Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
Last revisionBoth sides next revision
public:papers:cans2016 [2016-09-13 13:14] – created rostadalpublic:papers:cans2016 [2016-09-13 13:19] rostadal
Line 2: Line 2:
 **Authors: Radim Ostadal, Petr Svenda, Vaclav Matyas** **Authors: Radim Ostadal, Petr Svenda, Vaclav Matyas**
  
-**Abstract:** //Our paper aims to move the research of secrecy amplification protocols for general ad-hoc networks to more realistic scenarios, conditions and attacker capabilities. The extension of the current attacker models is necessary, including the differentiation based on types of attacker's manipulation with a node, monitoring capabilities and movement strategies. We also aim to propose suitable secrecy amplification protocols that can reflect the new attacker models in different examined scenariosutilising genetic programming and manual post-processing.//+**Abstract:** //Partially compromised network is a pragmatic assumption in many real-life scenarios. Secrecy amplification protocols provide a significant increase in the number of secure communication links by re-establishing new keys via  
 +different communication paths. Our paper shows that so far research in the area of secrecy amplification protocols for wireless sensor networks has been based on rather simplified foundations with respect to attacker models. The attacker does not behave randomly and different attacker capabilities and behaviour have to be considered. We provide means to experimental work with parametrisable attacker capabilities and behaviour in realistic simulations, and evaluate the impact of the realistic  
 +attacker properties on the performance of major amplification protocols.
  
-  * Conference page: [[https://www.engr.mun.ca/~spw2016/|SPW 2016]] +We also show which secrecy amplification protocols perform best in different  
-  * Download author pre-print of the paper: {{:public:papers:spw16_v13.pdf|pdf}} +attacker settings and help to select a protocol that exhibits good results in a  
-  * Download presentation: {{:public:papers:saattacker_spw16_final.pdf|pdf}}+prevalent number of inspected scenarios.// 
 + 
 +  * Conference page: [[http://cans2016.di.unimi.it|CANS 2016]] 
 +  * Download author pre-print of the paper: TBD 
 +  * Download presentation: TBD
   * Download used simulator: {{:public:papers:kmsforwsn_src.zip|zip source code}}   * Download used simulator: {{:public:papers:kmsforwsn_src.zip|zip source code}}
   * Download simulator documentation: {{:public:papers:kmsforwsn_doc.zip|zip html documentation}}   * Download simulator documentation: {{:public:papers:kmsforwsn_doc.zip|zip html documentation}}
  
-**Bibtex:** 
-  
- 
-   @inproceedings{attackermodels_spw2016, 
-     author = {Radim O\v{s}\v{t}\'{a}dal \Petr \v{S}venda \and V{\'a}clav Maty{\'a}\v{s}}, 
-     title = {Reconsidering Attacker Models in Ad-hoc Networks}, 
-     booktitle = {24th International Workshop on Security Protocols (SPW 2016)}, 
-     year = {2016}, 
-     publisher = {{\em To appear in Lecture Notes of Computer Science.} Springer} 
-   }