Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
public:papers:iot2017 [2017-06-19 09:51] xostadalpublic:papers:iot2018 [2018-07-30 12:04] (current) – ↷ Page name changed from public:papers:iot2017 to public:papers:iot2018 xostadal
Line 1: Line 1:
 ====== Crowdsourced Security Reconstitution ====== ====== Crowdsourced Security Reconstitution ======
  
-===== Abstract =====+==== Abstract ====
 Research in the area of security for Wireless Sensor Networks (WSNs) over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols. Research in the area of security for Wireless Sensor Networks (WSNs) over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols.
  
Line 10: Line 10:
 This work demonstrates the practical usability (and the attractive performance) of SA, serving as a ripe technology enabler for (among others) networks with many potentially compromised low-level devices. This work demonstrates the practical usability (and the attractive performance) of SA, serving as a ripe technology enabler for (among others) networks with many potentially compromised low-level devices.
  
-===== Other resources =====+==== Other resources ====
  
 Implementations for Arduino and TinyOS platforms: https://github.com/crocs-muni/sec_amplif Implementations for Arduino and TinyOS platforms: https://github.com/crocs-muni/sec_amplif