Of malicious motes and suspicious sensors

How efficiently can a malicious device disrupt a single-hop wireless network? Imagine two honest players attempting to exchange information in the presence of a malicious adversary that can disrupt communication by jamming or overwriting messages. Assume the adversary has a broadcast budget of β-unk...

Full description

Bibliographic Details
Main Authors: Gilbert, Seth (Author), Guerraoui, Rachid (Author), Newport, Calvin Charles (Contributor)
Other Authors: Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory (Contributor)
Format: Article
Language:English
Published: Elsevier, 2015-03-31T17:44:45Z.
Subjects:
Online Access:Get fulltext