Of malicious motes and suspicious sensors
How efficiently can a malicious device disrupt a single-hop wireless network? Imagine two honest players attempting to exchange information in the presence of a malicious adversary that can disrupt communication by jamming or overwriting messages. Assume the adversary has a broadcast budget of β-unk...
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
Elsevier,
2015-03-31T17:44:45Z.
|
Subjects: | |
Online Access: | Get fulltext |