Další formáty:
BibTeX
LaTeX
RIS
@inproceedings{1793458, author = {Němec, Lukáš and Matyáš, Václav and Ošťádal, Radim and Švenda, Petr}, address = {Verona, Italy}, booktitle = {Procedia Computer Science - 16th International Conference on Future Networks and Communications, FNC 2021}, doi = {http://dx.doi.org/10.1016/j.procs.2021.07.033}, keywords = {adaptive; autonomous; cryptography; distributed; protocol; security; wireless; radio communication}, howpublished = {elektronická verze "online"}, language = {eng}, location = {Verona, Italy}, pages = {264-271}, publisher = {Elsevier}, title = {Practical approach to re-securing compromised wireless sensor networks}, url = {https://www.sciencedirect.com/science/article/pii/S1877050921014289}, year = {2021} }
TY - JOUR ID - 1793458 AU - Němec, Lukáš - Matyáš, Václav - Ošťádal, Radim - Švenda, Petr PY - 2021 TI - Practical approach to re-securing compromised wireless sensor networks PB - Elsevier CY - Verona, Italy KW - adaptive KW - autonomous KW - cryptography KW - distributed KW - protocol KW - security KW - wireless KW - radio communication UR - https://www.sciencedirect.com/science/article/pii/S1877050921014289 N2 - Wireless sensor networks with a large number of cheap, low-power interconnected devices bring up challenging tasks when considering the security of their communications. We have previously proposed two novel approaches to updating cryptographic link keys between individual nodes - entropy-driven secrecy amplification and entropy crowdsourcing. In this paper, we focus on evaluating the protocols and their optimal settings and benefits. The comparison of individual protocols is made both on a real network and in simulation. Based on the results, we argue that none of the evaluated protocols outperform the others globally in all possible scenarios. Still, if we focus only on one specific case, we can optimize the protocol selection. Based on the evidence from experimental data, we, therefore, suggest the use of multiple different protocols with the option of dynamically switching in between them. ER -
NĚMEC, Lukáš, Václav MATYÁŠ, Radim OŠŤÁDAL a Petr ŠVENDA. Practical approach to re-securing compromised wireless sensor networks. In \textit{Procedia Computer Science - 16th International Conference on Future Networks and Communications, FNC 2021}. Verona, Italy: Elsevier. s.~264-271. ISSN~1877-0509. doi:10.1016/j.procs.2021.07.033. 2021.
|