Assumptions
§ Simplex RF hardware is used (can either transmit or receive radio
signals but not both)
§ Nodes are assumed to be physically vulnerable and can be
compromised
§ Attacker can be present in the network from the beginning of
network formation
§ Attacker’s computing platform can be much more powerful than that
of the WSN nodes
We still consider attack difficulty and the benefit to the attacker of a successful
attack (ETSI attack model)