All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Entropy crowdsourcing - protocols for link key updates in wireless sensor networks

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14330%2F18%3A00100827" target="_blank" >RIV/00216224:14330/18:00100827 - isvavai.cz</a>

  • Result on the web

    <a href="http://dx.doi.org/10.1007/978-3-030-03251-7_9" target="_blank" >http://dx.doi.org/10.1007/978-3-030-03251-7_9</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1007/978-3-030-03251-7_9" target="_blank" >10.1007/978-3-030-03251-7_9</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Entropy crowdsourcing - protocols for link key updates in wireless sensor networks

  • Original language description

    In this work, we propose a completely different design of key distribution protocols for ad-hoc networks of nodes with restricted resources, wireless sensor networks (WSNs). Earlier research on so-called secrecy amplification (SA) for WSNs went with the discrete “take it or leave it” design – either the newly transferred key components got to their destination securely, or the attacker learned their values. And as the SA measures are probabilistic and preventive in nature, no-one but the attacker knew what the attacker learned (and when Mallory learned a key component, she obviously did not push for the fail-deadly trigger). We propose to combine vanilla secrecy amplification with key extraction from the radio channel, coming up with a novel method to produce and deliver key updates to individual link keys.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

    <a href="/en/project/GBP202%2F12%2FG061" target="_blank" >GBP202/12/G061: Center of excellence - Institute for theoretical computer science (CE-ITI)</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2018

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Security Protocols XXVI: 26th International Workshop

  • ISBN

    9783030032500

  • ISSN

  • e-ISSN

  • Number of pages

    9

  • Pages from-to

    84-92

  • Publisher name

    Springer International Publishing

  • Place of publication

    Cham, Switzerland

  • Event location

    Cambridge, UK

  • Event date

    Mar 19, 2018

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article