Abstract
Our scenario assumes a network of lightweight communicating nodes. These nodes form an ad-hoc network of devices that are limited with respect to computation power, with respect to storage, and also with respect to the amount/frequency/speed of communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Švenda, P. (2017). Reconsidering Attacker Models in Ad-Hoc Networks (Transcript of Discussion). In: Anderson, J., Matyáš, V., Christianson, B., Stajano, F. (eds) Security Protocols XXIV. Security Protocols 2016. Lecture Notes in Computer Science(), vol 10368. Springer, Cham. https://doi.org/10.1007/978-3-319-62033-6_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-62033-6_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-62032-9
Online ISBN: 978-3-319-62033-6
eBook Packages: Computer ScienceComputer Science (R0)