 9 pp. 2017.
Publisher Springer International Publishing AG
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Germany
Confidentiality degree is not subject to a state or trade secret
Publication form printed version "print"
WWW URL
Impact factor Impact factor: 0.402 in 2005
RIV identification code RIV/00216224:14330/17:00094850
Organization unit Faculty of Informatics
ISBN 978-3-319-62032-9
ISSN 0302-9743
Doi http://dx.doi.org/10.1007/978-3-319-62033-6_25
UT WoS 000457458300025
Keywords in English ad-hoc networks; attacker models; genetic programming; secrecy amplification; wireless sensor networks; protocol
Tags International impact, Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 14/5/2020 15:13.
Abstract
Our paper aims to move the research of secrecy amplification protocols for general ad-hoc networks to more realistic scenarios, conditions and attacker capabilities. Extension of the current attacker models is necessary, including the differentiation based on types of attacker's manipulation with a node, monitoring capabilities and movement strategies. We also aim to propose suitable secrecy amplification protocols that can reflect the new attacker models in different examined scenarios, utilising genetic programming and manual post-processing.
Links
GAP202/11/0422, research and development projectName: Bezpečnostní protokoly podporující soukromí a detekce průniku v bezdrátových senzorových sítích (Acronym: P202/11/0422)
Investor: Czech Science Foundation
PrintDisplayed: 25/4/2024 08:24