Reconsidering Attacker Models in Ad-Hoc Networks
Authors | |
---|---|
Year of publication | 2017 |
Type | Article in Proceedings |
Conference | Security Protocols XXIV - 24th International Workshop |
MU Faculty or unit | |
Citation | |
Web | http://www.springer.com/us/book/9783319620329 |
Doi | http://dx.doi.org/10.1007/978-3-319-62033-6_25 |
Field | Informatics |
Keywords | ad-hoc networks; attacker models; genetic programming; secrecy amplification; wireless sensor networks; protocol |
Description | Our paper aims to move the research of secrecy amplification protocols for general ad-hoc networks to more realistic scenarios, conditions and attacker capabilities. Extension of the current attacker models is necessary, including the differentiation based on types of attacker's manipulation with a node, monitoring capabilities and movement strategies. We also aim to propose suitable secrecy amplification protocols that can reflect the new attacker models in different examined scenarios, utilising genetic programming and manual post-processing. |
Related projects: |