Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
public:papers:spw2016 [2016-06-16 23:31] rostadalpublic:papers:spw2016 [2016-12-01 13:28] (current) – external edit 127.0.0.1
Line 29: Line 29:
  
 ===== What is this paper about? ===== ===== What is this paper about? =====
-FIXME+ 
 +Ad-hoc networks often handle highly sensitive information and security of such networks is a typical baseline requirement. Secure link communication is the building block for many security services maintained by a network. Ad-hoc networks also present several challenges like limited computational and storage resources or an energy source, usually in the form of a battery. 
 + 
 +The attacker in that environment is usually able to capture a node itself and read out all keying material as there typically is no tamper resistance. After the initial compromise, the global attacker is expected.  
 + 
 +The secrecy amplification (SA) protocols were proposed to re-secure some previously compromised communication links using non-compromised paths to deliver new secure keys. The comprehensive overview of SA protocols could be found [[http://crcs.cz/wiki/doku.php?id=public:papers:wistp2015|here]]. 
 + 
 +**In this paper, we:** 
 +  * Provided three additional attacker models compared to the one used (Random Key compromise): key exfiltration model, passive node control model, and active node control model. Based on attacker capabilities, we also distinguish the global and local attacker. 
 +  * Proposed different ways of evaluation of SA protocols: a ratio of compromised and non-compromised link keys, a percentage of secure communication among neighbours, or the percentage of secure communication from nodes to the base station. 
 +  * Extended the KMSforWSN framework. The whole framework including the documentation could be download {{:public:papers:kmsforwsn_src.zip|here}}. 
 +  * Discussed different attacker capabilities and behaviour to parametrise the attacker. 
 +  * Performed an initial comparison of a local and global attacker on Random key compromise and Random node compromise pattern. 
 +  * Performed an experiment for Passive node control model. 
 + 
 +{{:public:papers:infected_nodes.png?600|}} 
 + 
 +//A success rate of SA protocols for a different number of malware infected nodes. A decrease in the percentage of secured links is linear that is good considering the attacker's control over the node. One can obtain reasonably secure network (more than 85% of secure links) even in case of 7 malware infected nodes considering the hybrid designed protocols are used.//