Detail publikace

Cryptography for (partially) Compromised Sensor Networks

Originální název

Cryptography for (partially) Compromised Sensor Networks

Anglický název

Cryptography for (partially) Compromised Sensor Networks

Jazyk

en

Originální abstrakt

Wireless sensor networks are not just another technology, but also exhibit new and complex problems from the security perspective. The majority of the existing security approaches are unsuitable or even impossible to deploy due to the combination of decentralized tasks with high numbers of energy and computational-limited nodes positioned, typically, out of our permanent physical control. Non-conventional and/or novel security techniques are to be considered for situations where a partial network compromise is to be expected.

Anglický abstrakt

Wireless sensor networks are not just another technology, but also exhibit new and complex problems from the security perspective. The majority of the existing security approaches are unsuitable or even impossible to deploy due to the combination of decentralized tasks with high numbers of energy and computational-limited nodes positioned, typically, out of our permanent physical control. Non-conventional and/or novel security techniques are to be considered for situations where a partial network compromise is to be expected.

BibTex


@inproceedings{BUT76368,
  author="Petr {Hanáček} and Petr {Švenda}",
  title="Cryptography for (partially) Compromised Sensor Networks",
  annote="Wireless sensor networks are not just another technology, but also exhibit new
and complex problems from the security perspective. The majority of the existing
security approaches are unsuitable or even impossible to deploy due to the
combination of decentralized tasks with high numbers of energy and
computational-limited nodes positioned, typically, out of our permanent physical
control. Non-conventional and/or novel security techniques are to be considered
for situations where a partial network compromise is to be expected.",
  address="Tate International s.r.o.",
  booktitle="Information Security Summit 2011",
  chapter="76368",
  edition="NEUVEDEN",
  howpublished="print",
  institution="Tate International s.r.o.",
  year="2011",
  month="may",
  pages="103--109",
  publisher="Tate International s.r.o.",
  type="conference paper"
}