This is an old revision of the document!
Reconsidering Attacker Models in Ad-hoc Networks - SPW 2016
Authors: Radim Ostadal, Petr Svenda, Vaclav Matyas
Abstract: We review the most important secrecy amplification protocols, which are especially suitable for ad-hoc networks of devices with limited resources, providing additional resistance against various attacks on used cryptographic keys without necessity for asymmetric cryptography. We discuss and evaluate different designs as well as approaches to create new protocols. A special focus is given to suitability of these protocols with respect to different underlying key distribution schemes and also to open research questions.
- Conference page: WISTP 2015
- Download author pre-print of the paper: pdf
- Download extended version of paper: FIMU-RS-2015-01 (technical report, FI MUNI)
- Download presentation: pdf
- Download used simulator and configuration files: zip source code, executable file
Bibtex:
@inproceedings{secrecyamplif_wistp2015, author = {Radim O\v{s}\v{t}\'{a}dal \Petr \v{S}venda \and V{\'a}clav Maty{\'a}\v{s}}, title = {On Secrecy Amplification Protocols}, booktitle = {The 9th WISTP International Conference on Information Security Theory and Practice (WISTP’2015), LNCS 9311}, year = {2015}, pages = {3--19}, doi = {10.1007/978-3-319-24018-3 1}, publisher = {Springer} }
What is this paper about?