NĚMEC, Lukáš, Václav MATYÁŠ, Radim OŠŤÁDAL and Petr ŠVENDA. Practical approach to re-securing compromised wireless sensor networks. Online. In Procedia Computer Science - 16th International Conference on Future Networks and Communications, FNC 2021. Verona, Italy: Elsevier, 2021, p. 264-271. ISSN 1877-0509. Available from: https://dx.doi.org/10.1016/j.procs.2021.07.033.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Practical approach to re-securing compromised wireless sensor networks
Name in Czech Practical approach to re-securing compromised wireless sensor networks
Authors NĚMEC, Lukáš (203 Czech Republic, belonging to the institution), Václav MATYÁŠ (203 Czech Republic, guarantor, belonging to the institution), Radim OŠŤÁDAL (203 Czech Republic) and Petr ŠVENDA (203 Czech Republic, belonging to the institution).
Edition Verona, Italy, Procedia Computer Science - 16th International Conference on Future Networks and Communications, FNC 2021, p. 264-271, 8 pp. 2021.
Publisher Elsevier
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Netherlands
Confidentiality degree is not subject to a state or trade secret
Publication form electronic version available online
WWW URL
RIV identification code RIV/00216224:14330/21:00122415
Organization unit Faculty of Informatics
ISSN 1877-0509
Doi http://dx.doi.org/10.1016/j.procs.2021.07.033
Keywords in English adaptive; autonomous; cryptography; distributed; protocol; security; wireless; radio communication
Tags International impact, Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 23/5/2022 15:00.
Abstract
Wireless sensor networks with a large number of cheap, low-power interconnected devices bring up challenging tasks when considering the security of their communications. We have previously proposed two novel approaches to updating cryptographic link keys between individual nodes - entropy-driven secrecy amplification and entropy crowdsourcing. In this paper, we focus on evaluating the protocols and their optimal settings and benefits. The comparison of individual protocols is made both on a real network and in simulation. Based on the results, we argue that none of the evaluated protocols outperform the others globally in all possible scenarios. Still, if we focus only on one specific case, we can optimize the protocol selection. Based on the evidence from experimental data, we, therefore, suggest the use of multiple different protocols with the option of dynamically switching in between them.
PrintDisplayed: 27/4/2024 21:57