Secure Wireless Sensor Networks by Mauro Conti

Secure Wireless Sensor Networks by Mauro Conti

Author:Mauro Conti
Language: eng
Format: epub
Publisher: Springer New York, New York, NY


2. smart: At each step of the attack sequence, the next node to tamper with is node s, where s maximizes S(s), .

Intuitively, the oblivious adversary does not take advantage of any information about the detection protocol implemented. Conversely, the smart adversary greedily chooses to compromise the node that maximizes its appeal in order to maximize the chance for its clones to go undetected.

4.4 Requirements for the Distributed Detection Protocol

In this section we present and justify the requirements a protocol for clone detection should meet.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.