. "wireless sensor networks; automated evaluation; key management schemes; node capturing; attack strategies"@en . "On Node Capturing Attacker Strategies"@en . "Stehl\u00EDk, Martin" . "3"^^ . . "N\u011Bmecko" . . . "RIV/00216224:14330/14:00074030" . . . . . "In distributed environments, such as wireless networks, a common adversary is considered to take control over a fraction of the nodes and hence to affect the system behaviour. We have examined several key management schemes for wireless sensor networks where the adversary compromises all the secret keys stored on captured nodes. We propose a number of realistic movement strategies that an actual attacker could pursue to capture nodes and examine the fallout of these attack approaches." . . "10.1007/978-3-319-12400-1_29" . . . "On Node Capturing Attacker Strategies" . . . "Springer-Verlag" . "In distributed environments, such as wireless networks, a common adversary is considered to take control over a fraction of the nodes and hence to affect the system behaviour. We have examined several key management schemes for wireless sensor networks where the adversary compromises all the secret keys stored on captured nodes. We propose a number of realistic movement strategies that an actual attacker could pursue to capture nodes and examine the fallout of these attack approaches."@en . "Security Protocols XXII - 22nd International Workshop, Revised Selected Papers" . "34331" . "16"^^ . . "9783319123998" . "P(GAP202/11/0422), S" . "RIV/00216224:14330/14:00074030!RIV15-MSM-14330___" . . "On Node Capturing Attacker Strategies"@en . "On Node Capturing Attacker Strategies" . "2014-01-01+01:00"^^ . . "Cambridge, UK" . . "[922D713E33F1]" . "14330" . . . . "Maty\u00E1\u0161, V\u00E1clav" . "Jurne\u010Dka, Filip" . "3"^^ . "0302-9743" . .