A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
ACM Transactions on Information and System Security (TISSEC)
The Strange Logic of Random Graphs
The Strange Logic of Random Graphs
Securing wireless sensor networks against large-scale node capture attacks
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
SSS'10 Proceedings of the 12th international conference on Stabilization, safety, and security of distributed systems
Hi-index | 0.00 |
This paper describes an extensible simulation environment for the modeling of wireless sensor networks (WSNs). In particular, our simulator facilitates the study of secure connectivity between sensor nodes. The simulator has five main components: network topology model, key establishment protocol, adversary model for node capture, network analysis tools, and a graphical user interface (GUI) to facilitate rapid simulation, visualization, and analysis of WSNs. We present the design and implementation of our simulation tool, including the methodologies and algorithms underlying each component, and the data flow dependencies between them. Additionally, we describe the data collection and analysis functions integrated within the simulator, and how these can be used for in-depth simulation studies. We have used the simulator to verify asymptotic analytical results for secure WSNs, as well as to investigate their structural characteristics. We present selected results to demonstrate the use and value of our simulation tool.