4th International ICST Conference on Performance Evaluation Methodologies and Tools

Research Article

Simulation Modeling of Secure Wireless Sensor Networks

Download481 downloads
  • @INPROCEEDINGS{10.4108/ICST.VALUETOOLS2009.7629,
        author={Tuan Manh  Vu and Carey  Williamson and Reihaneh  Safavi-Naini},
        title={Simulation Modeling of Secure Wireless Sensor Networks},
        proceedings={4th International ICST Conference on Performance Evaluation Methodologies and Tools},
        publisher={ICST},
        proceedings_a={VALUETOOLS},
        year={2010},
        month={5},
        keywords={Wireless Sensor Networks Key Establishment Simulation},
        doi={10.4108/ICST.VALUETOOLS2009.7629}
    }
    
  • Tuan Manh Vu
    Carey Williamson
    Reihaneh Safavi-Naini
    Year: 2010
    Simulation Modeling of Secure Wireless Sensor Networks
    VALUETOOLS
    ICST
    DOI: 10.4108/ICST.VALUETOOLS2009.7629
Tuan Manh Vu1, Carey Williamson1, Reihaneh Safavi-Naini1
  • 1: Department of Computer Science, University of Calgary

Abstract

This paper describes an extensible simulation environment for the modeling of wireless sensor networks (WSNs). In particular, our simulator facilitates the study of secure con- nectivity between sensor nodes. The simulator has fve main components: network topology model, key establishment protocol, adversary model for node capture, network anal- ysis tools, and a graphical user interface (GUI) to facili- tate rapid simulation, visualization, and analysis of WSNs. We present the design and implementation of our simula- tion tool, including the methodologies and algorithms un- derlying each component, and the data ow dependencies between them. Additionally, we describe the data collec- tion and analysis functions integrated within the simulator, and how these can be used for in-depth simulation studies. We have used the simulator to verify asymptotic analytical results for secure WSNs, as well as to investigate their struc- tural characteristics. We present selected results to demon- strate the use and value of our simulation tool.