Trust Management Method for Wireless Sensor Networks - Publikacja - MOST Wiedzy

Wyszukiwarka

Trust Management Method for Wireless Sensor Networks

Abstrakt

A Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet submarines. Currently, WSN are viewed as one of the most important technologies for the 21st century [1]. European Union supports programmes connected with WSN utilization and China have involved WSNs in their national strategic research programmes [2]. The commercialization of WSNs are also being accelerated by companies [3]. As the WSN are part of variety complex systems, it become important to ensure security of these networks. Copying the best practices from the conventional networks is not practical as sensor nodes are subjected to severe limitations of their resources and cannot afford running sophisticated security mechanisms which are often significantly resource consuming. To cope with this problem, the concepts of trust and trustworthiness are employed. Trust management provides for distinguishing between trustworthy and untrustworthy nodes which enables collaborative decisions leading to isolation and exclusion of the nodes with a very low level of trust. It allows to improve the security of the network using fewer resources comparing to security mechanisms used in conventional networks. It this dissertation a new trust management method for distributed wireless sensor networks called WCT2M is presented and its performance analysed. It is explained how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected to the analyses with the help of a specially created laboratory and a dedicated WCT2M simulator. The results of conducted experiments allow to ascertain, that the proposed method reliably and efficiently recognizes untrusted nodes and prevent information from these nodes to spread in the network, using reasonable amount of resources.

Cytuj jako

Pełna treść

pobierz publikację
pobrano 369 razy
Wersja publikacji
Accepted albo Published Version
Licencja
Copyright (Author(s))

