2014
DOI: 10.1007/978-3-319-12400-1_29
|View full text |Cite
|
Sign up to set email alerts
|

On Node Capturing Attacker Strategies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Some of these are directly supported by Omnet++ or MiXiM, some of them are added in our evaluation framework. For sample results on network resiliency, see our previous paper [4].…”
Section: Sample Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…Some of these are directly supported by Omnet++ or MiXiM, some of them are added in our evaluation framework. For sample results on network resiliency, see our previous paper [4].…”
Section: Sample Evaluationmentioning
confidence: 99%
“…Processing Speed Evaluator -We measure the absolute and simulation timings of: 1. pre-deployment phase keying material generation, 2. key establishment process by every single node, and 3. completion of initialization phase. Resiliency Evaluator -For evaluating the resiliency we defined our attacker model in [4], where additional discussions on the module logic are also provided.…”
Section: Evaluation Modelsmentioning
confidence: 99%