Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revisionBoth sides next revision | ||
public:papers:iot2017 [2017-06-19 09:51] – xostadal | public:papers:iot2017 [2017-06-19 09:52] – [Abstract] xostadal | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Crowdsourced Security Reconstitution ====== | ====== Crowdsourced Security Reconstitution ====== | ||
- | ===== Abstract | + | ==== Abstract ==== |
- | Research in the area of security for Wireless Sensor Networks (WSNs) over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols. | + | Research in the area of security for Wireless Sensor Networks (WSNs) over the past two decades has yielded many interesting findings. We focus on the topic of (re-) securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols. |
Crowdsourcing is at the very heart of these SA protocols. Not only do SA protocols work wonders even for low-level constrained nodes with no tamper resistance, they exhibit astonishing performance in networks under significant attacker control. Our work shows that even when 50% of all network links are compromised, | Crowdsourcing is at the very heart of these SA protocols. Not only do SA protocols work wonders even for low-level constrained nodes with no tamper resistance, they exhibit astonishing performance in networks under significant attacker control. Our work shows that even when 50% of all network links are compromised, | ||
Line 10: | Line 10: | ||
This work demonstrates the practical usability (and the attractive performance) of SA, serving as a ripe technology enabler for (among others) networks with many potentially compromised low-level devices. | This work demonstrates the practical usability (and the attractive performance) of SA, serving as a ripe technology enabler for (among others) networks with many potentially compromised low-level devices. | ||
- | ===== Other resources | + | ==== Other resources ==== |
Implementations for Arduino and TinyOS platforms: https:// | Implementations for Arduino and TinyOS platforms: https:// |