Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Next revisionBoth sides next revision
public:papers:spw2016 [2016-06-17 13:45] rostadalpublic:papers:spw2016 [2016-06-17 13:46] rostadal
Line 44: Line 44:
   * Proposed different ways of evaluation of SA protocols: ratio of compromised and non-compromised link keys, percentage of secure communication among neighbours, or the percentage of secure communication from nodes to base station.   * Proposed different ways of evaluation of SA protocols: ratio of compromised and non-compromised link keys, percentage of secure communication among neighbours, or the percentage of secure communication from nodes to base station.
   * Extended the KMSforWSN framework. The whole framework including the documentation could be download above.   * Extended the KMSforWSN framework. The whole framework including the documentation could be download above.
-  * Discussed different capabilities and behaviour to parametrise the attacker. +  * Discussed different attacker capabilities and behaviour to parametrise the attacker. 
-  * Performed an initial comparison of a local and global attacker on Random key compromise and Random node compromise model.+  * Performed an initial comparison of a local and global attacker on Random key compromise and Random node compromise pattern.
   * Performed an experiment for Passive node control model.   * Performed an experiment for Passive node control model.