In WSNs securiy area, many people expects that motes can be compromised by adversary. Of course, it makes sense that adversary can pick up motes because motes can be placed in insecure place. However, do they can get a programming code from motes that they get?
If mote A has encryption key in its code and adversary P gets mote A in the field, P can get a programming code including encryption key from mote A? Then, how?
_______________________________________________ Tinyos-help mailing list [email protected] https://www.millennium.berkeley.edu/cgi-bin/mailman/listinfo/tinyos-help