Słowa kluczowe

Informacje szczegółowe

Kategoria:
Doktoraty, rozprawy habilitacyjne, nostryfikacje
Typ:
praca doktorska pracowników zatrudnionych w PG oraz studentów studium doktoranckiego
Rok wydania:
2017
Bibliografia: test
  1. P. Coy and N. Gross, "21 Ideas for the 21st Century," Business Week, p. 82, 30 08 1999. otwiera się w nowej karcie
  2. L. M. Ni, "China's national research project on wireless sensor networks," Proc. of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'08), 2008. otwiera się w nowej karcie
  3. Q. Wang and I. Balasingham, "Wireless Sensor Networks -An Introduction," Wireless Sensor Networks: Application-Centric Design, 2010. otwiera się w nowej karcie
  4. I. Wikimedia Foundation, "Wireless sensor network," [Online].
  5. N. P. Mahalik, "Preface," in Sensor Networks and Configuration, Springer, 2007. otwiera się w nowej karcie
  6. I. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks," Communications Magazine, vol. 40, no. 8, 2002. otwiera się w nowej karcie
  7. D.-S. Kim and S. Y. Shin, "Wireless Pet Dog Management Systems," in Sensor Networks and Configuration, Springer, 2007. otwiera się w nowej karcie
  8. Y. Wang and Y. Tseng, "Attacks and Defenses of Routing Mechanisms in Ad Hoc and Sensor Networks," 2006. otwiera się w nowej karcie
  9. I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W. Trappe and I. Seskar, "Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study," USENIX Security 2010, 2010. otwiera się w nowej karcie
  10. Y. Zhiyng, K. Daeyoung, L. Insun, K. Kiyoung and J. Jongsoo, "A Security Framework with Trust Management for Sensor Networks," IEEE SecureComm, 5-9 Sept. 2005.
  11. Institute of Electrical and Electronics Engineers, Inc., "Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR- WPANs)," IEEE Press, New York, 2003. otwiera się w nowej karcie
  12. ZigBee Alliance, "ZigBee Home Automation Public Application Profile specification," 2007. otwiera się w nowej karcie
  13. J. Górski et al., "Angel System Specification," "Angel project report: Angel System Specification", Deliverable 1.2., ANGEL Project, 2007.
  14. Eclipse Foundation, "Eclipse," [Online]. Available: http://www.eclipse.org/. [Accessed 03 07 2014]. otwiera się w nowej karcie
  15. Oracle Corporation, "Welcome to NetBeans," [Online]. Available: https://netbeans.org. [Accessed 05 02 2015]. otwiera się w nowej karcie
  16. Oracle, "Java," [Online]. Available: http://www.java.com. [Accessed 06 07 2014].
  17. JGraph Ltd, "JGraph," [Online]. Available: http://www.jgraph.com/. [Accessed 06 07 2014].
  18. Silicon Labs Inc., "The Evolution of Wireless Sensor Networks," [Online]. Available: http://www.silabs.com/Support%20Documents/TechnicalDocs/evolution-of-wireless-sensor- networks.pdf. [Accessed 18 01 2015]. otwiera się w nowej karcie
  19. C. Y. Chong and S. P. Kumar, "Sensor networks: Evolution, opportunities, and challenges," Proceedings of the IEEE , vol. 91, no. 8, 2003.
  20. S. Kumar and D. Shepherd, "Sensit: Sensor information technology for the warfighter," Proc. of the 4th International Conference on Information Fusion (FUSION'01), 2001.
  21. Urząd Publikacji Unii Europejskiej, "Advanced Networked embedded platform as a Gateway to Enhance quality of Life," [Online].
  22. J. A. Stankovic, "Wireless Sensor Networks," 2006. otwiera się w nowej karcie
  23. H. Deng, W. Li and D. Agrawal, "Routing security in wireless ad hoc networks," IEEE Comm. Magazine, vol. 40, no. 10, 2002.
  24. J. Hill and D. Culler, "A wireless embedded sensor architecture for system-level optimization," UC Berkeley, 2002. otwiera się w nowej karcie
  25. E. P. De Freitas, Cooperative Context Aware Setup and Performance of Surveillance Missions Using Static and Mobile Wireless Sensor Networks, 2011.
  26. J. L. Hill, 2003. otwiera się w nowej karcie
  27. J. Adams, "Meet the ZigBee Standard," [Online]. otwiera się w nowej karcie
  28. O. Younis, M. Krunz and S. Ramasubramanian, "Node Clustering in Wireless Sensor Networks: Recent Developments and Deployment Challenges," Network, IEEE , vol. 20, 2006. otwiera się w nowej karcie
