Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (2)

Search Parameters:
Authors = Petr Svenda ORCID = 0000-0002-9784-7624

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 707 KiB  
Article
Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification
by Radim Ostadal, Vashek Matyas, Petr Svenda and Lukas Nemec
Sensors 2019, 19(22), 5041; https://doi.org/10.3390/s19225041 - 19 Nov 2019
Cited by 6 | Viewed by 3014
Abstract
Research in the area of security for Wireless Sensor Networks over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols. Crowdsourcing is at the very [...] Read more.
Research in the area of security for Wireless Sensor Networks over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols. Crowdsourcing is at the very heart of these SA protocols. Not only do SA protocols work wonders even for low-level constrained nodes with no tamper resistance, they exhibit astonishing performance in networks under significant attacker control. Our work shows that even when 50% of all network links are compromised, SA protocols can re-secure over 90% of the link keys through an intriguingly simple crowdsourcing mechanism. These protocols allow us to re-take control without any broadly coordinated cooperation, without knowledge of the compromised links, with only very limited knowledge of each particular network node and independently of decisions made by other nodes. Our article first outlines the principles of and presents existing approaches to SA, introducing most of the important related concepts, then presents novel conclusive results for a realistic attacker model parametrised by attacker behaviour and capabilities. We undertook this work using two very different simulators, and we present here the results of analyses and detailed comparisons that have not previously been available. Finally, we report the first real, non-simulated network test results for the most attractive SA protocol, our implementations of which are available as open-source code for two platforms: Arduino and TinyOS. This work demonstrates the practical usability (and the attractive performance) of SA, serving as a ripe technology enabler for (among others) networks with many potentially compromised low-level devices. Full article
Show Figures

Figure 1

15 pages, 2939 KiB  
Article
Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks
by Lukas Nemec, Vashek Matyas, Radim Ostadal, Petr Svenda and Pierre-Louis Palant
Sensors 2019, 19(4), 914; https://doi.org/10.3390/s19040914 - 21 Feb 2019
Cited by 4 | Viewed by 3270
Abstract
Wireless sensor networks with a large number of cheap low-power interconnected devices bring up challenging tasks when considering the security of their communications. In our previous work, we presented two approaches for the design of dynamic protocols for link key (re-)establishment in ad [...] Read more.
Wireless sensor networks with a large number of cheap low-power interconnected devices bring up challenging tasks when considering the security of their communications. In our previous work, we presented two approaches for the design of dynamic protocols for link key (re-)establishment in ad hoc networks, using two elements studied earlier—secrecy amplification and key extraction from radio channel fading. The goal of this article is to provide a unified approach to the design of these protocols, together with their experimental verification, in a real network with various settings. The overall results of our experiments show that our dynamic combination of secrecy amplification and key extraction from radio channel fading saves a significant portion of messages with corresponding energy expenditure and can adapt to a much wider scale of environments when compared to previous solutions based on the exploitation of the individual elements of secrecy amplification and key extraction from radio channel fading. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Back to TopTop