Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
public:papers:iot2017 [2017-06-19 09:52] – [Abstract] xostadal | public:papers:iot2018 [2018-07-30 12:04] (current) – ↷ Page name changed from public:papers:iot2017 to public:papers:iot2018 xostadal | ||
---|---|---|---|
Line 2: | Line 2: | ||
==== Abstract ==== | ==== Abstract ==== | ||
- | Research in the area of security for Wireless Sensor Networks (WSNs) over the past two decades has yielded many interesting findings. We focus on the topic of (re-) securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols. | + | Research in the area of security for Wireless Sensor Networks (WSNs) over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols. |
Crowdsourcing is at the very heart of these SA protocols. Not only do SA protocols work wonders even for low-level constrained nodes with no tamper resistance, they exhibit astonishing performance in networks under significant attacker control. Our work shows that even when 50% of all network links are compromised, | Crowdsourcing is at the very heart of these SA protocols. Not only do SA protocols work wonders even for low-level constrained nodes with no tamper resistance, they exhibit astonishing performance in networks under significant attacker control. Our work shows that even when 50% of all network links are compromised, |