Publication detail

Simulation and Evaluation of CTP and Secure-CTP Protocols

PECHO, P. HANÁČEK, P. NAGY, J.

Original Title

Simulation and Evaluation of CTP and Secure-CTP Protocols

English Title

Simulation and Evaluation of CTP and Secure-CTP Protocols

Type

journal article - other

Language

en

Original Abstract

The paper discusses characteristics and quality of two routing protocols - Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of radio communication and limited resources. Our design of the secure protocol tries to solve also the essential security objectives. For the evaluation of properties of our protocol in large networks was used a TOSSIM simulator.

English abstract

The paper discusses characteristics and quality of two routing protocols - Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of radio communication and limited resources. Our design of the secure protocol tries to solve also the essential security objectives. For the evaluation of properties of our protocol in large networks was used a TOSSIM simulator.

Keywords

Routing protocol, wireless sensor networks, security, evaluation, simulation, TinyOS.

RIV year

2010

Released

12.04.2010

Publisher

NEUVEDEN

Location

NEUVEDEN

ISBN

1210-2512

Periodical

Radioengineering

Year of study

2010

Number

1

State

CZ

Pages from

89

Pages to

98

Pages count

10

Documents

BibTex


@article{BUT50803,
  author="Peter {Pecho} and Petr {Hanáček} and Jan {Nagy}",
  title="Simulation and Evaluation of CTP and Secure-CTP Protocols",
  annote="The paper discusses characteristics and quality of two routing protocols -
Collection Tree Protocol and its secure modification. The original protocol, as
well as other protocols for wireless sensors, solves only problems of radio
communication and limited resources. Our design of the secure protocol tries to
solve also the essential security objectives. For the evaluation of properties of
our protocol in large networks was used a TOSSIM simulator.",
  address="NEUVEDEN",
  booktitle="Radioengineering",
  chapter="50803",
  edition="NEUVEDEN",
  howpublished="print",
  institution="NEUVEDEN",
  journal="Radioengineering",
  number="1",
  volume="2010",
  year="2010",
  month="april",
  pages="89--98",
  publisher="NEUVEDEN",
  type="journal article - other"
}