Fifth International Conference on Simulation Tools and Techniques

Research Article

On the Credibility of Wireless Sensor Network Simulations: Evaluation of Intrusion Detection System

Download707 downloads
  • @INPROCEEDINGS{10.4108/icst.simutools.2012.247708,
        author={Andriy Stetsko and Tobi\^{a}š Smolka and Filip Jurnečka and Vashek Matyas},
        title={On the Credibility of Wireless Sensor Network Simulations: Evaluation of Intrusion Detection System},
        proceedings={Fifth International Conference on Simulation Tools and Techniques},
        publisher={ICST},
        proceedings_a={SIMUTOOLS},
        year={2012},
        month={6},
        keywords={intrusion detection castalia cooja comparison evaluation mixim simulator wireless sensor network wsnet},
        doi={10.4108/icst.simutools.2012.247708}
    }
    
  • Andriy Stetsko
    Tobiáš Smolka
    Filip Jurnečka
    Vashek Matyas
    Year: 2012
    On the Credibility of Wireless Sensor Network Simulations: Evaluation of Intrusion Detection System
    SIMUTOOLS
    ICST
    DOI: 10.4108/icst.simutools.2012.247708
Andriy Stetsko1,*, Tobiáš Smolka1, Filip Jurnečka1, Vashek Matyas1
  • 1: Faculty of Informatics, Masaryk University
*Contact email: xstetsko@fi.muni.cz

Abstract

In the field of wireless sensor networks, not many schemes are tested on real hardware. System designers usually give preference to simulations since their preparation and execution require significantly less time and money than experiments on real hardware. In this paper, we present a practical research on four open-source simulators, i.e., Castalia, Cooja, MiXiM and WSNet. Recently, using a simple test case, we demonstrated that usage of different simulators results into different evaluation outcomes even though the simulators are set in the same way, and the same evaluation metric is used - a number of packets received by sensor nodes. We hypothesized possible sources of the differences, but we did not thoroughly examine them. In this paper, we rigorously examine the simulators and present our findings regarding the sources of the differences. Also, we evaluate their impact on the evaluation of a more complex system - the intrusion detection system.