  29. W. Heinzelman, A. Chandrakasan and H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Microsensor Networks," Hawaii International Conference on System Sciences, 2000. otwiera się w nowej karcie
  30. M. J. Handy and M. Hass, "Low Energy Adaptive Clustering Hierarchy with Deterministic Cluster-Head Selection," roc. 4th IEEE International Workshop on Mobile and Wireless Communications Network (MWCN '02), 2002. otwiera się w nowej karcie
  31. V. Kumar, S. Jain and S. Tiwari, "Energy Efficient Clustering Algorithms in Wireless Sensor Networks: A Survey," IJCSI International Journal of Computer Science Issues, vol. 8, no. 2, 2011.
  32. W. Heinzelman, A. Chandrakasan and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Microsensor Networks," IEEE Trans. Wireless Commun, vol. 1, no. 4, 2002. otwiera się w nowej karcie
  33. M. I. Brownfield, K. Mehrjoo, A. S. Fayez and N. J. Davis IV, "Wireless Sensor Network Energy- Adaptive MAC Protocol," IEEE CCNC, 2006. otwiera się w nowej karcie
  34. V. Rajendran, K. Obraczka and J. Garcia-Luna-Aceves, "Energy-efficient MAC: energy-efficient collision-free medium access control for wireless sensor networks," SENSYS, 2003. otwiera się w nowej karcie
  35. Y. Wei, J. Heidemann and D. Estrin, "An energy-efficient MAC protocol for wireless sensor networks," INFOCOMM, 2002.
  36. T. van Dam and K. Langendoan, "Energy-efficient MAC: An adaptive energy-efficient MAC protocol for wireless sensor networks," ACM SENSYS, 2003. otwiera się w nowej karcie
  37. G. Lu, B. Krishnamachari and S. Raghavendra, "An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Sensor Networks," Proc. Parallel and Distributed Processing Symposium, 2004.
  38. O. Incel, A. Ghosh and B. Krishnamachari, "Scheduling Algorithms for Tree-Based Data Collection in Wireless Sensor Networks," Theoretical Aspects of Distributed Computing in Sensor Networks, 2011. otwiera się w nowej karcie
  39. A. Keshavarzian, H. Lee and L. Venkatraman, "Wakeup Scheduling in Wireless Sensor Networks," Proceeding of the 7th ACM International Symposium on Mobile ad hoc networking and computing, 2006. otwiera się w nowej karcie
  40. J. D. Angelin and X. V. Arul, "Optimizing Delay For Critical Event Monitoring In Wireless Sensor Networks," International Journal of Engineering Research & Technology, vol. 2, 2013.
  41. M. Sichitiu and C. Veerarittiphan, "Simple, Accurate Time Synchronization for Wireless Sensor Networks," IEEE Wireless Communications And Networking, vol. 2, 2003. otwiera się w nowej karcie
  42. S. Kumar and S. Chauhan, "A Survey on Scheduling Algorithms for Wireless Sensor Networks," International Journal of Computer Applications, no. 5, 2011. otwiera się w nowej karcie
  43. G. Lu, B. Krishnamachari and C. Raghavendra, "An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Networks," IEEE Proceedings of the 18th International Parallel and Distributed Processing Symposium, 2004.
  44. J. Górski et al., "Description of Final ANGEL Demonstrator," "Angel project report", Deliverable 5.2., ANGEL Project, 2007.
  45. J. Górski and A. Turower, "Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks," SCR 2013, 2013. otwiera się w nowej karcie
  46. J. Walters, Z. Liang, W. Shi and V. Chaudhary, "Wireless Sensor Network Security: A Survey," in Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications, CRC Press, 2006.
  47. A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen and D. E. Culler, "Spins: security protocols for sensor networks," Wireless Networking, vol. 8, no. 5, 2002. otwiera się w nowej karcie
  48. A. Pathan, H. Lee and C. Hong, "Security in Wireless Sensor Networks: Issues and Challenges," International Conference on Advanced Communication Technology, 2006. otwiera się w nowej karcie
  49. J. Sen, "A Survey on Wireless Sensor Network Security," International Journal of Communication Networks and Information Security, 2009.
  50. M. Prasant and K. Srikanth, "Ad Hoc Networks Technologies and Protocols," Springer, 2004.
  51. S. Sancak, E. Cayirci, V. Coskun and A. Levi, "Sensor wars: detecting and defending against spam attacks in wireless sensor networks," IEEE International Conference on Communications, vol. 1, 2004. otwiera się w nowej karcie
