Cryptography for (partially) compromised sensor networks

Varování

Publikace nespadá pod Filozofickou fakultu, ale pod Fakultu informatiky. Oficiální stránka publikace je na webu muni.cz.
Autoři

HANÁČEK Petr ŠVENDA Petr

Rok publikování 2011
Druh Článek ve sborníku
Konference Information Security Summit - Crisis Plans and Security
Fakulta / Pracoviště MU

Fakulta informatiky

Citace
Obor Informatika
Klíčová slova wireless sensor networks; cryptographic smart cards
Popis This paper will introduce the technology of wireless sensor networks with a special focus on its security issues. This relatively young technology started to evolve together with the advance in miniaturization of electronic devices, decreasing costs and general spread of wireless communication. Data sensed by the miniature devices in a target area (e.g., temperature, pressure, movement) are locally processed and then transmitted to end user who obtains the possibility to continuously monitor target environment. The usage of the technology starts from medical monitoring of the patients over agriculture and industrial monitoring or early warning emergency systems, ending with uses for military purposes as well – that is where the technology originally started. We will cover the issue of design of a key distribution and establishment protocols secure against the partial network compromise in more details. Special focus will be given to possibility for its automated generation of protocols for particular network scenario. Opposite direction will be covered as well – automated search for attacker's. We will also cover possibility to introduce low-cost tamper resistant hardware to sensor nodes without increasing the node cost and battery consumption significantly – the scenario usually not assumed in current research papers in the field.
Související projekty:

Používáte starou verzi internetového prohlížeče. Doporučujeme aktualizovat Váš prohlížeč na nejnovější verzi.