Proceedings of the Second ACM Conference on Wireless Network Security 2009
DOI: 10.1145/1514274.1514306
|View full text |Cite
|
Sign up to set email alerts
|

Evolutionary design of secrecy amplification protocols for wireless sensor networks

Abstract: We propose a new method for automatic generation of secrecy amplification protocols for wireless sensor networks, utilizing evolutionary algorithms. We were able to rediscover all published protocols for secrecy amplification we are aware of, and found a new protocol that outperforms the existing ones. An alternative construction of secrecy amplification protocols with a comparable fraction of secure links to that of the original "node-oriented" approach was also designed. This new construction exhibits only l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
7
1
1

Relationship

3
6

Authors

Journals

citations
Cited by 17 publications
(21 citation statements)
references
References 20 publications
(30 reference statements)
0
21
0
Order By: Relevance
“…Variants of the Push and Multi-hop Push protocols called Pull and Multi-hop Pull protocols were presented by Cvrcek et al in [12]. The best-performing node-oriented protocol (NO Best) was presented by Svenda et al in [3] and more information about that protocol is provided in the Appendix A.1.…”
Section: Secrecy Amplification Principles and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Variants of the Push and Multi-hop Push protocols called Pull and Multi-hop Pull protocols were presented by Cvrcek et al in [12]. The best-performing node-oriented protocol (NO Best) was presented by Svenda et al in [3] and more information about that protocol is provided in the Appendix A.1.…”
Section: Secrecy Amplification Principles and Related Workmentioning
confidence: 99%
“…Although this could appear to be a hopeless attempt without the knowledge of the compromised links and without a broadly coordinated cooperation, the results show that the nodes, as a crowd, can achieve an excellent performance. A strong majority of secure links (>90%) can be achieved using secrecy amplification protocols, even when 50% of all network links are initially compromised [3].…”
Section: Introductionmentioning
confidence: 99%
“…It uses already secured links to establish link keys between two neighboring nodes that could not establish a link key directly as they had no shared key or their keys were compromised [3].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Besides above research, some security protocols are designed for the special service application, such as evolutionary design of secrecy amplification protocols [4], self-healing control flow protection [5], practical characterization of 802.11 access points inparis [6] and so on.…”
Section: Introductionmentioning
confidence: 99%