Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping – Secrecy Amplification Case
Authors | |
---|---|
Year of publication | 2016 |
Type | Article in Proceedings |
Conference | International Conference on Cryptology and Network Security |
MU Faculty or unit | |
Citation | |
Web | http://www.springer.com/us/book/9783319489643 |
Doi | http://dx.doi.org/10.1007/978-3-319-48965-0_34 |
Field | Informatics |
Keywords | attacker model; wireless sensor networl; crypto protocol |
Description | Partially compromised network is a pragmatic assumption in many real-life scenarios. Secrecy amplification protocols provide a significant increase in the number of secure communication links by re-establishing new keys via different communication paths. Our paper shows that research in the area of secrecy amplification protocols for ad-hoc networks has been based on rather simplified foundations w. r. t. attacker models. The attacker does not behave randomly and different attacker capabilities and behaviour have to be considered. We provide means to experimental work with parametrisable attacker capabilities and behaviour in realistic simulations, and evaluate the impact of the realistic attacker properties on the performance of major amplification protocols. |
Related projects: |