Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Next revisionBoth sides next revision | ||
public:papers:spw2016 [2016-06-19 21:27] – [What is this paper about?] rostadal | public:papers:spw2016 [2016-06-19 21:28] – rostadal | ||
---|---|---|---|
Line 39: | Line 39: | ||
* Provided three additional attacker models compared to the one used (Random Key compromise): | * Provided three additional attacker models compared to the one used (Random Key compromise): | ||
* Proposed different ways of evaluation of SA protocols: a ratio of compromised and non-compromised link keys, a percentage of secure communication among neighbours, or the percentage of secure communication from nodes to the base station. | * Proposed different ways of evaluation of SA protocols: a ratio of compromised and non-compromised link keys, a percentage of secure communication among neighbours, or the percentage of secure communication from nodes to the base station. | ||
- | * Extended the KMSforWSN framework. The whole framework including the documentation could be download here. | + | * Extended the KMSforWSN framework. The whole framework including the documentation could be download |
* Discussed different attacker capabilities and behaviour to parametrise the attacker. | * Discussed different attacker capabilities and behaviour to parametrise the attacker. | ||
* Performed an initial comparison of a local and global attacker on Random key compromise and Random node compromise pattern. | * Performed an initial comparison of a local and global attacker on Random key compromise and Random node compromise pattern. |