Reconsidering Attacker Models in Ad-Hoc Networks

Investor logo

Warning

This publication doesn't include Institute of Computer Science. It includes Faculty of Informatics. Official publication website can be found on muni.cz.
Authors

OŠŤÁDAL Radim ŠVENDA Petr MATYÁŠ Václav

Year of publication 2017
Type Article in Proceedings
Conference Security Protocols XXIV - 24th International Workshop
MU Faculty or unit

Faculty of Informatics

Citation
web http://www.springer.com/us/book/9783319620329
Doi http://dx.doi.org/10.1007/978-3-319-62033-6_25
Field Informatics
Keywords ad-hoc networks; attacker models; genetic programming; secrecy amplification; wireless sensor networks; protocol
Description Our paper aims to move the research of secrecy amplification protocols for general ad-hoc networks to more realistic scenarios, conditions and attacker capabilities. Extension of the current attacker models is necessary, including the differentiation based on types of attacker's manipulation with a node, monitoring capabilities and movement strategies. We also aim to propose suitable secrecy amplification protocols that can reflect the new attacker models in different examined scenarios, utilising genetic programming and manual post-processing.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.

More info