  52. S. Marti, T. J. Giuli, K. Lai and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," ACM/IEEE Internationa Conference on Mobile Computing and Networking, vol. 1, 2000. otwiera się w nowej karcie
  53. I. Avramopoulos, H. Kobayashi, R. Wang and A. Krishnamurthy, "Highly secure and efficient routing," IEEE INFOCOM, vol. 1, 2004. otwiera się w nowej karcie
  54. S. Sivanantham, K. Kirankumar and V. Akshaya, "Detection and Avoidance of Intrusion, Packet Drop and Modification in WSN," International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 11, 2013.
  55. S. Vijayalakshmi, R. Kurinjimalar and S. Prakash, "Detection of Packet Dropping and Modification in Wireless Sensor Network," International Journal of Computer Science & Engineering Technology, vol. 4, no. 4, 2013.
  56. C. U. Press, "Cambridge Advanced Learner's Dictionary," [Online]. Available: http://dictionary.cambridge.org/. [Accessed 19 03 2011].
  57. N. I. Batt, "Operational Trust: A New Look at the Human Requirement in Network Centric Warfare," 9th International Command and Control Research and Technology, 2004.
  58. H. Baldus et al., "WSN Trust Management Model," "Angel project report: WSN trust architecture and security protocols", Deliverable 3.2., ANGEL Project, 2007.
  59. J. Górski, A. Turower and A. Wardziński, "Distributed Trust Management Model for Wireless Sensor Networks," DepCoS, 2011. otwiera się w nowej karcie
  60. Y. Sun, Z. Han and K. Liu, "Defense of Trust Management Vulnerabilities in Distributed Networks," Communications Magazine, no. 46, 2008. otwiera się w nowej karcie
  61. R. Abassi and S. G. El Fatmi, "Securing a Trust-based MANET against Collusion Attacks," SAFECOMP, vol. 1, 2014.
  62. M. Theoharidou, P. Kotzanikolaou and D. Gritzalis, "A multi-layer criticality assesment methodology based on interdependencies," Computers & Security, vol. 6, no. 29, 2010. otwiera się w nowej karcie
  63. C. Lambrinoudakis, S. Gritzalis, F. Dridi and G. Pernul, "Security requirements for e-goverment services: A metholodical approach for developing a common based PKI-security policy," Computer Communications, no. 26, pp. 1873-1883, 2003. otwiera się w nowej karcie
  64. ISO and IEC, ISO/IEC 27002:2005 -Information technology -security techniques -Code of practise for information security management, 2005. otwiera się w nowej karcie
  65. B. Księżopolski, Z. Kotulski and P. Szałachowski, "Adaptive approach to network security," in Computer Networks, Springer, 2009, pp. 233-241. otwiera się w nowej karcie
  66. B. Księżopolski and Z. Kotulski, "Adaptable security mechanism for dynamic environments," Computers & Security, pp. 246-255, 2007. otwiera się w nowej karcie
  67. S. Lindskog, Modelling and Tunning Security form Quality of Service Perspective -PhD Thesis, Chalmers University of Technology, 2005. otwiera się w nowej karcie
  68. Texas Instruments, "CC2520 Development Kit User's Guide," [Online]. Available: http://www.ti.com/lit/ug/swru138/swru138.pdf. [Accessed 03 07 2014]. otwiera się w nowej karcie
  69. M. Kurowski, "Zarządzanie zaufaniem jako metoda zabezpieczenia rozproszonych bezprzewodowych sieci sensorów przed atakami," 2013.
  70. Texas Instruments, "Code Composer Studio IDE," [Online]. otwiera się w nowej karcie
  71. IAR Systems, "IAR Workbench IDE dla Texas Instruments MSP430," [Online]. Available: http://www.iar.com/en/Products/IAR-Embedded-Workbench/TI-MSP430/. [Accessed 04 10 2013]. otwiera się w nowej karcie
  72. Texas Instruments, "HAL Library and example applications for MSP430," [Online]. Available: http://www.ti.com/litv/zip/swrc090b. [Accessed 09 03 2014]. otwiera się w nowej karcie
  73. OMNeT++ Commnunity, "OMNeT++ Simulation Framework," [Online]. Available: http://omnetpp.org/. [Accessed 29 06 2014].
  74. NesCT Community, "NesCT," [Online]. Available: http://nesct.sourceforge.net/. [Accessed 29 06 2014].
  75. [78] PAWiS Community, "PAWiS Simulation Framework," [Online]. otwiera się w nowej karcie
  76. Australia's Information Communications Technology Research Centre of Excellence, "Castalia Wireless Sensor Network Simulator," [Online]. otwiera się w nowej karcie
