Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping – Secrecy Amplification Case

Investor logo

Warning

This publication doesn't include Faculty of Economics and Administration. It includes Faculty of Informatics. Official publication website can be found on muni.cz.
Authors

OŠŤÁDAL Radim ŠVENDA Petr MATYÁŠ Václav

Year of publication 2016
Type Article in Proceedings
Conference International Conference on Cryptology and Network Security
MU Faculty or unit

Faculty of Informatics

Citation
Web http://www.springer.com/us/book/9783319489643
Doi http://dx.doi.org/10.1007/978-3-319-48965-0_34
Field Informatics
Keywords attacker model; wireless sensor networl; crypto protocol
Description Partially compromised network is a pragmatic assumption in many real-life scenarios. Secrecy amplification protocols provide a significant increase in the number of secure communication links by re-establishing new keys via different communication paths. Our paper shows that research in the area of secrecy amplification protocols for ad-hoc networks has been based on rather simplified foundations w. r. t. attacker models. The attacker does not behave randomly and different attacker capabilities and behaviour have to be considered. We provide means to experimental work with parametrisable attacker capabilities and behaviour in realistic simulations, and evaluate the impact of the realistic attacker properties on the performance of major amplification protocols.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.