Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revisionBoth sides next revision
public:papers:spw2016 [2016-06-17 13:41] – [What is this paper about?] rostadalpublic:papers:spw2016 [2016-06-19 21:29] – [What is this paper about?] rostadal
Line 37: Line 37:
  
 **In this paper, we:** **In this paper, we:**
-  * We are providing three additional attacker models compared to the one used (Random Key compromise): +  * Provided three additional attacker models compared to the one used (Random Key compromise): key exfiltration model, passive node control model, and active node control modelBased on attacker capabilities, we also distinguish the global and local attacker. 
-    * Key exfiltration model +  * Proposed different ways of evaluation of SA protocols: ratio of compromised and non-compromised link keys, percentage of secure communication among neighbours, or the percentage of secure communication from nodes to the base station. 
-    * Passive node control model +  * Extended the KMSforWSN framework. The whole framework including the documentation could be download {{:public:papers:kmsforwsn_src.zip|here}}
-    * Active node control model +  * Discussed different attacker capabilities and behaviour to parametrise the attacker. 
-  * Based on attacker capabilities, we also distinguish the global and local attacker +  * Performed an initial comparison of a local and global attacker on Random key compromise and Random node compromise pattern.
-  * We are considering different ways of evaluation of SA protocols: ratio of compromised and non-compromised link keys, percentage of secure communication among neighbours, or the percentage of secure communication from nodes to base station +
-  * Extended the KMSforWSN framework. The whole framework including the documentation could be download above+
-  * Discussed different capabilities and behaviour to parametrise the attacker. +
-  * Performed an initial comparison of a local and global attacker on Random key compromise and Random node compromise model.+
   * Performed an experiment for Passive node control model.   * Performed an experiment for Passive node control model.
  
-{{:public:papers:infected_nodes.png?500|}}+{{:public:papers:infected_nodes.png?600|}}
  
-//A success rate of SA protocols for a different number of malware infected nodes. A decrease in the percentage of secured links is linear. One can obtain reasonably secure network (more than 85% of secure links) even in case of 7 malware infected nodes considering the hybrid designed protocols are used.//+//A success rate of SA protocols for a different number of malware infected nodes. A decrease in the percentage of secured links is linear that is good considering the attacker's control over the node. One can obtain reasonably secure network (more than 85% of secure links) even in case of 7 malware infected nodes considering the hybrid designed protocols are used.//