21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

124 Chapter 4. Key Establishment<br />

Probability of l<strong>in</strong>k key compromise<br />

Probability of l<strong>in</strong>k key compromise<br />

Probability of l<strong>in</strong>k key compromise<br />

1<br />

0.8<br />

0.6<br />

0.4<br />

0.2<br />

0<br />

Du-Deng<br />

q-composite (q=1)<br />

HC<br />

Mult ID one-way<br />

Liu<br />

connectivity 0.33<br />

-0.2<br />

0 100 200 300 400 500 600 700 800 900 1000<br />

1<br />

0.8<br />

0.6<br />

0.4<br />

0.2<br />

0<br />

Du-Deng<br />

q-composite (q=1)<br />

HC<br />

Mult ID one-way<br />

Liu<br />

Number of compromised nodes<br />

connectivity 0.5<br />

-0.2<br />

0 100 200 300 400 500 600 700<br />

1<br />

0.8<br />

0.6<br />

0.4<br />

0.2<br />

Number of compromised nodes<br />

connectivity 0.98<br />

Du-Deng<br />

0<br />

q-composite (q=1)<br />

HC<br />

Mult ID one-way<br />

Liu<br />

-0.2<br />

0 50 100 150 200 250 300<br />

Number of compromised nodes<br />

Figure 4.8: Comparison of different schemes (m = 200)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!