This HTML5 document contains 48 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n14http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n21http://localhost/temp/predkladatel/
n16http://purl.org/net/nknouf/ns/bibtex#
n18http://linked.opendata.cz/resource/domain/vavai/projekt/
n12http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n22http://linked.opendata.cz/ontology/domain/vavai/
n19https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n11http://bibframe.org/vocab/
n7http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216224%3A14330%2F14%3A00074030%21RIV15-MSM-14330___/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n6http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n4http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n10http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n9http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n15http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n8http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n20http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216224%3A14330%2F14%3A00074030%21RIV15-MSM-14330___
rdf:type
n22:Vysledek skos:Concept
dcterms:description
In distributed environments, such as wireless networks, a common adversary is considered to take control over a fraction of the nodes and hence to affect the system behaviour. We have examined several key management schemes for wireless sensor networks where the adversary compromises all the secret keys stored on captured nodes. We propose a number of realistic movement strategies that an actual attacker could pursue to capture nodes and examine the fallout of these attack approaches. In distributed environments, such as wireless networks, a common adversary is considered to take control over a fraction of the nodes and hence to affect the system behaviour. We have examined several key management schemes for wireless sensor networks where the adversary compromises all the secret keys stored on captured nodes. We propose a number of realistic movement strategies that an actual attacker could pursue to capture nodes and examine the fallout of these attack approaches.
dcterms:title
On Node Capturing Attacker Strategies On Node Capturing Attacker Strategies
skos:prefLabel
On Node Capturing Attacker Strategies On Node Capturing Attacker Strategies
skos:notation
RIV/00216224:14330/14:00074030!RIV15-MSM-14330___
n3:aktivita
n9:S n9:P
n3:aktivity
P(GAP202/11/0422), S
n3:dodaniDat
n20:2015
n3:domaciTvurceVysledku
n12:4292715 n12:6765971 n12:5113814
n3:druhVysledku
n15:D
n3:duvernostUdaju
n4:S
n3:entitaPredkladatele
n7:predkladatel
n3:idSjednocenehoVysledku
34331
n3:idVysledku
RIV/00216224:14330/14:00074030
n3:jazykVysledku
n10:eng
n3:klicovaSlova
wireless sensor networks; automated evaluation; key management schemes; node capturing; attack strategies
n3:klicoveSlovo
n6:wireless%20sensor%20networks n6:node%20capturing n6:automated%20evaluation n6:key%20management%20schemes n6:attack%20strategies
n3:kontrolniKodProRIV
[922D713E33F1]
n3:mistoKonaniAkce
Cambridge, UK
n3:mistoVydani
Německo
n3:nazevZdroje
Security Protocols XXII - 22nd International Workshop, Revised Selected Papers
n3:obor
n8:IN
n3:pocetDomacichTvurcuVysledku
3
n3:pocetTvurcuVysledku
3
n3:projekt
n18:GAP202%2F11%2F0422
n3:rokUplatneniVysledku
n20:2014
n3:tvurceVysledku
Stehlík, Martin Matyáš, Václav Jurnečka, Filip
n3:typAkce
n14:WRD
n3:zahajeniAkce
2014-01-01+01:00
s:issn
0302-9743
s:numberOfPages
16
n11:doi
10.1007/978-3-319-12400-1_29
n16:hasPublisher
Springer-Verlag
n19:isbn
9783319123998
n21:organizacniJednotka
14330