On Node Capturing Attacker Strategies

Investor logo

Warning

This publication doesn't include Faculty of Education. It includes Faculty of Informatics. Official publication website can be found on muni.cz.
Authors

JURNEČKA Filip STEHLÍK Martin MATYÁŠ Václav

Year of publication 2014
Type Article in Proceedings
Conference Security Protocols XXII - 22nd International Workshop, Revised Selected Papers
MU Faculty or unit

Faculty of Informatics

Citation
Web On Node Capturing Attacker Strategies
Doi http://dx.doi.org/10.1007/978-3-319-12400-1_29
Field Informatics
Keywords wireless sensor networks; automated evaluation; key management schemes; node capturing; attack strategies
Description In distributed environments, such as wireless networks, a common adversary is considered to take control over a fraction of the nodes and hence to affect the system behaviour. We have examined several key management schemes for wireless sensor networks where the adversary compromises all the secret keys stored on captured nodes. We propose a number of realistic movement strategies that an actual attacker could pursue to capture nodes and examine the fallout of these attack approaches.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.