21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.4. Security Evaluation 187<br />

Paths<br />

250000<br />

200000<br />

150000<br />

100000<br />

50000<br />

Random attack (square)<br />

0<br />

0 100 200 300 400 500<br />

Compromised nodes<br />

Live paths<br />

Canvas, functional paths (analytical)<br />

Canvas, functional paths<br />

Hop-to-hop, functional paths<br />

Figure 6.14: Deterioration of communication paths under a random attack; measured by absolute<br />

count of paths<br />

Functional path quotient<br />

1<br />

0.8<br />

0.6<br />

0.4<br />

0.2<br />

Random spread attack (square)<br />

0<br />

0 100 200 300 400 500<br />

Compromised nodes<br />

Canvas, functional paths (analytical)<br />

Hop-to-hop, functional paths<br />

Canvas, functional paths<br />

Figure 6.15: Deterioration of communication paths under a random attack; measured by Ψ

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!