  77. IAR Systems, "IAR Embedded Workbench," [Online]. Available: http://www.iar.com/. [Accessed 29 06 2014].
  78. WSNSim Community, "WSNSim," [Online]. Available: http://sourceforge.net/projects/wsnsim/. [Accessed 29 06 2014].
  79. NS-2 Community, "NS-2," [Online]. Available: http://nsnam.isi.edu/nsnam. [Accessed 29 06 2014]. otwiera się w nowej karcie
  80. NS-3 Community, "NS-3," [Online]. Available: http://www.nsnam.org/. [Accessed 29 06 2014]. otwiera się w nowej karcie
  81. TOSSIM Community, "TOSSIM," [Online]. Available: http://tinyos.stanford.edu/tinyos- wiki/index.php/TOSSIM. [Accessed 29 06 2014].
  82. F. Yu, "A Survey of Wireless Sensor Network Simulation Tools," [Online]. Available: http://www.cse.wustl.edu/~jain/cse567-11/ftp/sensor/index.html. [Accessed 29 06 2014].
  83. J-Sim Community, "J-Sim," [Online]. Available: https://sites.google.com/site/jsimofficial/. [Accessed 29 06 2014]. otwiera się w nowej karcie
  84. UCLA Compilers Group, "avrora," [Online]. Available: http://compilers.cs.ucla.edu/avrora/. [Accessed 29 06 2014].
  85. Tetcos, "NetSim -network simulator," [Online]. Available: http://tetcos.com/netsim_gen.html. [Accessed 29 06 2014].
  86. Wikimedia Foundation, "NetSim," [Online]. Available: http://en.wikipedia.org/wiki/NetSim. [Accessed 29 06 2014]. otwiera się w nowej karcie
  87. D. Quaglia ed., "Complete co-simulation framework and refined models of the components of the Angel platform," "Angel project report", Deliverable 2.3., ANGEL Project, 2008.
  88. R. van Solingen and E. Berghout, The Goal/Question/Metric method: A practical guide for quality improvement of software development, McGraw-Hill Publishing Company, 1999. otwiera się w nowej karcie
  89. E. Bulut, Z. Wang and B. K. Szymanski, "The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks," Communications (ICC), 2010 IEEE International Conference on, pp. 1 -5, 2010. otwiera się w nowej karcie
  90. F. Delicato, F. Protti, J. F. De Rezende, L. Rust and L. Pirmez, "Application-driven node management in multihop wireless sensor networks," Lecture Notes in Computer Science, pp. 569-576, 2005. otwiera się w nowej karcie
  91. A. Jhumka and L. Mottola, "On Consistent Neighborhood Views in Wireless Sensor Networks," Reliable Distributed Systems, 2009. SRDS '09. 28th IEEE International Symposium on, pp. 199 - 208, 2009. otwiera się w nowej karcie
  92. H. Seltman, Experimental Design for Behavioral and Social Sciences, 2014.
  93. M. L. Mitchell and J. M. Jolley, Research design explained, Wadsworth, 2013.
  94. R. Perlman, "An overview of PKI trust models," IEEE Network, vol. 13, no. 6, 1999. otwiera się w nowej karcie
  95. H. Chen, H. Wu, X. Zhou and C. Gao, "Agent-based Trust Model in Wireless Sensor Networks," 8th ACIS Int.Conf. on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. otwiera się w nowej karcie
  96. H. Chen, H. Wu, X. Zhou and C. Gao, "Reputation-based Trust in Wireless Sensor Networks," International Conference on Multimedia and Ubiquitous Engineering MUE'07, 2007. otwiera się w nowej karcie
  97. A. Boukerche and X. Li, "An Agent-based Trust and Reputation Management Scheme for Wireless Sensor Networks," IEEE Globecom 2005, 28 Nov -2 Dec 2005. otwiera się w nowej karcie
  98. T. Zahariadis, H. C. Leligou, P. Trakadas and S. Voliotis, "Trust management in wireless sensor networks," InterScience, 2010.
  99. Y. Yu, K. Li, W. Zhou and P. Li, "Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures," Journal of Network and Computer Applications, vol. 35, 2012. otwiera się w nowej karcie
  100. J. Lopez, R. Roman, I. Agudo and C. Fernandez-Gago, "Trust management systems for wireless sensor networks: Best practices," Computer Communications, vol. 33, 2010. otwiera się w nowej karcie
  101. F. Buccafurri, L. Coppolino, S. D'Antonio, A. Garofalo, G. Lax, A. Nocera and L. Romano, "Trust- Based Intrusion Tolerant Routing in Wireless Sensor Networks," SAFECOMP, vol. 1, 2014. otwiera się w nowej karcie
  102. M. Maroti, "The Flooding Time Synchronization Protocol," proc. of 2nd ACM Conference on Embedded Networked Sensor Systems, 2004. otwiera się w nowej karcie
