2006
DOI: 10.1016/j.entcs.2005.09.043
|View full text |Cite
|
Sign up to set email alerts
|

Smart Dust Security – Key Infection Revisited

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
22
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(22 citation statements)
references
References 5 publications
0
22
0
Order By: Relevance
“…Lightweight key distribution presented in [ACP04] requires no pre-distributed keys as link keys are exchanged directly in plaintext between neighbours "in situ" with secrecy amplification protocol executed afterwards. Weakened attacker with limited ability to eavesdrop in the network is assumed, where attacker's eavesdropping nodes are on an equivalent technical level (radio sensitivity) to legitimate nodes of the network owner, but present only in a fraction amount (results for 1-5% ratio for which a reasonably secure network can be set were originally presented [ACP04], and then improved up to 20% in [CS05]). The attacker's success is influenced by the placement of eavesdropping nodes.…”
Section: Optimal Eavesdropping Patternmentioning
confidence: 99%
See 2 more Smart Citations
“…Lightweight key distribution presented in [ACP04] requires no pre-distributed keys as link keys are exchanged directly in plaintext between neighbours "in situ" with secrecy amplification protocol executed afterwards. Weakened attacker with limited ability to eavesdrop in the network is assumed, where attacker's eavesdropping nodes are on an equivalent technical level (radio sensitivity) to legitimate nodes of the network owner, but present only in a fraction amount (results for 1-5% ratio for which a reasonably secure network can be set were originally presented [ACP04], and then improved up to 20% in [CS05]). The attacker's success is influenced by the placement of eavesdropping nodes.…”
Section: Optimal Eavesdropping Patternmentioning
confidence: 99%
“…The attacker's success is influenced by the placement of eavesdropping nodes. Original results presented in [ACP04,CS05] were based on an assumption that eavesdropping and legitimate nodes are both deployed in a random fashion. However, placing nodes in a specific pattern may consistently provide better results than for the random case.…”
Section: Optimal Eavesdropping Patternmentioning
confidence: 99%
See 1 more Smart Citation
“…Research on the effectiveness of secrecy amplification was usually based on simulations (e.g., [1], [3]) and the first (and only) mathematical analysis of secrecy amplification was reported in 2016 [4]. However, the previous mathematical analysis was performed only for the basic mode (i.e., each node always transmits packets at the maximum strength) and the analysis of the whispering mode was left as an open problem [4].…”
Section: Introductionmentioning
confidence: 99%
“…Let k 12 be the key established between two neighbor nodes W 1 Previous works on key infection show the effectiveness of secrecy amplification based on simulations (e.g., [3]) and no rigorous mathematical analysis has been performed. In this article, we provide the first mathematical analysis of secrecy amplification.…”
Section: Introductionmentioning
confidence: 99%