Browsing by Subject "k-selection"
Now showing items 1-1 of 1
-
Of Malicious Motes and Suspicious Sensors
(2006-04-19)How much damage can a malicious tiny device cause in a single-hopwireless network? Imagine two players, Alice and Bob, who want toexchange information. Collin, a malicious adversary, wants to preventthem from communicating. ...