21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4.2. Random Key Pre-Distribution 109<br />

Fraction of l<strong>in</strong>k keys compromised<br />

Fraction of l<strong>in</strong>k keys compromised<br />

Fraction of l<strong>in</strong>k keys compromised<br />

0.7<br />

0.6<br />

0.5<br />

0.4<br />

0.3<br />

0.2<br />

0.1<br />

Basic<br />

q=1<br />

q=2<br />

q=3<br />

connectivity = .33<br />

0<br />

0 50 100 150 200<br />

0.8<br />

0.7<br />

0.6<br />

0.5<br />

0.4<br />

0.3<br />

0.2<br />

0.1<br />

Basic<br />

q=1<br />

q=2<br />

q=3<br />

Number of nodes compromised<br />

connectivity = .5<br />

0<br />

0 50 100 150 200<br />

1<br />

0.9<br />

0.8<br />

0.7<br />

0.6<br />

0.5<br />

0.4<br />

0.3<br />

0.2<br />

0.1<br />

Basic<br />

q=1<br />

q=2<br />

q=3<br />

Number of nodes compromised<br />

connectivity = .9<br />

0<br />

0 50 100 150 200<br />

Number of nodes compromised<br />

Figure 4.2: L<strong>in</strong>k key compromise probability of key pre-distribution schemes under attack.<br />

The key r<strong>in</strong>g size is m = 200. The key pool size depends on the connectivity and the parameter<br />

q

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!