Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Allocating adversarial resources in wireless networks
KTH, School of Electrical Engineering (EES), Communication Networks.ORCID iD: 0000-0003-2624-7522
KTH, School of Electrical Engineering (EES), Signal Processing. KTH, School of Electrical Engineering (EES), Automatic Control.
KTH, School of Electrical Engineering (EES), Communication Networks.ORCID iD: 0000-0002-3267-5374
2013 (English)In: 2013 Proceedings of the 21st European Signal Processing Conference (EUSIPCO), IEEE , 2013, 6811603- p.Conference paper, Published paper (Refereed)
Abstract [en]

A plethora of security schemes for wireless sensor networks (WSNs) has been proposed and their resilience to various attacks analyzed; including situations the adversary compromises a subset of the WSN nodes and/or deploys own misbehaving devices. The higher the degree of such intrusion is, the more effective an attack will be. Consider, however, an adversary that is far from omnipotent: How should she attack, how should she deploy her resources to maximally affect the attacked WSN operation? This basic question has received little attention, with one approach considering genetic algorithms for devising an attack strategy [5]. In this work, we recast the problem towards a more systematic treatment and more computationally efficient solutions: a combination of a genetic algorithm with a convex relaxation, and an l(1)-constraint formulation. The devising of near-optimal attack strategies efficiently strengthens the adversary, allowing her to adapt and mount effective and thus harmful attacks even in complex and dynamically changing settings.

Place, publisher, year, edition, pages
IEEE , 2013. 6811603- p.
Series
European Signal Processing Conference, ISSN 2219-5491
Keyword [en]
Attack, cryptographic key, genetic algo- rithm (GA), security
National Category
Telecommunications
Identifiers
URN: urn:nbn:se:kth:diva-136358ISI: 000341754500216Scopus ID: 2-s2.0-84901380038ISBN: 978-099286260-2 (print)OAI: oai:DiVA.org:kth-136358DiVA: diva2:675851
Conference
2013 21st European Signal Processing Conference, EUSIPCO 2013; Marrakech; Morocco; 9 September 2013 through 13 September 2013
Note

QC 20131218

Available from: 2013-12-04 Created: 2013-12-04 Last updated: 2014-10-21Bibliographically approved

Open Access in DiVA

eusipco_gisdakis(342 kB)145 downloads
File information
File name FULLTEXT01.pdfFile size 342 kBChecksum SHA-512
8ca7b12a49022946f63cbf6192f0ba3418c7881ef0b2e0fe50289e0416c6fb8dbf48cc86715b2aaffb8bc7c90c419a3ff542268ff09331017ad56feaff0fa4d9
Type fulltextMimetype application/pdf

Other links

ScopusEUSIPCO2013

Authority records BETA

Gisdakis, Stylianos

Search in DiVA

By author/editor
Gisdakis, StylianosKatselis, DimitriosPapadimitratos, Panos
By organisation
Communication NetworksSignal ProcessingAutomatic Control
Telecommunications

Search outside of DiVA

GoogleGoogle Scholar
Total: 145 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 93 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf