Technical Reports

A List by Author: Radim O¹»ádal


Attackers in Wireless Sensor Networks Will Be Neither Random nor Jumping -- Secrecy Amplification Case, Extended Version

by Radim O¹»ádal, Petr ©véda, Václav Matyá¹, September 2016, 20 pages.

FIMU-RS-2016-04. Available as Postscript, PDF.


Partially compromised network is a pragmatic assumption in many real-life scenarios. Secrecy amplification protocols provide a significant increase in the number of secure communication links by re-establishing new keys via different communication paths. Our paper shows that so far research in the area of secrecy amplification protocols for wireless sensor networks has been based on rather simplified foundations with respect to attacker models. The attacker does not behave randomly and different attacker capabilities and behaviour have to be considered. We provide means to experimental work with parametrisable attacker capabilities and behaviour in realistic simulations, and evaluate the impact of the realistic attacker properties on the performance of major amplification protocols. We also show which secrecy amplification protocols perform best in different attacker settings and help to select a protocol that exhibits good results in a prevalent number of inspected scenarios. This is the extended version of our paper that is to be presented at 15th International Conference on Cryptology and Network Security (CANS 16) in Milan, Italy, November 14-16, 2016.

On Secrecy Amplification Protocols - Extended Version

by Radim O¹»ádal, Petr ©venda, Václav Matyá¹, A full version of the paper presented at conference WISTP 2015 June 2015, 34 pages.

FIMU-RS-2015-01. Available as Postscript, PDF.


We review most important secrecy amplification protocols that are suitable for ad-hoc networks of devices with limited resources, providing additional resistance against various attacks on used cryptographic keys without necessity for asymmetric cryptography. We discuss and evaluate different designs as well as approaches to create new protocols. A special focus is given to suitability of these protocols with respect to different underlying key distribution schemes and also to open issues. This technical report provides details of our research that will be presented at the 9th WISTP International Conference on Information Security Theory and Practice (WISTP`2015), where a subset of this technical report will be published in this conference proceedings.

Responsible contact:

Please install a newer browser for this site to function properly.

More information