§Simplex
RF hardware is used (can either transmit or receive radio signals
but not both)
§Nodes
are assumed to be physically vulnerable and can be compromised
§Attacker
can be present in the network from the beginning of network
formation
§Attacker’s
computing platform can be much more powerful than that of
the WSN nodes
–We
still consider attack difficulty and the benefit to the attacker of a
successful attack (ETSI attack model)
§