<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>School of Computing and IT (PT)</title>
<link href="http://repository.mut.ac.ke:8080/xmlui/handle/123456789/2876" rel="alternate"/>
<subtitle/>
<id>http://repository.mut.ac.ke:8080/xmlui/handle/123456789/2876</id>
<updated>2026-04-07T13:12:20Z</updated>
<dc:date>2026-04-07T13:12:20Z</dc:date>
<entry>
<title>A MODEL FOR SELECTING SECURITY PROTOCOLS FOR WIRELESS SENSOR NETWORKS</title>
<link href="http://repository.mut.ac.ke:8080/xmlui/handle/123456789/2967" rel="alternate"/>
<author>
<name>Ndia, John G.</name>
</author>
<id>http://repository.mut.ac.ke:8080/xmlui/handle/123456789/2967</id>
<updated>2024-02-17T11:12:41Z</updated>
<published>2013-01-01T00:00:00Z</published>
<summary type="text">A MODEL FOR SELECTING SECURITY PROTOCOLS FOR WIRELESS SENSOR NETWORKS
Ndia, John G.
A MODEL FOR SELECTING SECURITY PROTOCOLS&#13;
FOR WIRELESS SENSOR NETWORKS&#13;
Abstract&#13;
The process of mapping security requirements to the most appropriate security protocol has over&#13;
the time proved a great challenge. Though there are various security mechanisms designed to&#13;
curb security threats, they come with various properties and therefore the choice of the best&#13;
security protocol for a given application becomes quite complex. To ease the process of mapping&#13;
security requirement of sensor applications to security protocol, security environments for WSNs&#13;
have been defined formally. There are numerous WSNs applications being developed day to day,&#13;
ranging from simple environmental monitoring e.g. collecting of temperatures in an agricultural&#13;
farm to complex applications like for monitoring battle field. Therefore this research dissertation&#13;
objective was to enable selection of best security protocol that falls under a certain security class&#13;
for the various existing WSNs applications and applications to be developed in the future. The&#13;
research endeavored to identify and evaluate the security protocols that are practically used in&#13;
WSNs and to identify the best tool to be used in simulation process, and finally to validate&#13;
selection of security protocols. WSNs have become a hot area of research especially in issues of&#13;
security, routing, systems hardware design and data management. This research contributes to&#13;
the area of security by focusing more on selection of security protocols so as to meet the security&#13;
requirements of WSNs applications at the same time ensuring the sensor networks lifetime is&#13;
extended as long as possible. There are different methods for evaluation of WSNs security, in&#13;
this research simulation methodology was chosen based on the fact that you can generate reliable&#13;
results in less time, in addition the simulation tool used is open source, thus cutting down&#13;
simulation costs. This dissertation introduced energy metric within a security class and compared&#13;
protocols in the same security class to check which protocol utilizes lesser energy. The&#13;
simulation tool used was network simulator version 2.35 which at the time of research was the&#13;
latest release. The ns2.35 was installed together with mannasim framework, which extends ns2&#13;
for WSNs simulation. Security protocols were classified into four security classes also called&#13;
security environments namely WSN_Env_A, WSN_Env_B, WSN_Env_C and WSN_Env_D&#13;
and compared them within their security class using energy metrics; The results showed that in&#13;
class WSN_Env_A LiSP is the best protocol while in WSN_Env_B class LLSP is the best&#13;
protocol based on energy efficiency.&#13;
Keywords: Wireless sensor Networks, Security Class, Security Protocols, Simulation, Sensor&#13;
nodes, Security Services
</summary>
<dc:date>2013-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Size and complexity metrics as indicators of maintainability of business process execution language process models</title>
<link href="http://repository.mut.ac.ke:8080/xmlui/handle/123456789/632" rel="alternate"/>
<author>
<name>Muketha, Geoffrey M.</name>
</author>
<id>http://repository.mut.ac.ke:8080/xmlui/handle/123456789/632</id>
<updated>2024-02-17T11:07:32Z</updated>
<published>2011-01-01T00:00:00Z</published>
<summary type="text">Size and complexity metrics as indicators of maintainability of business process execution language process models
Muketha, Geoffrey M.
One of the most popular process modeling languages is the Business Process Execution Language (BPEL). Despite the popularity, BPEL process models have an inherent complexity. This complexity keeps on increasing with age as a result of maintenance routines. Structural properties of BPEL process models such as size and complexity are claimed to influence maintainability factor of the process models. In the past, researchers have applied measurement to quantify the size and complexity of process models and thereafter utilized the measurement results to modify or to enhance the quality of the models. The problem with BPEL process measurement is that very few valid metrics exist that can beused for BPEL process models. Although several validation studies have been carried out, these were based on other language environments other than BPEL. To generalize the results of these studies to BPEL process models might be inaccurate, especially that BPEL has richer semantics than most other business process modeling languages. In addition, many of the existing validation studies did not focus on the external quality characteristic of maintainability, which makes it difficult to assess the value of the validated metrics as maintainability indicators for BPEL process models. To address this problem, this thesis proposes a suite of size and complexity metrics for measuring the structural properties of BPEL process models and then investigates whether these metrics can be useful indicators of the maintainability of BPEL process models. Theoretical validation studies based on Briand’s framework and Weyuker’s properties were conducted to find out whether the metrics were theoretically sound as required. Empirical studies by means of experimentations were also conducted to find out whether the metrics had any correlation with maintainability sub-characteristics of understandability and modifiability. Theoretical validation results indicate that the metrics satisfy the two theoretical frameworks at acceptable levels in their respective categories. Experimental results were also significant for all proposed metrics, which means that these metrics are highly correlated to maintainability subcharacteristics of understandability and modifiability. This shows that the proposed size and complexity metrics can be useful as indicators of the maintainability of BPEL process models.
</summary>
<dc:date>2011-01-01T00:00:00Z</dc:date>
</entry>
</feed>
