Of Malicious Motes and Suspicious Sensors
How much damage can a malicious tiny device cause in a single-hopwireless network? Imagine two players, Alice and Bob, who want toexchange information. Collin, a malicious adversary, wants to preventthem from communicating. By broadcasting at the same time as Alice orBob, Collin can destroy their...
Main Authors: | , , |
---|---|
Other Authors: | |
Language: | en_US |
Published: |
2006
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/32534 |