In WSNs securiy area, many people expects that motes can be compromised by
adversary. Of course, it makes sense that adversary can pick up motes
because motes can be placed in insecure place. However, do they can get a
programming code from motes that they get?

If mote A has encryption key in its code and adversary P gets mote A in the
field, P can get a programming code including encryption key from mote A?
Then, how?
_______________________________________________
Tinyos-help mailing list
[email protected]
https://www.millennium.berkeley.edu/cgi-bin/mailman/listinfo/tinyos-help

Reply via email to