Informace o projektu
Bezpečnostní protokoly podporující soukromí a detekce průniku v bezdrátových senzorových sítích
(P202/11/0422)
- Kód projektu
- GAP202/11/0422
- Období řešení
- 3/2011 - 12/2014
- Investor / Programový rámec / typ projektu
-
Grantová agentura ČR
- Standardní projekty
- Fakulta / Pracoviště MU
- Fakulta informatiky
Development of low-cost, low-power, multifunctional devices that are small in size and communicate only at short distances enables us to form Wireless Sensor Networks (WSNs). This project focuses on the following three related areas:
1. Analysis of temporary changes in privacy protection requirements for WSNs and proposal for scalable privacy protection protocols reflecting the changes.
2. Proposal for a framework that enables (semi)automatic design of optimal intrusion detection systems for particular WSNs with a particular topology, sensor nodes capabilities and threats.
3. Analysis of the methods suitable for automatic search and optimization of security-related protocols personalized for a given network technology and layout. Automatic construction of attack strategies. Evolutionary algorithms are a prominent candidate here.
These three areas are consistent with the three workpackages of this project. And in each of them we plan to experimentally verify the performance of proposed methods/protocols in a simulated vs. small scale real WSN deployment since simulator results have been shown particularly tricky.
Publikace
Počet publikací: 24
2017
-
Reconsidering Attacker Models in Ad-Hoc Networks
Security Protocols XXIV - 24th International Workshop, rok: 2017
2015
-
On Secrecy Amplification Protocols
Proceedings - Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015, rok: 2015
2014
-
A New Approach to Secrecy Amplification in Partially Compromised Networks
Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, rok: 2014
-
A protocol for intrusion detection in location privacy-aware wireless sensor networks
Trust, Privacy, and Security in Digital Business, 11th International Conference, TrustBus 2014, rok: 2014
-
Constructing empirical tests of randomness
SECRYPT 2014 Proceedings of the 11th International Conference on Security and Cryptography, rok: 2014
-
Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits
E-Business and Telecommunications, rok: 2014
-
Evaluation of key management schemes in wireless sensor networks
Security and Trust Management, rok: 2014
-
Faster Randomness Testing with the NIST Statistical Test Suite
Security, Privacy, and Applied Cryptography Engineering, rok: 2014
-
Improving Intrusion Detection Systems for Wireless Sensor Networks
Applied Cryptography and Network Security, rok: 2014
-
On Node Capturing Attacker Strategies
Security Protocols XXII - 22nd International Workshop, Revised Selected Papers, rok: 2014