Now showing items 1-1 of 1

    • Of Malicious Motes and Suspicious Sensors 

      Gilbert, Seth; Guerraoui, Rachid; Newport, Calvin (2006-04-19)
      How much damage can a malicious tiny device cause in a single-hopwireless network? Imagine two players, Alice and Bob, who want toexchange information. Collin, a malicious adversary, wants to preventthem from communicating. ...