On Node Capturing Attacker Strategies
Autoři | |
---|---|
Rok publikování | 2014 |
Druh | Článek ve sborníku |
Konference | Security Protocols XXII - 22nd International Workshop, Revised Selected Papers |
Fakulta / Pracoviště MU | |
Citace | |
www | On Node Capturing Attacker Strategies |
Doi | http://dx.doi.org/10.1007/978-3-319-12400-1_29 |
Obor | Informatika |
Klíčová slova | wireless sensor networks; automated evaluation; key management schemes; node capturing; attack strategies |
Popis | In distributed environments, such as wireless networks, a common adversary is considered to take control over a fraction of the nodes and hence to affect the system behaviour. We have examined several key management schemes for wireless sensor networks where the adversary compromises all the secret keys stored on captured nodes. We propose a number of realistic movement strategies that an actual attacker could pursue to capture nodes and examine the fallout of these attack approaches. |
Související projekty: |