Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revisionBoth sides next revision | ||
public:papers:spw2016 [2016-06-17 13:44] – [What is this paper about?] rostadal | public:papers:spw2016 [2016-06-19 21:24] – rostadal | ||
---|---|---|---|
Line 38: | Line 38: | ||
**In this paper, we:** | **In this paper, we:** | ||
* Provided three additional attacker models compared to the one used (Random Key compromise): | * Provided three additional attacker models compared to the one used (Random Key compromise): | ||
- | * Key exfiltration model; | + | * key exfiltration model; |
- | * Passive | + | * passive |
- | * Active | + | * active |
* Based on attacker capabilities, | * Based on attacker capabilities, | ||
- | * We are considering | + | * Proposed |
* Extended the KMSforWSN framework. The whole framework including the documentation could be download above. | * Extended the KMSforWSN framework. The whole framework including the documentation could be download above. | ||
- | * Discussed different capabilities and behaviour to parametrise the attacker. | + | * Discussed different |
- | * Performed an initial comparison of a local and global attacker on Random key compromise and Random node compromise | + | * Performed an initial comparison of a local and global attacker on Random key compromise and Random node compromise |
* Performed an experiment for Passive node control model. | * Performed an experiment for Passive node control model. | ||
- | {{: | + | {{: |
//A success rate of SA protocols for a different number of malware infected nodes. A decrease in the percentage of secured links is linear. One can obtain reasonably secure network (more than 85% of secure links) even in case of 7 malware infected nodes considering the hybrid designed protocols are used.// | //A success rate of SA protocols for a different number of malware infected nodes. A decrease in the percentage of secured links is linear. One can obtain reasonably secure network (more than 85% of secure links) even in case of 7 malware infected nodes considering the hybrid designed protocols are used.// |