Of malicious motes and suspicious sensors
How efficiently can a malicious device disrupt a single-hop wireless network? Imagine two honest players attempting to exchange information in the presence of a malicious adversary that can disrupt communication by jamming or overwriting messages. Assume the adversary has a broadcast budget of β—unk...
Main Authors: | Gilbert, Seth, Guerraoui, Rachid, Newport, Calvin Charles |
---|---|
Other Authors: | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory |
Format: | Article |
Language: | en_US |
Published: |
Elsevier
2015
|
Online Access: | http://hdl.handle.net/1721.1/96286 |
Similar Items
-
Of Malicious Motes and Suspicious Sensors
by: Gilbert, Seth, et al.
Published: (2006) -
Interference-Resilient Information Exchange
by: Newport, Calvin Charles, et al.
Published: (2010) -
On the weakest failure detector ever
by: Kuznetsov, Petr, et al.
Published: (2010) -
Suspiciously convenient belief
by: Levy, N
Published: (2020) -
Secret Keys from Entangled Sensor Motes: Implementation and Analysis
by: Wilhelm, M, et al.
Published: (2010)