Confronting a mobile adversary in unattended sensor networks


Unattended sensor networks operating in hostile environments might collect data that represents a high-value target for the adversary. The unattended sensor's inability to off-load -- in real time -- sensitive data to a safe external entity makes it easy for the adversary to mount a focused attack aimed at eliminating or modifying certain offending data. In… (More)
DOI: 10.1145/1368310.1368312