Petr Hanácek

Learn More
Wireless sensor networks usually require certain level of security, however there is lack of sensor nodes with cryptographic hardware build-in. We proved realization of cryptographic platform based on smart card--sensor node connection. Time complexity and power consumption of the platform was measured and compared to conventional software implementation.(More)
This paper deals with a description of wireless sensor networks at the beginning. Further follows the introduction to the agent platform suitable for wireless networks. Mobile code and sensor networks suffer from considerable security problems. Our proposal of countermeasure is based on combination of smartcards with sensor nodes. Smartcards as a tamper(More)
The paper deals with the examples of the simulation techniques using the Linda programming language. The Linda programming language (or system) works in a distributed environment. The distributed environment is thought of as a set of processors which run in parallel and which do not share a common memory. The processors communicate only via communication(More)
The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless network. The paper is focused on the problem of communication in the Bluetooth wireless network, but the model should be general enough to support also other kinds of wireless short-range networks, e.g. networks with infrared communication,(More)
The article deals with methodology framework for creating risk analysis models of diverse heterogeneous systems. Risk analysis, which refers to the study of threats and their potential impacts, is modelled with the use of knowledge-based models. From a broad range of different knowledge-based approaches we have chosen the fuzzy description for expressing(More)
The purpose of this article is to describe characteristics of obfuscated network buffer overflow attacks in contrast with characteristics of directly simulated attacks. The obfuscation was performed by tunneling of malicious traffic in HTTP and HTTPS protocols. These protocols wrap a malicious communication between an attacker situated outside of an(More)