 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
§ |
Simplex
RF hardware is used (can either transmit or receive radio
|
|
|
signals
but not both)
|
|
|
§ |
Nodes
are assumed to be physically vulnerable and can be
|
|
|
compromised
|
|
|
§ |
Attacker
can be present in the network from the beginning of
|
|
|
network
formation
|
|
|
§ |
Attacker’s
computing platform can be much more powerful than that
|
|
of
the WSN nodes
|
|
|
|
– |
We
still consider attack difficulty and the benefit to the attacker of a
successful
|
|
|
|
attack
(ETSI attack model)
|
|