R. Harikrishnan

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
— As sensor networks could be deployed in a hostile region to perform critical missions, the sensor networks are unattended and the sensor nodes normally are not equipped with tamper-resistant hardware. This allows a situation where the adversary can compromise one sensor node, fabricate many replicas having the same identity from the captured node, and(More)
  • 1