This is an old revision of the document!
Reconsidering Attacker Models in Ad-hoc Networks - SPW 2016
Authors: Radim Ostadal, Petr Svenda, Vaclav Matyas
Abstract: Our paper aims to move the research of secrecy amplification protocols for general ad-hoc networks to more realistic scenarios, conditions and attacker capabilities. The extension of the current attacker models is necessary, including the differentiation based on types of attacker's manipulation with a node, monitoring capabilities and movement strategies. We also aim to propose suitable secrecy amplification protocols that can reflect the new attacker models in different examined scenarios, utilising genetic programming and manual post-processing.
- Conference page: SPW 2016
- Download author pre-print of the paper: pdf
- Download extended version of paper: FIMU-RS-2015-01 (technical report, FI MUNI)
- Download presentation: pdf
- Download used simulator and configuration files: zip source code, executable file
Bibtex:
@inproceedings{secrecyamplif_wistp2015, author = {Radim O\v{s}\v{t}\'{a}dal \Petr \v{S}venda \and V{\'a}clav Maty{\'a}\v{s}}, title = {On Secrecy Amplification Protocols}, booktitle = {The 9th WISTP International Conference on Information Security Theory and Practice (WISTP’2015), LNCS 9311}, year = {2015}, pages = {3--19}, doi = {10.1007/978-3-319-24018-3 1}, publisher = {Springer} }
What is this paper about?