Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
public:papers:iot2017 [2017-06-19 09:52] – [Abstract] xostadalpublic:papers:iot2018 [2018-07-30 12:04] (current) – ↷ Page name changed from public:papers:iot2017 to public:papers:iot2018 xostadal
Line 2: Line 2:
  
 ==== Abstract ==== ==== Abstract ====
-Research in the area of security for Wireless Sensor Networks (WSNs) over the past two decades has yielded many interesting findings. We focus on the topic of (re-) securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols.+Research in the area of security for Wireless Sensor Networks (WSNs) over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols.
  
 Crowdsourcing is at the very heart of these SA protocols. Not only do SA protocols work wonders even for low-level constrained nodes with no tamper resistance, they exhibit astonishing performance in networks under significant attacker control. Our work shows that even when 50% of all network links are compromised, SA protocols can re-secure over 90% of the link keys through an intriguingly simple crowdsourcing mechanism. These protocols allow us to re-take control without any broadly coordinated cooperation, without knowledge of the compromised links, with only very limited knowledge of each particular network node and independently of decisions made by other nodes. Crowdsourcing is at the very heart of these SA protocols. Not only do SA protocols work wonders even for low-level constrained nodes with no tamper resistance, they exhibit astonishing performance in networks under significant attacker control. Our work shows that even when 50% of all network links are compromised, SA protocols can re-secure over 90% of the link keys through an intriguingly simple crowdsourcing mechanism. These protocols allow us to re-take control without any broadly coordinated cooperation, without knowledge of the compromised links, with only very limited knowledge of each particular network node and independently of decisions made by other nodes.