Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
public:papers:wistp2015 [2015-09-03 08:13] – petrs | public:papers:wistp2015 [2016-12-01 13:28] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 6: | Line 6: | ||
* Conference page: [[http:// | * Conference page: [[http:// | ||
- | * Download paper: {{: | + | * Download |
* Download extended version of paper: {{: | * Download extended version of paper: {{: | ||
* Download presentation: | * Download presentation: | ||
Line 13: | Line 13: | ||
**Bibtex:** | **Bibtex:** | ||
| | ||
- | | + | |
title = {On Secrecy Amplification Protocols}, | title = {On Secrecy Amplification Protocols}, | ||
| | ||
Line 32: | Line 32: | ||
===== What is this paper about? ===== | ===== What is this paper about? ===== | ||
- | The secrecy amplification protocol provides description how messages with a fresh key material should be propagated inside a target network to provide secure link key to nodes with key currently compromised by an attacker. As wireless networks running on batteries are targeted, not only protocol' | + | The secrecy amplification protocol provides description how messages with a fresh key material should be propagated inside a target network to provide secure link key to nodes with key currently compromised by an attacker. As wireless networks running on batteries are targeted, not only protocol' |
+ | |||
+ | //A secrecy | ||
**In this we paper, we:** | **In this we paper, we:** | ||
Line 44: | Line 46: | ||
{{: | {{: | ||
- | //Figure showing increase in the number of secured links after SA protocols in the random | + | //Figure showing increase in the number of secured links after secrecy amplification |
compromise pattern on network with 20.3 legal neighbours on average. With in- | compromise pattern on network with 20.3 legal neighbours on average. With in- | ||
creasing number of neighbouring nodes the general effectiveness of protocol grows. | creasing number of neighbouring nodes the general effectiveness of protocol grows. |