HOW TO TRANSMIT MESSAGES VIA WSN IN A HOSTILE ENVIRONMENT

Marek Klonowski, Michał Koza, Mirisosław Kutyłowski

2011

Abstract

In this paper we present a scheme for secure message transmission in WSN in the presence of an adversary. We assume that the adversary can easily find \emph{some random} nodes. However it is much harder for it to find all of them (or even a concrete subset) quickly. Security of the proposed scheme is based on this practical assumption. The protocol can be easily combined with various routing schemes as a security layer preserving all merits of the underlying protocol for the price of reasonable communicational and storage overhead.

Download


Paper Citation


in Harvard Style

Klonowski M., Koza M. and Kutyłowski M. (2011). HOW TO TRANSMIT MESSAGES VIA WSN IN A HOSTILE ENVIRONMENT . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 387-390. DOI: 10.5220/0003523403870390

in Bibtex Style

@conference{secrypt11,
author={Marek Klonowski and Michał Koza and Mirisosław Kutyłowski},
title={HOW TO TRANSMIT MESSAGES VIA WSN IN A HOSTILE ENVIRONMENT},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={387-390},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003523403870390},
isbn={978-989-8425-71-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - HOW TO TRANSMIT MESSAGES VIA WSN IN A HOSTILE ENVIRONMENT
SN - 978-989-8425-71-3
AU - Klonowski M.
AU - Koza M.
AU - Kutyłowski M.
PY - 2011
SP - 387
EP - 390
DO - 10.5220/0003523403870390