  103. V. Loscri, "A Two-Levels Hierarchy for Low-Energy Adaptive Clustering Hierarchy (TL-LEACH)," Vehicular Technology Conference, 2005. otwiera się w nowej karcie
  104. T. Zia, "Reputaton-based Trust Managmenet in Wireless Sensor Networks," Intelligent Sensors, Sensor Networks and Information Processing, 2008. otwiera się w nowej karcie
  105. F. Song and B. Zhao, "Trust-based LEACH Protocol for Wireless Sensor Networks," Future Generation Communication and Networking FGCN '08, 13-15 Dec 2008. otwiera się w nowej karcie
  106. M. Momani and S. Challa, "Trust Management in Wireless Sensor Networks," Proc. of 5th ACM Conf. on Embedded Networked Sensor Systems,, November 6 -9, 2007. otwiera się w nowej karcie
  107. A. Josang and R. Ismail, "The BetaReputation System," 15th Bled Electronic Commerce Conference, 2002.
  108. R. Feng, X. Xu, X. Zhou and J. Wan, "A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory," Sensors, vol. 11, no. 2, 2011. otwiera się w nowej karcie
  109. F. Bao, I.-R. Chen, J.-H. Cho and J.-H. Cho, "Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection," IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, pp. 169-183, 6 2012. otwiera się w nowej karcie
  110. "Evolution of wireless sensor networks towards the Internet of Things: A survey," in Software, Telecommunications and Computer Networks (SoftCOM), 2011 19th International Conference on, Split, IEEE, 2011, pp. 1-6. otwiera się w nowej karcie
  111. J. Górski and A. Turower, "Using trust management model for detection of faulty nodes in Wireless Sensor Networks," in ICT Young vol. 1, Gdańsk, Politechnika Gdańska, 2011, pp. 471- 476. otwiera się w nowej karcie
  112. J. Górski and A. Turower, "Two-tier distributed trust management model for wireless sensor networks," II Ogólnopolskie Seminarium: Forum Innowacji Młodych Badaczy, 2011. otwiera się w nowej karcie
  113. J. Górski and A. Turower, "Zarządzanie zaufaniem w bezprzewodowych sieciach czujników - studium przypadku," in Studia Informatica vol. 33, Gliwice, Wydawnictwo Politechniki Śląskiej, 2012, pp. 125-137.
  114. J. Górski and A. Turower, "Trust management in WSN -case study evaluation," in ICT Young vol. 2, Gdańsk, Politechnika Gdańska, 2015, pp. 581-588.
  115. A. Mishra, "On Scheduling Guaranteed Time Slots for Time Sensitive Transactions in IEEE 802.15.4 Networks," Military Communications Conference, 2007. otwiera się w nowej karcie
  116. H. Labiod, H. Afifi and C. De Santis, Wi-Fi™, Bluetooth™, Zigbee™ and WiMax™, Springer, 2007. otwiera się w nowej karcie
  117. K. Chan, L. K. Yeung and W. Shao, "Contention-based MAC protocols with erasure coding for wireless data networks," Ad Hoc Networks, vol. 3, no. 4, 2005. otwiera się w nowej karcie
  118. W. Ye, J. Heidemann and D. Estrin, "An Energy-Efficient MAC Protocol for Wireless Sensor Networks," INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, 2002.
  119. Import source code to the chosen Integrated Development Environment (IDE) or modify files in any text editor. The source code is delivered with NetBeans IDE project. otwiera się w nowej karcie
  120. Modify settings (final static parameters defined in the beginning of a file) in: a. Main.java file: general setting like simulated network sizes and number of simulations; otwiera się w nowej karcie
  121. b. Simulation.java file: specific simulation settings. Every setting is commented to facilitate modifications. otwiera się w nowej karcie
  122. In any place of Simulation.java file a call to the following methods can be added: a. printSituation() displays on standard output current values of trust tables for each network node; otwiera się w nowej karcie
  123. b. System.out.print(node) displays on standard output current value of the trust table for the given node; otwiera się w nowej karcie
  124. c. new Graph(nodes) displays new Swing window showing how nodes are scattered on a simulation are and how are currently connected. otwiera się w nowej karcie
  125. Run simulator. In NetBeans IDE it can be done by clicking F6 button. Results will be displayed on standard output. otwiera się w nowej karcie
Weryfikacja:
Politechnika Gdańska

wyświetlono 117 razy

Publikacje, które mogą cię zainteresować

Meta Tagi