Technical Reports
A List by Author: Václav Matyáš
- e-mail:
- matyas(a)fi.muni.cz
- home page:
- http://www.fi.muni.cz/usr/matyas/index.html
Security of Biometric Authentication Systems -- Extended Version
by Václav Matyáš, Zdeněk Říha, A full version of the paper presented at conference Computer Information Systems and Industrial Management Applications 2010 June 2010, 27 pages.
FIMU-RS-2010-07. Available as Postscript, PDF.
Abstract:
This technical report outlines our views of actual security
Neighbor-Based Intrusion Detection for Wireless Sensor Networks
by Andriy Stetsko, Lukáš Folkman, Václav Matyáš, May 2010, 33 pages.
FIMU-RS-2010-04. Available as Postscript, PDF.
Abstract:
The neighbor-based detection technique explores the principle that sensor nodes situated spatially close to each other tend to have similar behavior. A node is considered malicious if its behavior significantly differs from its neighbors. The detection technique is localized, unsupervised and adapts to changing network dynamics. Although the technique is promising, it has not been deeply researched in the context of wireless sensor networks yet. In this technical report we analyze symptoms of different attacks for the applicability of the neighbor-based technique. The analysis shows that the technique can be used for detection of selective forwarding, jamming and hello flood attacks. We implemented an intrusion detection system which employs the neighbor-based detection technique. The system was designed for and works on the TinyOS operating system running the Collection tree protocol. We evaluated accuracy of the technique in detection of selective forwarding, jamming and hello flood attacks. The results show that the neighbor-based detection technique is highly accurate, especially in the case when collaboration among neighboring nodes is used.
Key Distribution and Secrecy Amplification in Wireless Sensor Networks
by Petr Švenda, Václav Matyáš, November 2007, 63 pages.
FIMU-RS-2007-05. Available as Postscript, PDF.
Abstract:
This report targets the area of wireless sensor networks, and in particular their security. Probabilistic key pre-distribution schemes were developed to deal with limited memory of a single node and high number of potential neighbours. We present a new idea of group support for authenticated key exchange that substantially increases the resilience of an underlaying probabilistic key pre-distribution scheme against the threat of node capturing.
Application-Level Firewall Protection Profile for High Robustness Environments-Initial Considerations
by Mark Kelly, Václav Matyáš, Ahmed Patel, April 2004, 43 pages.
FIMU-RS-2004-02. Available as Postscript, PDF.
Abstract:
Firewalls act as access control policy mediators between networks.
Biometric Authentication Systems
by Zdeněk Říha, Václav Matyáš, November 2000, 44 pages.
FIMU-RS-2000-08. Available as Postscript, PDF.
Abstract:
Biometrics is the name of a security hype these days. Although biometrics are not completely new, they are becoming more and more popular nowadays. The first part of the technical report explains the principle of biometric systems and describes various biometric techniques. In the second part security issues of biometric systems are discussed.
fi
muni