Of Malicious Motes and Suspicious Sensors

How much damage can a malicious tiny device cause in a single-hopwireless network? Imagine two players, Alice and Bob, who want toexchange information. Collin, a malicious adversary, wants to preventthem from communicating. By broadcasting at the same time as Alice orBob, Collin can destroy their...

Full description

Bibliographic Details
Main Authors: Gilbert, Seth, Guerraoui, Rachid, Newport, Calvin
Other Authors: Nancy Lynch
Language:en_US
Published: 2006
Subjects:
Online Access:http://hdl.handle.net/1721.1/32534