You are here:
Publication details
On Node Capturing Attacker Strategies
Authors | |
---|---|
Year of publication | 2014 |
Type | Article in Proceedings |
Conference | Security Protocols XXII - 22nd International Workshop, Revised Selected Papers |
MU Faculty or unit | |
Citation | |
web | On Node Capturing Attacker Strategies |
Doi | http://dx.doi.org/10.1007/978-3-319-12400-1_29 |
Field | Informatics |
Keywords | wireless sensor networks; automated evaluation; key management schemes; node capturing; attack strategies |
Description | In distributed environments, such as wireless networks, a common adversary is considered to take control over a fraction of the nodes and hence to affect the system behaviour. We have examined several key management schemes for wireless sensor networks where the adversary compromises all the secret keys stored on captured nodes. We propose a number of realistic movement strategies that an actual attacker could pursue to capture nodes and examine the fallout of these attack approaches. |
Related projects: |