Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
public:papers:spw2016 [2016-06-17 13:30] – [What is this paper about?] rostadal | public:papers:spw2016 [2016-12-01 13:28] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 37: | Line 37: | ||
**In this paper, we:** | **In this paper, we:** | ||
- | * We are providing | + | * Provided |
- | * Key exfiltration model | + | * Proposed |
- | * Passive | + | * Extended the KMSforWSN framework. The whole framework including the documentation could be download {{: |
- | * Active | + | * Discussed different attacker capabilities and behaviour to parametrise the attacker. |
- | * Based on attacker capabilities, | + | * Performed an initial comparison of a local and global attacker on Random key compromise and Random node compromise pattern. |
- | * We are different ways of evaluation of SA protocols ( | + | * Performed an experiment for Passive node control model. |
+ | |||
+ | {{: | ||
+ | |||
+ | //A success rate of SA protocols for a different number of malware infected nodes. A decrease in the percentage of secured links is linear that is good considering the attacker' |