Project information
Bezpečnostní protokoly podporující soukromí a detekce průniku v bezdrátových senzorových sítích
(P202/11/0422)
- Project Identification
- GAP202/11/0422
- Project Period
- 3/2011 - 12/2014
- Investor / Pogramme / Project type
-
Czech Science Foundation
- Standard Projects
- MU Faculty or unit
- Faculty of Informatics
Development of low-cost, low-power, multifunctional devices that are small in size and communicate only at short distances enables us to form Wireless Sensor Networks (WSNs). This project focuses on the following three related areas:
1. Analysis of temporary changes in privacy protection requirements for WSNs and proposal for scalable privacy protection protocols reflecting the changes.
2. Proposal for a framework that enables (semi)automatic design of optimal intrusion detection systems for particular WSNs with a particular topology, sensor nodes capabilities and threats.
3. Analysis of the methods suitable for automatic search and optimization of security-related protocols personalized for a given network technology and layout. Automatic construction of attack strategies. Evolutionary algorithms are a prominent candidate here.
These three areas are consistent with the three workpackages of this project. And in each of them we plan to experimentally verify the performance of proposed methods/protocols in a simulated vs. small scale real WSN deployment since simulator results have been shown particularly tricky.
Publications
Total number of publications: 24
2014
-
Red Queen's Race: APT win-win game
Security Protocols XXII - 22nd International Workshop, Revised Selected Papers, year: 2014
-
Security Protocols XXII - 22nd International Workshop, Revised Selected Papers
Year: 2014, type:
-
Traversing Symmetric NAT with Predictable Port Allocation
SIN '14 Proceedings of the 7th International Conference on Security of Information and Networks, year: 2014
2013
-
A Better Way towards Key Establishment and Authentication in Wireless Sensor Networks
Proceedings of the 8th international conference on Mathematical and Engineering Methods in Computer Science, year: 2013
-
An Adaptive Security Architecture for Location Privacy Sensitive Sensor Network Applications
Lightweight Cryptography for Security and Privacy, year: 2013
-
Conflicts between Intrusion Detection and Privacy Mechanisms for Wireless Sensor Networks
IEEE Security & Privacy, year: 2013, volume: 11, edition: 5, DOI
-
Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks
Advances in Artificial Life, ECAL 2013, Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems, year: 2013
-
On the Origin of Yet another Channel
Proceedings of Security Protocols XXI, year: 2013
-
Towards cryptographic function distinguishers with evolutionary circuits
Proceedings of SECRYPT 2013, 10th International Conference on Security and Cryptography, year: 2013
-
Using encryption for authentication: Wireless sensor network case
2013 IEEE International Workshop on Security and Privacy of Mobile, Wireless, and Sensor Networks (MWSN), year: 2013