Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revisionBoth sides next revision | ||
public:papers:spw2016 [2016-06-17 13:45] – rostadal | public:papers:spw2016 [2016-06-17 13:46] – rostadal | ||
---|---|---|---|
Line 44: | Line 44: | ||
* Proposed different ways of evaluation of SA protocols: ratio of compromised and non-compromised link keys, percentage of secure communication among neighbours, or the percentage of secure communication from nodes to base station. | * Proposed different ways of evaluation of SA protocols: ratio of compromised and non-compromised link keys, percentage of secure communication among neighbours, or the percentage of secure communication from nodes to base station. | ||
* Extended the KMSforWSN framework. The whole framework including the documentation could be download above. | * Extended the KMSforWSN framework. The whole framework including the documentation could be download above. | ||
- | * Discussed different capabilities and behaviour to parametrise the attacker. | + | * Discussed different |
- | * Performed an initial comparison of a local and global attacker on Random key compromise and Random node compromise | + | * Performed an initial comparison of a local and global attacker on Random key compromise and Random node compromise |
* Performed an experiment for Passive node control model. | * Performed an experiment for Passive node control model. | ||