Research Article
Simulation Modeling of Secure Wireless Sensor Networks
@INPROCEEDINGS{10.4108/ICST.VALUETOOLS2009.7629, author={Tuan Manh Vu and Carey Williamson and Reihaneh Safavi-Naini}, title={Simulation Modeling of Secure Wireless Sensor Networks}, proceedings={4th International ICST Conference on Performance Evaluation Methodologies and Tools}, publisher={ICST}, proceedings_a={VALUETOOLS}, year={2010}, month={5}, keywords={Wireless Sensor Networks Key Establishment Simulation}, doi={10.4108/ICST.VALUETOOLS2009.7629} }
- Tuan Manh Vu
Carey Williamson
Reihaneh Safavi-Naini
Year: 2010
Simulation Modeling of Secure Wireless Sensor Networks
VALUETOOLS
ICST
DOI: 10.4108/ICST.VALUETOOLS2009.7629
Abstract
This paper describes an extensible simulation environment for the modeling of wireless sensor networks (WSNs). In particular, our simulator facilitates the study of secure con- nectivity between sensor nodes. The simulator has fve main components: network topology model, key establishment protocol, adversary model for node capture, network anal- ysis tools, and a graphical user interface (GUI) to facili- tate rapid simulation, visualization, and analysis of WSNs. We present the design and implementation of our simula- tion tool, including the methodologies and algorithms un- derlying each component, and the data ow dependencies between them. Additionally, we describe the data collec- tion and analysis functions integrated within the simulator, and how these can be used for in-depth simulation studies. We have used the simulator to verify asymptotic analytical results for secure WSNs, as well as to investigate their struc- tural characteristics. We present selected results to demon- strate the use and value of our simulation tool.