Simulation modeling of secure wireless sensor networks

12Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper describes an extensible simulation environment for the modeling of wireless sensor networks (WSNs). In particular, our simulator facilitates the study of secure con- nectivity between sensor nodes. The simulator has five main components: network topology model, key establishment protocol, adversary model for node capture, network anal- ysis tools, and a graphical user interface (GUI) to facili- Tate rapid simulation, visualization, and analysis of WSNs. We present the design and implementation of our simula- Tion tool, including the methodologies and algorithms un- derlying each component, and the data flow dependencies between them. Additionally, we describe the data collec- Tion and analysis functions integrated within the simulator, and how these can be used for in-depth simulation studies. We have used the simulator to verify asymptotic analytical results for secure WSNs, as well as to investigate their struc- Tural characteristics. We present selected results to demon- strate the use and value of our simulation tool. Copyright © 2009 ICST.

Cite

CITATION STYLE

APA

Vu, T. M., Williamson, C., & Safavi-Naini, R. (2009). Simulation modeling of secure wireless sensor networks. In VALUETOOLS 2009 - 4th International Conference on Performance Evaluation Methodologies and Tools. ICST. https://doi.org/10.4108/ICST.VALUETOOLS2009.7629

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free