This Must Be Performed study from a systemic model of Assessment and from an experimental comparison of protocols, based upon a simulation plat-form to enable Which Will Assess Their operation in closed-to-real operating conditions. The simulation platform will be equipped with the needed tools and components, in order to enable experimental evaluation of secure and intrusion tolerant protocol. These protocols combine mechanisms and defensive counter-measure against attacks on communications. They include Also Mechanisms to prevent specific routing attacks, which can be triggered from the injection or from the replication of misbehaviour of operation, nodes in that have been subjected to intrusion attacks.The Major Contribution of this work is the design of an Innovative simulation environment. It will provide the opportunity to implement and evaluate routing algorithms are designed to be that secure but for which there are in the experiment studies on the robustness and real impact of designed security mechanisms. This evaluation will focus primarily on examining the effectiveness of the provided security mechanisms. Это и многое другое вы найдете в книге Security Protocols for Data Routing in Wireless Sensor Network