21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.6. Related Work 125<br />

Probability of l<strong>in</strong>k key compromise<br />

Probability of l<strong>in</strong>k key compromise<br />

Probability of l<strong>in</strong>k key compromise<br />

1<br />

0.8<br />

0.6<br />

0.4<br />

0.2<br />

0<br />

Du-Deng<br />

q-composite (q=1)<br />

HC<br />

Mult ID one-way<br />

Liu<br />

connectivity 0.33<br />

-0.2<br />

0 500 1000 1500 2000<br />

1<br />

0.8<br />

0.6<br />

0.4<br />

0.2<br />

0<br />

Du-Deng<br />

q-composite (q=1)<br />

HC<br />

Mult ID one-way<br />

Liu<br />

Number of compromised nodes<br />

connectivity 0.5<br />

-0.2<br />

0 200 400 600 800 1000 1200 1400<br />

1<br />

0.8<br />

0.6<br />

0.4<br />

0.2<br />

Number of compromised nodes<br />

connectivity 0.98<br />

Du-Deng<br />

0<br />

q-composite (q=1)<br />

HC<br />

Mult ID one-way<br />

Liu<br />

-0.2<br />

0 100 200 300 400 500 600<br />

Number of compromised nodes<br />

Figure 4.9: Comparison of different schemes (m = 400)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!