{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T06:27:33Z","timestamp":1775024853377,"version":"3.50.1"},"reference-count":33,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2015,6,1]],"date-time":"2015-06-01T00:00:00Z","timestamp":1433116800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100004281","name":"Polish National Science Centre","doi-asserted-by":"crossref","award":["2012\/05\/B\/ST6\/03364"],"award-info":[{"award-number":["2012\/05\/B\/ST6\/03364"]}],"id":[{"id":"10.13039\/501100004281","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,6,1]]},"abstract":"<jats:p> With a rapid progress of numerous applications in wireless sensor networks (WSNs), performance evaluation and analysis techniques face new challenges in energy efficiency area in WSN applications. One of the key issues is to perform the security trade-off and energy efficiency analysis. In this paper, the energy analysis module for the QoP-ML (quality of protection modeling language) is proposed by means of which one can analyze the influence of various security levels on the energy consumption of a protocol. Moreover, an advanced communication module is proposed as an extension of the QoP-ML language, which enhances the abilities to analyze complex wireless sensor networks. The case study of WSN deployed on the Jindo Bridge in South Korea was carried out and the lifetime of protocols with various security levels was simulated. The results show that the introduction of various security levels can entail large differences in performance and energy consumption, and hence result in different lifetime. Therefore, the designers of WSN protocols should search for balance between the required lifetime and security level. The introduced QoP-ML extension, along with the AQoPA (automated quality of protection analysis) tool, has been developed to meet the above requirements. <\/jats:p>","DOI":"10.1155\/2015\/943475","type":"journal-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T14:06:20Z","timestamp":1433253980000},"page":"943475","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":9,"title":["Security Trade-Off and Energy Efficiency Analysis in Wireless Sensor Networks"],"prefix":"10.1177","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4694-562X","authenticated-orcid":false,"given":"Damian","family":"Rusinek","sequence":"first","affiliation":[{"name":"Maria Curie-Sklodowska University, 20-031 Lublin, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1904-3222","authenticated-orcid":false,"given":"Bogdan","family":"Ksiezopolski","sequence":"additional","affiliation":[{"name":"Maria Curie-Sklodowska University, 20-031 Lublin, Poland"},{"name":"Polish-Japanese Academy of Information Technology, 02-008 Warsaw, Poland"}]},{"given":"Adam","family":"Wierzbicki","sequence":"additional","affiliation":[{"name":"Polish-Japanese Academy of Information Technology, 02-008 Warsaw, Poland"}]}],"member":"179","published-online":{"date-parts":[[2015,6,1]]},"reference":[{"key":"B1-2015-943475","doi-asserted-by":"publisher","DOI":"10.3390\/s120912606"},{"key":"B2-2015-943475","doi-asserted-by":"publisher","DOI":"10.3390\/s8127753"},{"key":"B3-2015-943475","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02671-3_28"},{"key":"B4-2015-943475","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13861-4_29"},{"key":"B8-2015-943475","first-page":"145","volume-title":"Proceedings of the 2nd International Conference on Sensor Networks (SENSORNETS 2013)","author":"Kamgueu P. O."},{"key":"B9-2015-943475","doi-asserted-by":"publisher","DOI":"10.1109\/comswa.2008.4554519"},{"key":"B10-2015-943475","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.03.027"},{"key":"B12-2015-943475","first-page":"33","volume-title":"Proceedings of the 8th IEEE International NEWCAS Conference (NEWCAS '10)","author":"Blouin D."},{"key":"B13-2015-943475","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/262848"},{"key":"B32-2015-943475","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-006-0009-6"},{"key":"B30-2015-943475","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.11.002"},{"key":"B33-2015-943475","doi-asserted-by":"publisher","DOI":"10.1145\/1853919.1853926"},{"key":"B26-2015-943475","unstructured":"Lindskog S.Modeling and tuning security from a quality of service perspective [Ph.D. thesis]2005Gothenburg, SwedenChalmers University of Technology"},{"key":"B31-2015-943475","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.03.003"},{"key":"B27-2015-943475","doi-asserted-by":"publisher","DOI":"10.1109\/icme.2003.1221572"},{"key":"B34-2015-943475","doi-asserted-by":"publisher","DOI":"10.1145\/1216993.1217010"},{"key":"B29-2015-943475","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.73"},{"key":"B14-2015-943475","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_38"},{"key":"B15-2015-943475","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_27"},{"key":"B16-2015-943475","doi-asserted-by":"publisher","DOI":"10.1109\/secpri.2004.1301317"},{"key":"B17-2015-943475","volume-title":"Secure Systems Development with UML","author":"J\u00fcrjens J.","year":"2005"},{"key":"B18-2015-943475","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/725279"},{"key":"B19-2015-943475","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07425-2_30"},{"key":"B20-2015-943475","doi-asserted-by":"publisher","DOI":"10.12989\/sss.2010.6.5_6.439"},{"key":"B21-2015-943475","doi-asserted-by":"publisher","DOI":"10.1109\/ares.2011.34"},{"key":"B22-2015-943475","first-page":"227","volume-title":"Proceedings of the International Conference on Wireless Networks (ICWN '04)","volume":"13244","author":"Chen D."},{"key":"B23-2015-943475","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2386"},{"key":"B24-2015-943475","doi-asserted-by":"publisher","DOI":"10.4236\/wsn.2010.211104"},{"key":"B25-2015-943475","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916633"},{"key":"B35-2015-943475","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.01.006"},{"key":"B36-2015-943475","volume-title":"Proceedings of the International Conference on Information Processing (ICIP '59)","author":"Backus J. W."},{"key":"B38-2015-943475","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"key":"B40-2015-943475","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.01.015"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/943475","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/943475","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/943475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T01:33:10Z","timestamp":1620264790000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/943475"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,1]]},"references-count":33,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,6,1]]}},"alternative-id":["10.1155\/2015\/943475"],"URL":"https:\/\/doi.org\/10.1155\/2015\/943475","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,1]]}}}