Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
public:papers:wistp2015 [2015-09-03 08:13] – petrs | public:papers:wistp2015 [2016-12-01 13:28] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 6: | Line 6: | ||
* Conference page: [[http:// | * Conference page: [[http:// | ||
- | * Download paper: {{: | + | * Download |
* Download extended version of paper: {{: | * Download extended version of paper: {{: | ||
* Download presentation: | * Download presentation: | ||
Line 13: | Line 13: | ||
**Bibtex:** | **Bibtex:** | ||
| | ||
- | | + | |
title = {On Secrecy Amplification Protocols}, | title = {On Secrecy Amplification Protocols}, | ||
| | ||
Line 34: | Line 34: | ||
The secrecy amplification protocol provides description how messages with a fresh key material should be propagated inside a target network to provide secure link key to nodes with key currently compromised by an attacker. As wireless networks running on batteries are targeted, not only protocol' | The secrecy amplification protocol provides description how messages with a fresh key material should be propagated inside a target network to provide secure link key to nodes with key currently compromised by an attacker. As wireless networks running on batteries are targeted, not only protocol' | ||
- | A secrecy amplification protocol can be pretty effective: | + | //A secrecy amplification protocol can be pretty effective: a network with 50-70 % of compromised links can be turned |
**In this we paper, we:** | **In this we paper, we:** | ||
Line 46: | Line 46: | ||
{{: | {{: | ||
- | //Figure showing increase in the number of secured links after SA protocols in the random | + | //Figure showing increase in the number of secured links after secrecy amplification |
compromise pattern on network with 20.3 legal neighbours on average. With in- | compromise pattern on network with 20.3 legal neighbours on average. With in- | ||
creasing number of neighbouring nodes the general effectiveness of protocol grows. | creasing number of neighbouring nodes the general effectiveness of protocol grows. |